Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro
Defensive Security Handbook Best Practices for Securing Infrastructure. Early Release
β Scribed by Lee Brotherston and Amanda Berlin
- Publisher
- OβReilly
- Year
- 2022
- Tongue
- English
- Leaves
- 54
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
- Creating a Security Program
Lay the Groundwork
Establish Teams
Baseline Security Posture
Assess Threats and Risks
Identify Scope, Assets, & Threats
Assess Risk & Impact
Mitigate
Monitor
Prioritize
Create Milestones
Use Cases, Tabletops, and Drills
Expanding Your Team and Skillsets
Conclusion - Asset Management and Documentation
Information Classification
Asset Management Implementation Steps
Defining the Lifecycle
Information Gathering
Change Tracking
Monitoring and Reporting
Asset Management Guidelines
Automation
One Source of Truth
Organize a Company-Wide Team
Executive Champions
Software Licensing
Define Assets
Documentation
Networking Equipment
Network
Servers
Desktops
Users
Applications
Cloud Assets
Conclusion - Policies
Language
Document Contents
Topics
Storage and Communication
Conclusion
About the Authors
π SIMILAR VOLUMES
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations donβt have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handboo
<div><p>Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations donβt have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic g
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro