22.3 – Baseline Analysis & Desired State

22.3 – Baseline Analysis & Desired State
Perform and document a baseline analysis and evaluate the desired state Well, it is essential to perform and document the current state of security within the organization. Without this phase it is not possible to detect the gaps within the enterprise. It is advisable to have a third party do a security analysis of your systems. There are many organizations who execute this operation including Axent, ISS and definitely the big consulting companies. Axent practices all life cycle security models, which includes what should be in enterprise security and they perform their analysis with this life cycle method. This may…
To access this content, you must subscribe to this General Subscription, or log in if you are a member.

Share this post