Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
We begin this next Operations Security lesson with a discussion on Trusted Recover. You'll learn the difference between a system reboot, system emergency restart, & a system cold start and what happens within each of these events & why. You'll also learn what configurations must be in order to prepare the system for a system failure and recovery event, and why the failure of a system cannot be used to breach security. We discuss Media Management with examples of security breaches and what preventive security measures should employed. We also introduce the basics of Identity and Access Management, how it is not a single, point to point action but a board, ongoing cross set of rights, privileges and authentication processes. We also look at how business must now reaching beyond its own boundaries to partner with outside entities for security access controls and authentication.