December 2020
Intermediate to advanced
361 pages
6h 26m
English
Part 3 – by far the longest part of this book – goes into a wide range of security processes (all taken from the CRF) you might need to implement. For ease of reference, this chapter offers a short description for each of the 24 processes within our CRF, giving you a better idea of which ones you should look at further.
To break the Framework down, there are four process categories, with each process falling within one of them. Each category describes how its processes fit within the overall Framework. The four categories are:
1.Manage and protect:
Deploy risk-appropriate information security measures – relying on people, processes and technology – to protect the confidentiality, integrity and availability ...