CISSP Select Controls Based upon Systems Security Requirements – Bk1D3T3
Selecting the security controls appropriate for an information system starts with an analysis of the security requirements. The security requirements are determined by: An analysis of any regulatory or compliance requirements placed on the system (e.g. regulatory frameworks such as SOX and FISMA in the S., the Companies Act in the UK; privacy legislation such as GDPR in the EU or HIPAA in the U.S.; contractual obligations such as Payment Card Industry Data Security Standard …
CISSP Select Controls Based upon Systems Security Requirements – Bk1D3T3 Read More »