Chapter 7

Security Controls and Services

Information in this Chapter

Introduction

By the title of this chapter, you might expect to find a short discussion of basic security services like authentication and authorization, then followed by a detailed discussion of all the must have security controls that you should be implementing. And you might be right to expect this, except that this isn’t a book about auditing, so you will actually find that the opposite is true. In many respects, this chapter starts where Chapter 1 left, continuing to review the fundamental security concepts, principles, and models. After this, the majority of the chapters are devoted to understanding the important ...

Get Security Risk Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.