Question

In: Computer Science

Briefly describe the functional groups (security professionals) that could or should exist in a large enterprise...

Briefly describe the functional groups (security professionals) that could or should exist in a large enterprise cyber security operation.

Solutions

Expert Solution

Policy and standards

This team develops, approves, and publishes security policy and standards to guide security decisions within the organization and inspire change. This team must take into account cloud platforms, DevOps processes and tools, and relevant regulations, among other factors. Read more about security policy and standards function.

Security operations center (SOC)

A security operations center (SOC) detects, responds to, and remediates active attacks on enterprise assets. SOCs are currently undergoing significant change, including an elevation of the function to business risk management, changes in the types of metrics tracked, new technologies, and a greater emphasis on threat hunting. Read more about the SOC function.

Security architecture

Security architecture translates the organization’s business and assurance goals into a security vision, providing documentation and diagrams to guide technical security decisions. A modern architecture function needs to consider continuous delivery, identity-centric security solutions for cloud assets, cloud-based security solutions, and more. Read more about the security architecture function.

Security compliance management

The objective of cloud security compliance management is to ensure that the organization is compliant with regulatory requirements and internal policies. As you modernize this function, consider the role that cloud providers play in compliance status, how you link compliance to risk management, and cloud-based compliance tools. Read more about the security compliance management function.

People security

People security protects the organization from inadvertent human mistakes and malicious insider actions. The cloud and changing threat landscape require this function to consider how to effectively engage employees in security, organizational culture change, and identification of insider threats. Read more about the people security function.

Application security and DevSecOps

The objective of application security and DevSecOps is to integrate security assurances into development processes and custom line of business applications.

Cloud services and APIs have enabled a faster delivery cadence and influenced the creation of the DevOps team model, driving a number of changes. The biggest change we see is the integration of security into the development process, which requires culture and process adjustments as each specialty adopt the best of each other’s culture. This function must also adopt an agile mindset and stay up to date on new tools and technologies. Read more about the application security and DevSecOps function.

Data security

The main objective for a data security team is to provide security protections and monitoring for sensitive enterprise data in any format or location. New regulations and data loss prevention models are influencing the evolution of this function, and the sheer volume of data being stored on numerous devices and cloud services has also had a significant impact. Read more about the data security function.

Infrastructure and endpoint security

The infrastructure and endpoint security function is responsible for security protection to the data center infrastructure, network components, and user endpoint devices. Software-defined datacenters and other cloud technologies are helping solve longstanding data center security challenges, and cloud services are transforming the security of user endpoint devices. Read more about the infrastructure and endpoint security function.

Identity and keys

The main objective of a security team working on identity management, is to provide authentication and authorization of humans, services, devices, and applications. Key and certification management provides secure distribution and access to key material for cryptographic operations (which often support similar outcomes as identity management).

One of the big changes is that identity and key/certification management disciplines are coming closer together as they both provide assurances on the identity of entities and enable secure communications. This function also plays a significant role in modernizing security by establishing an identity-based perimeter that is a keystone of a zero-trust access control strategy. Read more about the identity and keys function.

Threat intelligence

Security threat intelligence provides context and actionable insights on active attacks and potential threats to empower organizational leaders and security teams to make better (data-driven) decisions. Threat intelligence usually grows from a technical scope into servicing the larger organization with strategic, tactical, and operational (technical) threat intelligence. Read more about the threat intelligence function.

Posture management

Posture management builds on existing functions like vulnerability management and focuses on continuously monitoring and improving the security posture of the organization. Posture management is typically one of the largest changes because it supports decisions in many other functions using information that only recently became available because of the heavy instrumentation of cloud technology. This function includes zero-trust based access controls, real-time risk scoring, threat and vulnerability management, and threat modeling, among others. Read more about the posture management function.

Incident preparation

The primary objective for the incident preparation function is to build process maturity and muscle memory for responding to major incidents throughout the organization, including security teams, executive leadership, and many others outside of security. These practice exercises have become powerful tools to ensure stakeholders are informed and familiar with their role in a major security incident.

Successful IT security professionals need more than technical skills. To truly advance in the field, these experts should be:

  • Strategists - Cyber Security professionals should be able to proactively implement security measures and controls within organizations, weighing the consequences of any action. Advanced security protocols require tactical and strategic evaluations of workflows, dependencies, budgets, and resources. Because new methods to hack information are continually developing, professionals must be a step ahead, studying how hackers enter networks and procedures for thwarting them.
  • Communicators - Management and communication skills ensure effective coordination with teams and clients. Technology and security touch every professional in an organization. Security professionals must interact in meaningful ways by training and empowering employees to help protect systems.
  • Lifelong Learners - Another must-have skill is technical competence. With the pace of development in IT security, this means ongoing research, training, and earning standard certifications. These professionals should constantly be learning new advanced technology skills to be able to resolve complex security issues.

Related Solutions

1. Name and draw two biocompatible hydrophilic polymers. Briefly describe their applications. Circle the functional groups...
1. Name and draw two biocompatible hydrophilic polymers. Briefly describe their applications. Circle the functional groups that interact with water. What type(s) of interaction is (are) involved? 2. Draw the following tripeptides in their predominant form at pH 7. Determine the net charge of the predominant form of the peptides at pH 1, pH 7, and pH 12. a. Phe-Thr-Lys b. Trp-Arg-Asp
The proliferation of mobile devices has made a large impact on security in IT. IT professionals...
The proliferation of mobile devices has made a large impact on security in IT. IT professionals now have to be able to assess the security risks of an employee using their personal device, and whether or not that outweighs the benefits of such a policy. This is not only a security concern but a concern with compatibility as well. Many companies use proprietary software, and this software may not be compatible with all operating systems or device specifications that someone...
Briefly describe a derivative security?
Briefly describe a derivative security?
1. Identify and briefly describe the functional and non-functional requirements for the proposed system
1. Identify and briefly describe the functional and non-functional requirements for the proposed system
Q1. Define information security Q2. Describe the information security roles of professionals within an organization
Q1. Define information securityQ2. Describe the information security roles of professionals within an organizationQ3. Explain these Necessary tools: policy, awareness, training, education, technologyQ4. Explain why a successful information security program is the responsibility of both an organization’s general management and IT managementQ5. Identify the threats posed to information security and differentiate threats to the information within systems from attacks against the information within systemsQ6. Differentiate between laws and ethicsQ7. Explain the role of culture as it applies to ethics in...
Will social security exist in 45 years? Why or why not? Describe how Social Security has...
Will social security exist in 45 years? Why or why not? Describe how Social Security has been one of the three legs of retirement planning.  
Describe the 3 structures the DNA double helix could exist in.
Describe the 3 structures the DNA double helix could exist in.
Briefly describe the characteristics of cross-functional business processes. Also, briefly describe at least three business benefits...
Briefly describe the characteristics of cross-functional business processes. Also, briefly describe at least three business benefits of cross-functional business processes.  
 Describe the relationship between functional groups and macromolecules.  Compare and contrast different types of...
 Describe the relationship between functional groups and macromolecules.  Compare and contrast different types of isomeric compounds.  List the different kinds of biological macromolecules.  What is the special type of reaction that they all have in common to put them together? What about to breaks them apart?  Understand the relationship between amino acid sequence and their three-dimensional structure.  Know what makes the 20 different amino acids. Know the general structure of an amino acid.
There are different kinds of isomers, describe them. Name FIVE functional groups and list a property...
There are different kinds of isomers, describe them. Name FIVE functional groups and list a property of each one. Why is carbon so important to life on earth?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT