IT Security Operations.
Similarly, operations must preserve the security of the
system. As
security
is defined by a set of requirements, the system administrators,
system security officers, and other information security personnel must
understand how to translate requirements into procedures and configurations.
They must be able to design and implement security enclaves and infrastructures
to this end, for example to ensure that identity and authorization management
systems are installed, initialized, configured, and connected properly. They will
need to know how to test the systems, infrastructure, and procedures, and analyze
the results. Finally, the operations personnel must understand system maintenance
under both normal conditions (patching and upgrading, for example) and
abnormal conditions (incident handling and response, for example).
●
Do'stlaringiz bilan baham: |