Protection of Information Assets A key component IS auditing professionals evaluate is an organizations logical access practices. Explore best practices for identification authentication authorization and confidential information handling activities.