From the course: Cloud Security Operations by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Information security management

Information security management

In this short lesson, we're going to remind ourselves of why we're here, okay, information security management. The purpose of this practice is common sense. It's to protect the information needed by the organization to conduct its business by delivering confidentiality, integrity, availability, authentication, and non-repudiation. Remember, we have three main categories of controls. Administrative or managerial, technical and operational, and physical. And we have five types of controls. Preventative, deterrent, detective, corrective, and compensating. You should be familiar with all of these. There are several processes and procedures involved with information security management. There is an Information Security Incident Management process, a Risk Management process, a Control, Review, and Audit process, and an Identity and Access Management process. There is also Event Management. There is procedures for Penetration Testing, Vulnerability Scanning, and more. And finally…

Contents