Page 1072 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1072
6.5.1 Internal
6.5.2 External
6.5.3 Third Party
Throughout this book, you’ve learned about many of
the different controls that information security professionals
implement to safeguard the confidentiality, integrity, and availability
of data. Among these, technical controls play an important role
protecting servers, networks, and other information processing
resources. Once security professionals build and configure these
controls, they must regularly test them to ensure that they continue to
properly safeguard information.
Security assessment and testing programs perform regular checks to
ensure that adequate security controls are in place and that they
effectively perform their assigned functions. In this chapter, you’ll
learn about many of the assessment and testing controls used by
security professionals around the world.

