From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Support secure operations

Support secure operations

Okay, our next section is to support secure operations and let's talk a little bit about continuous monitoring functionality. So continuous monitoring, we're going to use our technology and have processes in place to make sure that we're in compliance, could be with laws, regulations, industry standards, internal policy, and with risk issues. So not just compliance, but are we adequately managing risk? Always in alignment and always for the purpose of enabling the business, supporting the business. So you'll see ISCM as an acronym, Information Security Continuous Monitoring. So ongoing awareness of information security, vulnerabilities, and threats to support risk management decisions so that we can make good risk-aware business decisions. And what we're looking for with this idea of continuous monitoring is real-time risk management. Okay, not real-time real-time, but really near real-time risk management. So we're talking about constant scans and evaluations of compliance. requires…

Contents