For example, an organization might decide that a set of baseline controls applies perfectly to computers in their main location, but some controls aren’t appropriate or feasible in a remote office location. In this situation, the organization can select compensating security controls to tailor the baseline to the remote location.
- Chapter 5 Protecting Security of Assets
- from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition
- Publisher: Sybex
- Released: September 2015
List as example.
Share this highlighthttp://www.safaribooksonline.com/a/cissp-isc2-certified/10971124/