So, now that concludes Chapter 7, Owning Security Operations. I believe we've covered the high-level requirements of information security professionals to handle security operations. As with every section of this book, we have covered many topics, but each one very briefly. Full books can be dedicated to any of this chapter's sections, or even individual paragraphs on their own. I hope this serves to raise interest in learning more about each subject area in the future!
In this chapter, we covered various important aspects of the daily requirements from an information security operations team.
First, we looked at effective strategies in provisioning and maintaining assets, including the policies and configuration management steps required, as well as touching on the concept of IaC to streamline and automate these processes.
Then, we moved on to focusing on availability, disaster recovery, and business continuity activities, including the processes of defining...