Most enterprises are responsible for maintaining the security of literally thousands of devices, ranging from laptops and tablets to routers and firewalls. The sheer number of these systems makes it impossible to manually configure each of them to operate in a secure manner. In this video, you will learn how security baselines provide enterprises with an effective way to specify the minimum standards for computing systems and efficiently apply them across deployed devices.
- [Narrator] Most enterprise security teams…are responsible for maintaining the security…of literally thousands of devices,…ranging from laptops and tablets to routers and firewalls.…The sheer number of these systems makes it impossible…to manually configure each of them…to operate in a secure manner.…Security baselines provide enterprises…with an effective way to specify…the minimum standards for computing systems…and efficiently apply those standards…across deployed devices.…
Many organizations begin their…security standardization efforts…by developing a baseline standard.…This baseline sets forth the minimum standards…that apply to all devices, regardless of their purpose,…operating system, or the types of data that they contain.…For example, a baseline security standard might require…that a named individual is responsible…for the security of each device;…the device is protected against…unauthorized access attempts;…the device does not jeopardize the confidentiality,…integrity, or availability of other systems…
Members who take all eight courses in the series will be prepared to take and pass the CISSP exam. Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
- Understanding data security policies and roles
- Limiting data collection
- Developing security baselines
- Leveraging industry standards
- Restricting access to data with Windows and Linux file permissions
- Encrypting data
- Securing cloud storage