This chapter lists and explains the technical security controls that organizations must have to secure their assets. These controls implementation should be based on a zero trust1 model where all users, whether inside or outside the organization, need to be authenticated and authorized, and continuously identified to have access to corporate resources. Although these controls are essential to secure the organization, they are not enough to accomplish it. With these technical controls, organizations ...
4. IT Security Technical Controls
Get IT Security Controls: A Guide to Corporate Standards and Frameworks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.