Copyright 2015 ETCO INDIA. All Rights Reserved
The scope of proposed consulting in the area of Access Control Management would include the following:

(a) Physical Access Control to Sensitive Areas like Data Centers, Telecommunication Room, IT Services Area,
Documentation Room, Record Room, etc.

(b) Access Control on Network LAN Components, WAN Components, IP-VPN Links,

(c) Access Control on Network Services and Peripherals

(d) Access Control on Servers Infrastructure Servers (Like AD, DNS, WINS, DHCP, etc), Network Servers,
LAN Storage, Backup Server, etc.

(e) Access Control on Code Repository Server

(f) Access Control on Risk Management Server

(g) Access Control on databases This applies to all the backend databases running for the Business

(h) Access Control of Applications This includes the front-end user interface of all the Business Automation

(i) Access Control of Data Storage Systems This includes Storage Area Networks and Network Attached

(j) Access Control auditing using vulnerability analysis techniques

(k) Cloud Computing Access Controls

(l) Virtual Private Cloud (VPC) internetworking access controls

Back to IT Infrastructure Management Page
IT and ISMS Consultancy and Third Party Auditing: Risk Assessment and Business Impact Analysis, Disaster Recovery and Business
Continuity, Information Security, IT Service Management Framework