From the course: Performing a Technical Security Audit and Assessment
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Prioritize and schedule the assessments
From the course: Performing a Technical Security Audit and Assessment
Prioritize and schedule the assessments
- [Narrator] Security assessments, like any project, aim to achieve specific business objectives. In this case, they test the security of a specified set of systems. As with any project assessors face time, budget, and resource constraints. Adequate planning is crucial for ensuring a successful assessment. During the planning phase, organizations need to determine the systems that will be in scope for technical security assessments and establish the frequency of these assessments. Systems can be prioritized based on assigned system impact ratings by the organizations such as high, medium, and low. With high impact systems receiving higher priority and the last assessment date. Overdue systems are given higher priority. Compliance requirements such as annual assessments under FISMA may drive assessment frequency. However, organizations may choose more frequent assessments for better security oversight. Since assessments are only snapshots of security status, other factors that may…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Develop a security assessment policy1m 10s
-
(Locked)
Prioritize and schedule the assessments2m 7s
-
(Locked)
Select and customize techniques2m 38s
-
(Locked)
Select the assessors1m 36s
-
(Locked)
Select the location1m 42s
-
(Locked)
Select tools and resources1m 33s
-
(Locked)
Develop the assessment plan1m 27s
-
(Locked)
Challenge: Write a security assessment methodology1m 29s
-
(Locked)
Solution: Write a security assessment methodology58s
-
(Locked)
Legal considerations1m 6s
-
(Locked)
-
-
-