- Use a network forensics/full packet capture product.
- Have procedures been developed for each critical control points and product.
- Do a lot of reverse engineering of competitor products in order to take the risk out of product.
- Customize permission settings based on who is a risk owner.
Get all data HERE