Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This segment opens with a review on Redundancy of Staff and why it's important to plan for it and cross train staff. In discussion Configuration Management, we look at how CM provides redundancy and several aspect of what it means. We clarify ISC2 definition of CM, how other functions such as Change Management or a change management process is part of Configuration Management, who is responsible for it, and the importance of documentation and what components comprise CM documentation. System hardening and baselining is also significant parts of Operations Security, and we look at several components to demonstrate why. An example like removing unnecessary services and why a change control process is a key process goes hand-in-hand with system hardening and baselining demonstrates sound Operations Security process, as well as interrelationship between other best practice strategies.