September 2010
Intermediate to advanced
1704 pages
111h 8m
English
Now, let’s turn to the bigger security and compliance picture that shows many of the layers involved in a broader security enforcement approach. Figure 13.3 shows many of these layers, starting at the top with solid guidelines, policies, and compliance-reporting capabilities. You must start with these components to guarantee that you are aware of what must be done and have a way to show you are doing what the policies outline.
Figure 13.3 Security enforcement layers and components.

Next, you must define and create other aspects of security and compliance, such as security event management, alerting and monitoring, complete ...