CHAPTER 20: NETWORK AND COMMUNICATIONS SECURITY

To secure your networks and communications, you must first know exactly what you are securing. What devices are on your networks? What information do you store and/or process on those devices? What are their security needs? Answering such questions, usually as part of your risk assessment, will help you organise your assets into different security zones based on their security requirements. From there, you can implement appropriate security measures.

Note that this is an important control that you should implement, but does require significantly more technical knowledge than most other controls in this book. Where you do not have this expertise in-house, outsourcing can be a good solution.

Creating ...

Get Cyber resilience - Defence-in-depth principles now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.