Part 2 - Maintenance Basic

Video Activity

This lesson covers Domain 9 and discusses basic security requirements 3.7.1 and 3.7.2.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

1 hour 27 minutes
Video Description

This lesson covers Domain 9 and discusses basic security requirements 3.7.1 and 3.7.2.

Video Transcription
Now the main nine is maintenance maintaining our systems. So our basic security requirements perform maintenance on organizational information systems. So when we think about maintenance, what sorts of things do we think about? We wanna think about being very proactive
in our maintenance.
You know, if I'm ah mechanic on a plane, I don't want to wait till there's a problem to think about how we should have manipulated this function or if I'm driving down the road. I don't wait until, uh, my engine overheats. Toe add cooler, right? We wouldn't be very proactive.
So when we talk about maintenance week
in order to determine what maintenance is needed in many instances we think about things like monitoring performance, making sure that were consistent with their baseline configuration, patching the system, monitoring those patches, documenting those patches,
any sort of thing that we need to do
to maintain that Baseline day today. Performance and security expectation that we have. So we're gonna have to monitor risks. We're gonna have to stay. Ah, breast of current events is for us. The threat landscape goes, and we're gonna have to be very proactive. So we're gonna perform maintenance on our systems
Ah, and provide effective controls on the tools, techniques, mechanisms
and personnel used to conduct information system maintenance. And essentially the whole point there is we have to limit who can maintain these systems. Who can update the system's who can monitor who has access to the audit logs.
This is very much an administrative function. And if I can install software, if I can access tools, if I can access the audit, well, perhaps I can delete entries,
so we want to make sure that we perform maintenance. But we also wanna lock down who can perform that maintenance and who has access to the tools and the other elements responsible to do so.
Up Next