O'Reilly logo

Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Policy enforcement

To this point, we have covered several technologies to protect enterprise systems, and the final component is process related, which is policy enforcement. We covered security standards and policies in Chapter 3, Security As a Process prior to any protection topics being presented. This is because in order to have a position on how to protect systems in the enterprise, the trust models need to be built and required policies written as a guide to what methods to employ. The benefit of having policies is that there is a communicated enterprise-wide statement on how the enterprise expects employees to use assets and consequences to actions contrary to policy statements are also made explicit.

There is a standard set of policies ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required