In recent years there has been an increasing number of legislated regulatory mandates with which organizations must comply with to prove the confidentiality, integrity, and availability of information stored in their systems and provided through external parties. After reading various white papers, websites, and other articles that loosely use the terms “PCI, HIPAA, SOX, CIS, NIST, ISO, CIS, COBiT, FISMA, and FDCC,” heads can start spinning. Like many security professionals, we are not auditors or a lawyers ...
6. Configuration Assessment
Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.