From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Acquisition process

Acquisition process

- [Brad] Welcome back to Cybrary's ISSE course. I'm your instructor, Brad Rhodes. Let's talk about the acquisition process. So in this lesson, we're going to look at security requirements, contracts, supply chain risk, and source selection as related to acquisition. Why do we do acquisition? Well, sometimes it's cheaper and faster to actually buy something than it is to build it ourselves. So when we talk about procuring something as an ISSE, we need to understand those security requirements. We're going to start with boundaries. Is this system going to be connected to the internet, IE, external? If it is, that drives our requirements then. If it's an internal matter, then obviously that's different. We need to look at resources, hardware, software, connectivity, hardware's pretty straightforward. If we're building, say a private cloud, then we need to have the hardware that goes with it. If we're going to serve a software solution that is unique and developed or built by our company…

Contents