Chapter 9. Operations Security
After reading this chapter and completing the exercises, you will be able to do the following:
Outline the types of controls needed for secure operations of a data center
Explain the principle of least privilege.
Differentiate between the principle of least privilege and the principle of separation of duties
Define the control mechanisms commonly found in data center operations
Create a model of ...