December 2013
Intermediate to advanced
1872 pages
153h 31m
English
Now, let’s turn to the bigger security and compliance picture that shows many of the layers involved in a broader security enforcement approach. Figure 16.3 shows many of these layers, starting at the top with solid guidelines, policies, and compliance-reporting capabilities. You must start with these components to guarantee that you are aware of what must be done and have a way to show you are doing what the policies outline.
FIGURE 16.3 Security enforcement layers and components.
Next, you must define and create other aspects of security and compliance, such as security event management, alerting and monitoring, complete ...