课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Collect security process data

Collect security process data

- [Instructor] Security systems and processes generate large amounts of information. Buried in these massive piles of data are key pieces of information about the health of your security program. Security assessment requires collecting and analyzing that data on a regular basis. When we design security programs, we often focus primarily on the technical controls that protect the confidentiality, integrity, and availability of information. After all, these controls are usually the ones that require the greatest investment of time and resources. However, security programs can't function effectively if they don't also have solid management and operational controls such as undergoing regular and continuous evaluations. This requires access to both technical and process data. Technical data includes the logs generated by servers, network devices, firewalls, intrusion prevention systems, access control systems, and other security tools. That information comes in almost overwhelming…

内容