For a successful technology, reality must take precedence over public relations, for nature cannot be fooled.

Richard Phillips Feynman, Report on space shuttle Challenger disaster (1986)

The controls specified in this chapter are the technical controls, or those controls that govern the ongoing technical mechanisms impacting security. This chapter, along with the preceding Chapter 8 on managerial controls and the subsequent Chapter 10 on operational controls, completes the controls necessary for building the foundation for an information security program. Each listing of the operational control family is preceded with some practical security considerations for reviewing the family ...

Get Information Security Governance Simplified now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.