Domain 7, “Operations Security”

Roles of Operations Security

Operations security can be used to do the following:

  • Identify resources to be protected.

  • Identify privileges to be restricted.

  • Identify available controls and their types.

Resources to Be Protected

Operations security should be designed to protect the following:

  • Computers, including servers, desktops, and laptops

  • Routers, switches, and other networking appliances

  • Printers

  • Databases, including the database management software and content

  • Security software and appliances (firewalls, intrusion detection systems, biometric devices, public key infrastructure

  • Media such as tapes, CD-ROMs, and disks

  • Personal digital appliances (PDAs), phones, and wireless devices

  • Modems and other communications devices ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.