9.6. Summary

In this chapter, you learned the key elements of security management, best practices, and privacy regulations.

Security management is an ongoing process that requires the use of best practices and documentation. The processes help you to document and classify the policies, procedures, and guidelines you need to implement an effective security policy.

The best practices of computer security include information classification, retention, storage, and destruction policies. Best practices also include the security policy, usage policies, backups, configuration management, inventories, change policies, and user management.

To carry out an effective security management process, an organization must allocate sufficient resources; identify ...

Get CompTIA Security+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.