Examining the Key Roles of Operations Security

Identify the key role of operations security.

  • Identify resources to be protected.

  • Identify privileges to be restricted.

  • Identify available controls and their type.

  • Describe the OPSEC process.

The first step in fulfilling the promise of operation security is to understand its key role. Operations security starts by identifying

  • Resources to protect

  • Privileges to be restricted

  • Controls necessary to do so

Identify Resources to Be Protected

The first step in any security review is to determine what you need to protect. Some common items in every organization's information systems should be protected, including

  • Computers, including servers, desktops, and laptops

  • Routers, switches, and other networking appliances ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.