- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 68字
- 2021-06-24 19:12:49
Policies
Policies are written documents by high-management level members that specify the responsibilities and required behavior of every individual in an organization. In general, policies are short and don't specify technical aspects, such as operating systems and vendors. If the organization is large, policies could be divided into subpolicies. One of the well-known information security policies is the COBIT 5 Information Security Policy set, as shown here:

推薦閱讀
- Extending Puppet
- 高性能Linux服務(wù)器構(gòu)建實(shí)戰(zhàn):系統(tǒng)安全、故障排查、自動化運(yùn)維與集群架構(gòu)
- Linux自動化運(yùn)維:Shell與Ansible(微課版)
- Android物聯(lián)網(wǎng)開發(fā)細(xì)致入門與最佳實(shí)踐
- ElasticSearch Cookbook
- Vim 8文本處理實(shí)戰(zhàn)
- Learn CUDA Programming
- 從零開始學(xué)安裝與重裝系統(tǒng)
- 統(tǒng)信UOS應(yīng)用開發(fā)進(jìn)階教程
- Linux網(wǎng)絡(luò)操作系統(tǒng)項(xiàng)目教程(RHEL 7.4/CentOS 7.4)(第3版)(微課版)
- Docker容器技術(shù)與應(yīng)用
- 完美應(yīng)用Ubuntu(第2版)
- Azure Resource Manager Templates Quick Start Guide
- 電腦辦公(Windows10+Office2016)從新手到高手
- Python機(jī)器學(xué)習(xí)系統(tǒng)構(gòu)建(原書第3版)