Security configuration and controls defined in the External Security Manager (ESM) are examined for each database
Policies and procedures for formal and informal controls are evaluated for weaknesses
Poor or weak controls and protections for sensitive data, libraries, and user privileges are captured
A detailed report with summary, results, descriptions of vulnerabilities and a remediation project plan are delivered upon completion and reviewed with your team