From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Develop secure operations plan
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Develop secure operations plan
All right, let's begin with Domain 5. So Domain 5 is our final domain, and this is all about secure operations, which is going to include, among other things, change management and disposal. So we're going to talk about a secure operations plan, then we're going to support those secure operations, participate in change management, and participate in the disposal process. So we're going to start out by talking about this idea of a secure operations plan. So what is it all about? Well it's going to include a lot of information about how to process and how to work with the day-to-day security operations within an organization. And so we're going to start off with that secure operations plan by including operational security procedures. What we do on a day-to-day basis. How do we manage user accounts, identity and access management. What does that look like? Privileged access control, administrative account access and management, monitoring logs, patch and change and configuration…
Contents
-
-
-
-
-
-
-
(Locked)
Develop secure operations plan7m 56s
-
(Locked)
Support secure operations11m 36s
-
(Locked)
Support the incident response process16m 53s
-
(Locked)
Develop secure maintenance procedures6m 19s
-
(Locked)
Participate in change management15m 46s
-
(Locked)
Assess change impact12m 33s
-
(Locked)
Perform verification and validation of changes10m 52s
-
(Locked)
Update risk assessment documentation11m 12s
-
(Locked)
Develop decommissioning disposal process13m 46s
-
(Locked)
Participate in the disposal process15m 21s
-
(Locked)
Audit results of decommissioning and disposal10m 49s
-
(Locked)
Implement data retention policies11m 34s
-
(Locked)