Summary
This chapter focused on enterprise security integration. For many security professionals, the words “enterprise security” might immediately bring to mind thoughts of firewalls, intrusion detection, and other hardware devices; however true, security requires more than the purchase of hardware. Hardware must be deployed and that is not easy without the cooperation of others. This means that you are going to have to work with teams of individuals throughout the organization in order to achieve your security goals.
Even with the help of others and the right hardware, security is about more than technology. You will also need to examine physical and operational controls. Physical controls can include locks, guards, fences, gates, and even CCTV. Operational controls include the segregation of employees into specific roles. These roles might include programmers, database administrators, network administrators, security administrators, and emergency response teams.
The CASP...