The Seven Domains of a Typical IT Infrastructure

Examining risk from a data perspective involves following data through an end-to-end process. As you move through your technology infrastructure, you’ll find similar risk and policy issues. There are many ways to group security policies. A common method is to group common risks and related policy issues into domains. These domains share similarities but are distinctive enough to allow logical separation into more manageable security areas. An advantage of this method is that each domain typically focuses on a different target audience. This means security awareness and training can be more precisely targeted. Recall the McCumber cube introduced in Chapter 1; it looked at security from multiple ...

Get Security Policies and Implementation Issues, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.