Applying Security Operations Concepts


Chapter 16 Managing Security Operations

Don't use plagiarized sources. Get Your Custom Essay on
Applying Security Operations Concepts
Just from $9/Page
Order Essay


Applying Security Operations Concepts

Need to Know and Least Privilege

Separation of Duties and Responsibilities

Job Rotation

Mandatory Vacations

Privileged Account Management

Managing the Information Life Cycle

Service-Level Agreements

Addressing Personnel Safety and Security


Need to Know and Least Privilege

Need to Know

Work task related access

Often related to clearance

The Principle of Least Privilege



Transitive Trust

Separation of Duties and Responsibilities

No single person with total control

Separation of privilege

Applications and processes

Segregation of duties

Avoids conflicts of interest

See Figure 16.1

Two-person control

Job Rotation

Related to privilege management

Rotation of duties

Peer review

Reduce fraud


Mandatory Vacations

One or two week increments

No local or remote access

Peer review

Detect fraud

Deterrent and detection

Privileged Account Management

Special access or elevated rights

Administrative and sensitive job tasks

Privileged entities

Monitoring is essential

Trusted employees

Managing the Information Lifecycle

Creation or capture





Destruction or purging

Service-Level Agreements


Memorandum of understanding (MOU)

Interconnection Security Agreement (ISA)

NIST SP 800-47

Security Guide for Interconnecting Information Technology Systems

Addressing Personnel Safety and Security

Exit doors

Fail-safe vs. fail-secure doors

Duress systems and code phrases

Travel safety

Sensitive data

Malware and monitoring devices

Free WiFi and VPNs

Emergency management

Security training and awareness

Securely Provisioning Resources

Managing Hardware and Software Assets

Protecting Physical Assets

Managing Virtual Assets

Managing Cloud-Based Assets

Media Management


Managing Hardware and Software Assets

Hardware inventories

RFID tracking

Sanitize before disposal

Portable media management

Software licensing

Protecting Physical Assets

Includes building and contents



Locked doors


Security cameras / CCTV

Building design and layout

Managing Virtual Assets


Software-defined assets

Virtual machines (VMs)

Virtual desktop infrastructure (VDI)

Software-defined networks (SDN)

Virtual storage area networks (VSAN)


Managing Cloud-based Assets

Resources are located outside of direct control

DoD Cloud Computing Security Requirements Guide

Cloud service provider (CSP)

Software as a service (SaaS)

Platform as a service (PaaS)

Infrastructure as a service (IaaS)

Public, private, hybrid, community

Media Management

Protect media itself and data stored on media

Tape media

USB flash drives

Mobile devices

Choose your own device (CYOD)

Bring your own device (BYOD)

Mobile device management (MDM)

Media life cycle

Mean time to failure (MTTF)

Managing Configuration


Using Images for Baselining

Managing Change

Change management helps reduce unanticipated outages caused by unauthorized changes

Security impact analysis

Request, review, approve/reject, test, schedule/implement, document

Security assurance requirements (SAR)


Configuration documentation

Managing Patches and Reducing Vulnerabilities

Systems to Manage

End devices, servers, network devices, embedded devices, IoT

Patch Management

Evaluate, Test, Approve, Deploy, Verify

Vulnerability Management

Scanners and assessments

Vulnerability assessments

Common Vulnerabilities and Exposures (CVE)


Read the Exam Essentials

Review the chapter

Perform the Written Labs

Answer the Review Questions

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: Content is protected !!
Open chat
Need assignment help? You can contact our live agent via WhatsApp using +1 718 717 2861

Feel free to ask questions, clarifications, or discounts available when placing an order.
 + 1 (718) 717-2861           + 44 161 818 7126           [email protected]
  (718) 717-2861         [email protected]