On Thu, 9 Jun 2005 12:23:33 -0500, Terry Linsley wrote: >The organization we service is suffering through an audit at the moment. >One of the things the auditors looked at was the secure file transfer >process I had setup for that organization (OpenSSH based). They explained >it sufficiently, but the auditor had one last requirement. She wanted >proof that the data was actually being encrypted. ????
If you want to make this potentially long story short you really ought to ask the auditor directly (perhaps in writing) exactly what "proof" she will accept. Provide it. She should be satisfied, you will do what is actually required and all will otherwise be right with the world. In my experience trying to do anything else is an exercise in pain. -- Tom Schmidt Madison, WI (All auditor questions are strange at first glance. Only a few become less strange over time. - Schmidt's Law) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html