Module 5: Security Operations: Lesson 1: Systems Operations and Maintenance
Module 5: Security Operations: Lesson 1: Systems Operations and Maintenance
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 5: Security Operations
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 5: Security Operations
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 5: Security Operations
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 5: Security Operations
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 5: Security Operations
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 5: Security Operations
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 5: Security Operations
Establish an ISCM program that determines metrics, status monitoring frequencies, control assessment frequencies,
and an ISCM technical architecture
Implement the ISCM program to collect the security-related information required for metrics, assessments, and
reporting
Analyze data collected and report findings to determine the appropriate response
Respond to findings with technical, management, and operational mitigating activities or acceptance,
transference/sharing, or avoidance/rejection
Review and update ISCM strategy to increase visibility into assets and awareness of vulnerabilities and increase
organizational resilience
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.