Compliance Audit

  

It is essential as a cybersecurity professional to have a complete understanding of how a compliance audit is conducted and documented because organizational sustainability often depends on the adequate assessment of information security and privacy management.Using the GCU Virtualization Environment, build either a Windows or Linux server. Then, search the web for technical controls related to HIPAA.Break the technical controls down into technical requirements appropriate for your virtual server with Pass/Fail criteria.Audit the virtual server and report if compliant or not.Once compliance testing has been completed, draft a certification letter for your client or organization highlighting the applicable controls tested along with the compliance model used. 

Refer to the “HIPAA Security Audit Certification Document,” located within the Required Readings, as an example.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-630 Compliance Audit Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.