O'Reilly logo

Advanced Host Intrusion Prevention with CSA by Chad Sullivan, - CCIE No. 6394, Jeff Asher, Paul Mauvais

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Basic Policy

To most organizations, the security policy is a document that outlines how information and systems should be protected, but the policy is rarely enforced or even enforceable. The security policy as a document is valuable for several reasons including regulatory and audit requirements. However, ignorance of the policy guidelines (or even ignorance of the policy’s existence) puts organizations at risk. The security policy is a high-level document made up of other policies and procedures that protect specific information and systems.

This chapter covers the following topics:

  • Need for a security policy

  • Components of a security policy

  • Policy application in Cisco Security Agent (CSA)

  • Policies included for basic operating system functions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required