Introduction

Operations security is the combination of two practices. It is the implementation of sound security principles and the gleeful application of a paranoiac viewpoint to day-to-day operations.

There are many lists and papers that discuss the how and why of hardening systems and securing data. We know, in general, the steps we need to take to secure our data, our systems and our network. We can provide reams of documentation that detail how to best handle tapes; keep dirt and dust out of the data center; avoid conflict of interest; reduce opportunities for fraud, embezzlement, and espionage; and secure OSes, applications, and hardware. This general security takes us a long way. But it is the second practice, the activity which stems ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.