Module Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

5 hours 58 minutes
Video Transcription
Welcome back to Sai Breezes. Of course I'm your instructor, Brad Roads. Let's jump into our module. Summary four less than six. Domain five. The last domain in Issa.
Here's what We're gonna cover this lesson. We're going to review the module, So we're gonna look at all the secure operations disposal Decommissioning stuff that we talked about on. Then we're gonna do a real quick wrap off the entirety of the Isett domains because we're at the end of our run through the Isett domains, the five of them.
So in this module, we reviewed secure operations. We talked about what? That as people process technology, we talked about Kahneman. Continuous monitoring is where you gotta monitor all of the controls, whether they're technical, nontechnical, preventive, detective, whatever. All of that is something that we do frequently. All the time we talked about secure maintenance and the supply chain on the supply team. We realized that
if we can't see very far down the supply chain were a risk. We got to remember that
talked about incident response and how issues performed there. We talked about change management and highlighted the fact that you gotta have a baseline. No, matter what it is. Technical, nontechnical, a system, a component, Whatever. If you're gonna configuration control, it can change management. You've got to have that baseline. And then we talked about D common disposal. And remember,
Decommissioning is all about re use. Disposal is about destruction, and we're just walking away from whatever
thing that is we're not going to use anymore.
So let's wrap up theistic domains. We covered ah lot in the last five lessons. Ah, lot. We talked about security, engineering foundations, right? We looked at the basics. What it is for what? A systems engineering, what a system Security, engineering. How does that fit? We talked about risk management and the levels we talked about the organization level.
We talked about the mission business process level.
We talked about the system owner level, which drives all of this to enterprise risk.
We talked about serious security, planning and design and the absolute requirement that you've got to track things from beginning to end. You have to do requirements traceability from the component of all the way up through to the top level systems that is being engineered.
We talked about implementation, verification and validation. Those technical processes. And remember, with verification, right? You can say you met the requirement, but validation is Did you meet the mission of business need? And if you didn't, you might validate. You might verify, but never validate.
Then we talked about secure ops, management and disposal, and that's where we're running. The systems were doing all of that continuous monitoring and then ultimately following the fact that we should have a life cycle, uh, life cycle process in place to get rid of systems that are old and are no longer effective and potentially could cause the security vulnerabilities.
And that's theistic domains.
We're gonna now head off to module seven, which is our ISI process, where we're hopefully going to put all of that together, get you that flow all of these domains and sort of help you wrap your head around what it looks like to be an ISI and run through that entirety of the process.
All right, so in this lesson, we wrapped up all of module six. That's domain five and DISIP. We reviewed the Isett domains because we have reached the end of our our tour through the gossip domains were about to jump into module seven Theis E. Process to help you understand the flow and the work that s C s do on a regular basis.
We'll see you next time.
Up Next