官术网_书友最值得收藏!

Summary

Throughout this chapter, we have provided an overview of baselining to help you understand its importance and its role within the overall security program. You have learned about policies, standards, procedures, and guidelines, as well as their importance as part of your overall security strategy. We also looked at how these policies, standards, procedures, and guidelines interact with and build on each other to structure the baseline model. We then covered the change management process with regard to baseline management.

Finally, we reviewed frameworks and their role within the security function of your organization, discussing the more widely adopted frameworks that are implemented. Following this section was an overview of the baseline controls that are available for Windows. These options include CIS and the Windows security baselines, as well as directions on where to retrieve predefined templates, configurations, and images before outlining the best practices of baselining.

In the next chapter, we will cover server infrastructure management. This chapter will provide an overview of the data center and the cloud, along with the models that are available. You will learn about the different tools available for Windows server management, including the traditional on-premises and hybrid solutions available in Azure that extend your workloads to the cloud.

主站蜘蛛池模板: 成都市| 轮台县| 厦门市| 敦煌市| 荔浦县| 宜兰市| 应城市| 晋州市| 诸暨市| 青铜峡市| 望江县| 开阳县| 左云县| 孟州市| 连平县| 古蔺县| 福贡县| 临潭县| 安丘市| 石首市| 华蓥市| 仁寿县| 康定县| 鹤峰县| 肇东市| 宿迁市| 峨山| 沙田区| 巴林左旗| 嘉善县| 迁西县| 新化县| 林甸县| 沂水县| 峨山| 汪清县| 南充市| 台东县| 徐州市| 江永县| 淳化县|