Chapter 12

Cost-Effective Compliance Using Security Automation

Information in this chapter:

• Introduction

• CM Reference Architectures

• Security Automation Standards and Specifications

• Operational Visibility and Continuous Monitoring

Introduction

Security automation is an essential part of an information security program, enabling organizations to achieve more efficiency in monitoring activities. Not all continuous monitoring (CM) can be accomplished through automation. However, where automation is applied, an organization can more cost-effectively monitor and continually assess security controls. The result of using security automation enhances the security-related information produced from monitoring activities, offering a more accurate ...

Get Federal Cloud Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.