Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 878
Additional KSAT for the following Work Roles
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).