Capability deep dive – Security Configuration Management

To better understand the concept of the capabilities of securities in their relation to providing intelligence to the SOC, we will look at how we can incorporate each step using the service that is responsible for setting the security baselines for the organization, Security Configuration Management.

A more in-depth chapter on building the cyber intelligence capability within Security Configuration Management will be discussed later.

Using the preceding figure as a guide, we will review in more depth the capabilities that an SCM should provide:

  1. What their core processes are
  2. How the service is able to enable their processes (Discovery and Detection)
  3. How the service is able to inform the appropriate stakeholders or reduce risk (Risk Mitigation)
  4. How the service assesses the state of security for their area of responsibility (Security State Analysis)
  5. How the service shares information across and up (Data Exposure and Sharing)
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.84.155