From the course: Cybersecurity Foundations: Security Architecture

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Assembling your trust management platform

Assembling your trust management platform

- In a previous video, we identified the three core elements of the Trust Management discipline. First are policies and procedures that are both human documents as well as system instantiated technical policies. Second, are encryptors and decryptors, which serve to obfuscate the data or applications as needed. And finally, the certificates and keys that provide the inputs and validators for those encryption operations. Let's take a more structured step by step approach to evaluate the various layers of trust that can be applied in our computing environments. The first step is to trust the humans. This is where GRC or governance, risk, and compliance capabilities get implemented, as well as policies, procedures, and plans, all at the human level. And we round things out with compliance audits that apply control frameworks to appropriate environments. Next, we trust the ecosystem and computing environments through the use…

Contents