Summary

Now that the organization’s risk and vulnerability assessment is completed, many organizations are left with gaps and voids in the overall security of their IT infrastructure and assets as defined by the organization’s goals and objectives and minimum acceptable level of risk for the seven areas of information security responsibility. These gaps and voids are compounded with the lack of experience and capabilities of the organization’s IT staff given their expanded information security roles, tasks, responsibilities, and accountabilities that they must now take ownership of to ensure the confidentiality, integrity, and availability of the IT infrastructure and assets.

IT organizations must create and implement an IT security architecture ...

Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.