O'Reilly logo

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security by Serge Vereecke, Stefaan Van Daele, Gretchen Marx, Christian Mark, Mark Johnston, Vladimir Jeremic, Jaco Jacobs, Jan Flegr, Peter Brittenham, Martin Borrett, Brian Blackshaw, Saritha Arunkumar, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The components of the IBM Security Blueprint
This chapter explains the IBM Security Blueprint in more detail by describing the components and subcomponents of the IBM Security Blueprint.
The components in the IBM Security Blueprint describe the common security capabilities that are needed in any IT environment to manage IT security risks. Like the other elements of the IBM Security Blueprint, the components describe these security capabilities in vendor and product neutral terms, using common, accepted industry definitions.
Each component is described ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required