𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Defensive Security Handbook Best Practices for Securing Infrastructure. Early Release

✍ Scribed by Lee Brotherston and Amanda Berlin


Publisher
O’Reilly
Year
2022
Tongue
English
Leaves
54
Edition
2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


  1. Creating a Security Program
    Lay the Groundwork
    Establish Teams
    Baseline Security Posture
    Assess Threats and Risks
    Identify Scope, Assets, & Threats
    Assess Risk & Impact
    Mitigate
    Monitor
    Prioritize
    Create Milestones
    Use Cases, Tabletops, and Drills
    Expanding Your Team and Skillsets
    Conclusion
  2. Asset Management and Documentation
    Information Classification
    Asset Management Implementation Steps
    Defining the Lifecycle
    Information Gathering
    Change Tracking
    Monitoring and Reporting
    Asset Management Guidelines
    Automation
    One Source of Truth
    Organize a Company-Wide Team
    Executive Champions
    Software Licensing
    Define Assets
    Documentation
    Networking Equipment
    Network
    Servers
    Desktops
    Users
    Applications
    Cloud Assets
    Conclusion
  3. Policies
    Language
    Document Contents
    Topics
    Storage and Communication
    Conclusion
    About the Authors

πŸ“œ SIMILAR VOLUMES


Defensive Security Handbook: Best Practi
✍ Lee Brotherston; Amanda Berlin πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro

Defensive Security Handbook: Best Practi
✍ Lee Brotherston, Amanda Berlin πŸ“‚ Library πŸ“… 2017 πŸ› O’Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro

Defensive Security Handbook: Best Practi
✍ Amanda Berlin, Lee Brotherston, William Reyor III πŸ“‚ Library πŸ“… 2024 πŸ› O'Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handboo

Defensive Security Handbook: Best Practi
✍ Lee Brotherston, Amanda Berlin πŸ“‚ Library πŸ“… 2017 πŸ› O’Reilly Media 🌐 English

<div><p>Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic g

Defensive Security Handbook: Best Practi
✍ Safari, an O'Reilly Media Company.; Berlin, Amanda; Brotherston, Lee πŸ“‚ Library πŸ“… 2017 πŸ› O'Reilly Media, Inc 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro