Comment by pickyman
3 years ago
Well depends, how indepth the audits are being done, i mean not just simple port checks or MFA, but much more into server configuration, policies, permissions, cloud audits etc.
3 years ago
Well depends, how indepth the audits are being done, i mean not just simple port checks or MFA, but much more into server configuration, policies, permissions, cloud audits etc.
No comments yet
Contribute on Hacker News ↗