Define the current situation:
- Inventories of hardware, software, users, data and their type.
- Structure and network diagrams
- Internal communications (including wiring infrastructure, Wi-Fi)
- Contracted external communications.
- Different logs, performance reports and errors obtained from the Servers and PCs.
Special attention will also be paid in all matters related to security and its different aspects:
• Security document
• Physical security
• User access
• Hardware and software
• Network security
• Mail services (if applicable)
• Backup processes
• Data Recovery Plans (DRP)
Likewise, all that has to do with contracts, licenses and maintenance in the field of IT will be reviewed.