前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >CISSP考试指南笔记:7.4 安全资源配置

CISSP考试指南笔记:7.4 安全资源配置

作者头像
血狼debugeeker
发布2021-03-23 11:07:27
3660
发布2021-03-23 11:07:27
举报
文章被收录于专栏:debugeeker的专栏

provisioning is the set of all activities required to provide one or more new information services to a user or group of users.

At the heart of provisioning is the imperative to provide these services in a secure manner.

Asset Inventory


the most essential aspect of securing our information systems is knowing what it is that we are defending.

Tracking Hardware

The International Organization for Standardization published ISO/PAS 28000:2007 as a means for organizations to use a consistent approach to securing their supply chains.

The solution is to have a comprehensive monitoring process that actively searches for these devices and ensures compliance with your organization’s security policies.

Tracking Software

The solution to the software asset inventory problem is multifaceted. It starts with an assessment of the legitimate application requirements of the organization.

Here are some of the most widely accepted best practices:

  • Application whitelisting
  • Using Gold Masters
  • Enforcing the principle of least privilege
  • Automated scanning

本文参与 腾讯云自媒体同步曝光计划,分享自作者个人站点/博客。
原始发表:2021/03/06 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • Asset Inventory
    • Tracking Hardware
      • Tracking Software
      领券
      问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档