From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Support secure operations
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Support secure operations
Okay, our next section is to support secure operations and let's talk a little bit about continuous monitoring functionality. So continuous monitoring, we're going to use our technology and have processes in place to make sure that we're in compliance, could be with laws, regulations, industry standards, internal policy, and with risk issues. So not just compliance, but are we adequately managing risk? Always in alignment and always for the purpose of enabling the business, supporting the business. So you'll see ISCM as an acronym, Information Security Continuous Monitoring. So ongoing awareness of information security, vulnerabilities, and threats to support risk management decisions so that we can make good risk-aware business decisions. And what we're looking for with this idea of continuous monitoring is real-time risk management. Okay, not real-time real-time, but really near real-time risk management. So we're talking about constant scans and evaluations of compliance. requires…
Contents
-
-
-
-
-
-
-
(Locked)
Develop secure operations plan7m 56s
-
(Locked)
Support secure operations11m 36s
-
(Locked)
Support the incident response process16m 53s
-
(Locked)
Develop secure maintenance procedures6m 19s
-
(Locked)
Participate in change management15m 46s
-
(Locked)
Assess change impact12m 33s
-
(Locked)
Perform verification and validation of changes10m 52s
-
(Locked)
Update risk assessment documentation11m 12s
-
(Locked)
Develop decommissioning disposal process13m 46s
-
(Locked)
Participate in the disposal process15m 21s
-
(Locked)
Audit results of decommissioning and disposal10m 49s
-
(Locked)
Implement data retention policies11m 34s
-
(Locked)