Audit

Auditing

Technical Audit for Computer Systems

The auditors follow a series of essential steps in identifying breaches in security, vulnerabilities and the performance degree of IT systems. Throughout an audit, all workstations, servers, related applications, as well as communication networks are thoroughly checked. From a security point of view, analyses are performed on the types of internal information flows and the possible risks of unauthorized access to the network and its resources, as well as data loss potential, are identified.

Information System Penetration Testing

Popularly known as “pen-testing”, are a type of stress-assessments made to evaluate the security of a network on a regular basis. We use specialized equipment and methodologies for external pen-testing by seasoned and certified staff. Our audits also investigate application security, databases, operating systems, IT infrastructure as a whole.

Audit of IT controls and procedures

First we check what risks an organization might be exposed to within the IT environment. Next, we audit general IT controls and policies and procedures implemented within the organization. Among the main auditing procedures, we also include: IT Security Policy, User Supervisory Procedures, Change Management Procedures, Back-up Procedures, IT Incident Management Procedures and others.

Technical Audit for Computer Systems

The auditors follow a series of essential steps in identifying breaches in security, vulnerabilities and the performance degree of IT systems. Throughout an audit, all workstations, servers, related applications, as well as communication networks are thoroughly checked. From a security point of view, analysis are performed on the types of internal information flows and the possible risks of unauthorized access to the network and its resources, as well as data loss potential, are identified.

jefferson santos SoCnyQmkzI unsplash scaled
beatriz perez moya XNTPVUUgk unsplash scaled

Internal IT Audit

We help facilitate organizations that wish to outsource their internal IT auditing, by accomplishing the following activities: IT risk evaluation, defining an internal IT audit plan, evaluating the resilience of IT controls within the identified zones deemed of higher risk, and so on.

IT Audit for system compliance with fiscal and accounting legislation

We audit information systems for compliance with Moldova’s accounting and fiscal standards. Areas in which we can carry out these revisions include: general accounting, inventory management, fixed asset management, cash transactions, taxation etc.

For details on audit procedures, contact the RSD team at [email protected]