Client Communication
Security Best Practices
Audit Readiness
Scoping & Requirements
100

Clear, concise summaries of decisions and next steps are known as this.

What are action items?

100

This principle ensures users only have the access they need.

What is least privilege?

100

This document maps controls to requirements.

What is a control matrix?

100

This document outlines deliverables, timelines, and responsibilities.

What is a statement of work (SOW)?

200

This practice ensures the client understands what you will and won’t deliver.

What is setting expectations?

200

This process identifies and fixes weaknesses in systems or applications.

What is vulnerability management?

200

This type of control requires evidence collected on a schedule (e.g., monthly).

What is a recurring control?

200

This term describes identifying systems, assets, and boundaries before testing.

What is defining the scope?

300

This technique involves restating what the client said to confirm understanding.

What is active listening?

300

This practice requires reviewing access lists at least quarterly.

What is access review?

300

This is the practice of verifying that controls are implemented before the audit begins.

What is readiness assessment?

300

This practice ensures both sides agree on assumptions before work begins.

What is validating requirements?