July 2018
Intermediate to advanced
324 pages
9h 31m
English
Security policies embed intelligence in an organization's security operations. For ease and effectiveness, the policies should be consistent across the organization.
Security policies involving personnel, supply chain, and physical controls can be defined and enforced in alignment with enterprise IT guidelines, configurations, and infrastructure.
Device or machine policies normally can affect a group of devices. A device security policy should enumerate identity and access control policies for new device onboarding, device provisioning, secure software and firmware update policies, patching specifications, and security monitoring policies. These policies can be structured by defining baseline policies applicable ...
Read now
Unlock full access