In: Computer Science
Research Playbook/Runbooks and the role they play in security.
Discuss how a Playbook/Runbook relates to creating a secure environment and why policies are important for enforcing security.
A runbook/playbook can be considered as a step by step procedure or guide present in different forms which the company’s IT department utilizes in order to create specific practices that are required in order to maintain the integrity of the system. Operational centers especially NOC’s make active use of the runbook, which can be present in both digital format or a printed format which allows the department a set of principles, guidelines, values and protocols that they need to uphold in order to not just keep the system functional and running but also to manage its interactions as well as securing the system in general. The presence of factors such as negligence and human errors will always be the cases which provide a challenge to the integrity of the system and therefore, having a set protocol and guidelines in place can help counter such problems., It is crafted according to the specific requirement of the system the company operates and best describes the path that needs to be followed. It is also utilized during the disaster management process by the company while allowing them the ability to be able to handle the mitigation situation and safeguard the system from further damage and harm.