Dated: 12-11-2024
Ch02 what is the Best Approach to Secure the it Enterprise Architecture
- The 4-layer security transformation model is the only way to effectively and practically address security posture
- 4-layer security transformation model is tried & tested for geographies where the overall security awareness & posture is weak
- Security hardening: address security configuration of all IT assets which security "boxes" won't do for you
- Vulnerability management: scanning to inspect patching of IT assets (essential)
- Security engineering: this is where more serious investments may be made once layers 1 & 2 have been completed satisfactorily (or are being addressed)
- Security governance: ensure the proper utilization (as intended), ROI, and audits of purchased devices & solutions
Also ensure configs are as per design, and SOPs.
Post Assessments
which layer security transformation model is the only way to effectively and practically address security posture.
- 1
- 7
- 5
- 4
which of the following refers to address security configuration of all IT assets which security "boxes" won't do for you.
- Vulnerability Management
- Security Hardening
- Security Engineering
- Security Governance
which of the following layer security transformation model is tried & tested for geographies where the overall security awareness & posture is weak.
- 9
- 7
- 5
- 4