filmov
tv
CISSP 110 Security Operations : Continuous Monitoring (CISSP IT-Tutorial)

Показать описание
#CISSP
#SecurityOperations
#ContinuousMonitoring
Certified Information Systems Security Professional (CISSP)
Domain 7: Security Operations
Logging and Monitoring
Continuous Monitoring
Information security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.
Define an ISCM strategy;
Establish an ISCM program;
Implement an ISCM program;
Analyze data and report findings;
Respond to findings; and
Review and Update the ISCM strategy and program.
Define an Information security continuous monitoring (ISCM) strategy based on risk tolerance that maintains clear visibility into assets, awareness of vulnerabilities, up-to-date threat information, and mission/business impacts.
Establish an Information security continuous monitoring (ISCM) program determining metrics, status monitoring frequencies, control assessment frequencies, and an ISCM technical architecture.
Implement an Information security continuous monitoring (ISCM) program and collect the security-related information required for metrics, assessments, and reporting.
Analyze the data collected and Report findings, determining the appropriate response.
Respond to findings with technical, management, and operational mitigating activities or acceptance, transference/sharing, or avoidance/rejection.
Review and Update the monitoring program, adjusting the ISCM strategy and maturing measurement capabilities to increase visibility into assets and awareness of vulnerabilities, further enable data-driven control of the security of an organization’s information infrastructure, and increase organizational resilience.
#SecurityOperations
#ContinuousMonitoring
Certified Information Systems Security Professional (CISSP)
Domain 7: Security Operations
Logging and Monitoring
Continuous Monitoring
Information security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.
Define an ISCM strategy;
Establish an ISCM program;
Implement an ISCM program;
Analyze data and report findings;
Respond to findings; and
Review and Update the ISCM strategy and program.
Define an Information security continuous monitoring (ISCM) strategy based on risk tolerance that maintains clear visibility into assets, awareness of vulnerabilities, up-to-date threat information, and mission/business impacts.
Establish an Information security continuous monitoring (ISCM) program determining metrics, status monitoring frequencies, control assessment frequencies, and an ISCM technical architecture.
Implement an Information security continuous monitoring (ISCM) program and collect the security-related information required for metrics, assessments, and reporting.
Analyze the data collected and Report findings, determining the appropriate response.
Respond to findings with technical, management, and operational mitigating activities or acceptance, transference/sharing, or avoidance/rejection.
Review and Update the monitoring program, adjusting the ISCM strategy and maturing measurement capabilities to increase visibility into assets and awareness of vulnerabilities, further enable data-driven control of the security of an organization’s information infrastructure, and increase organizational resilience.