PaulDotCom mailing list archives
Re: Security Starts With Policies
From: Michael Lubinski <michael.lubinski () gmail com>
Date: Wed, 2 Mar 2011 08:01:05 -0600
Exactly. I feel like I am reinventing the wheel here when it is not really needed. I feel that I will also need to expand my knowledge a bit, to perform comprehensive monitoring requires knowledge in all areas. I will see what I can do, thanks for the comments. On Tue, Mar 1, 2011 at 1:20 PM, Chris Keladis <ckeladis () gmail com> wrote:
On Tue, Mar 1, 2011 at 7:10 AM, Michael Lubinski < michael.lubinski () gmail com> wrote: Hey Michael, As it stands many think that security starts with solid policies andprocedures. Every good policy and procedure will have a scope. I am in the midst of taking an organization and applying some best practices with some audit requirements. How do you scope a project that is based on best practices and encompasses everything from servers, routers, switches, firewalls, and unused network drops?Definitely. You can look at implementing ISO-27001 which is exactly this (implementing an Information Security Management System or ISMS). Wikipedia has an overview: http://en.wikipedia.org/wiki/ISO/IEC_27001 No point re-inventing the wheel :) Cheers, Chris.
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Security Starts With Policies Michael Lubinski (Feb 28)
- Re: Security Starts With Policies Chesmore, Michael [DAS] (Mar 01)
- Re: Security Starts With Policies Michael Lubinski (Mar 01)
- Re: Security Starts With Policies alec (Mar 01)
- Re: Security Starts With Policies Michael Lubinski (Mar 01)
- Re: Security Starts With Policies Sherwyn (Mar 01)
- Re: Security Starts With Policies Chris Keladis (Mar 01)
- Re: Security Starts With Policies Michael Lubinski (Mar 03)
- Re: Security Starts With Policies Chesmore, Michael [DAS] (Mar 01)