Chapter 6: Designing and Managing Security Testing Processes

Now that you have a good understanding of the controls that can be put into place so that you have a functioning security strategy in your organization, my guess is that you've implemented several of them, and now, you're free to just chill out, browse LinkedIn, and watch Netflix on your work computer for the next few years until your retirement. Congratulations! You've earned the gold watch.

Oh, you just got pwned. Whoops. How did that happen? Well, there was a huge gap that you didn't consider in your design, and you didn't have anybody else sanity check the architecture, nor did you have any internal or external team perform a penetration test on your environment. You want a second ...

Get Infosec Strategies and Best Practices now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.