A discussion piece within (ISC)2 community regarding variation in auditor security configuration standards. Discussing how to conform to a wider standard, so what was approved by one auditor group is not conforming to another auditing group.
Ej belagd 180910