Part 6: Assessment, Authorization and Monitoring (CA)

It’s great that you have matured your Assessment, Authorization and Monitoring (CA) process to level 4 but does that include ALL of your systems? Rogue applications are often found on corporate networks,  increasing your attack surface area. The risk of attack can be reduced if the detection of un-assessed applications (and data) are included in your (quarterly/annual) pen tests..  VIdeo

Previous
Previous

Part 7: Configuration Management (CM)

Next
Next

Part 5: Audit and Accountability (AU)