Presents a comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This book helps in making an effective security policy and controls that enable monitoring and testing against them.