From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Develop secure operations plan

Develop secure operations plan

All right, let's begin with Domain 5. So Domain 5 is our final domain, and this is all about secure operations, which is going to include, among other things, change management and disposal. So we're going to talk about a secure operations plan, then we're going to support those secure operations, participate in change management, and participate in the disposal process. So we're going to start out by talking about this idea of a secure operations plan. So what is it all about? Well it's going to include a lot of information about how to process and how to work with the day-to-day security operations within an organization. And so we're going to start off with that secure operations plan by including operational security procedures. What we do on a day-to-day basis. How do we manage user accounts, identity and access management. What does that look like? Privileged access control, administrative account access and management, monitoring logs, patch and change and configuration…

Contents