Risks and controls over access to 3rd party network location [closed]
I am auditing a financial application that connects to a merchant’s FTP server (SLAs signed) through VPN tunnels and fetches text and csv files from this server and places it on my organisation’s FTP server. This is an automated process; a… Continue reading Risks and controls over access to 3rd party network location [closed]