O'Reilly logo

Web Security by Hanqing Wu, Liz Zhao

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18

Security Operations

As the saying goes, “security depends 30% on technology and 70% on management.” Most important to a company’s security is the outcome. Although the plan can seem wonderful, it still needs to be inspected for its effectiveness.

As mentioned in Chapter 1, “Our World View of Security,” security is a continuous process. And the aim of security operations is to be a continuous process. A healthy company should depend on security operations to be threat free.

18.1 Make the Security Operated

How do Internet companies create their own security blueprint? Speaking from a strategic viewpoint, Aberdeen Group mentioned three phrases: find and fix, defend and defer, and secure at the source (Figure 18.1).

Figure 18.1

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required