From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Secure operations

Secure operations

- Welcome back to Cybrary's ISSEP course. I'm your instructor, Brad Rhodes. Let's jump into secure operations. So in this video, we're going to talk about the infamous or the famous IAAA, which we'll get to in a second. We'll talk about policy standards, procedures, and guidelines, paperwork, everybody's absolute favorite thing. Then we're going to talk about a couple of technologies that we see in secure operations, DLP, data loss prevention, and ZTA, zero trust architecture. So one of the things we do in secure operations is make sure the right people, so this is the people side of things, can actually get onto the systems they need to and get access to the things they need to. And so we do that via the IAAA process. That's identification, proving who you are. That's authentication, that's passwords, multi-factor authentication, et cetera, right? When then we do authorizations? And that's where you hear terms like mandatory access control, discretionary access control. Do you have…

Contents