Abstract
Prior to building the incident response program, specific capabilities must exist. At a minimum, these should include adoption of a chosen framework; an understanding of the assets the entity must focus on protecting; documentation of the risks to the confidentiality, integrity, and availability of the assets; and assurance that all fundamental protective capabilities exist. Examples of these capabilities include
-
Access-control processes and restriction of elevated privileges
-
Protection from misuse of data in motion, in use, and at rest
-
Hardening of hardware, based on established standards
-
Understanding and management of vulnerabilities
-
Existence of communication and control network protections (firewalls, etc.)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Eric C. Thompson
About this chapter
Cite this chapter
Thompson, E.C. (2018). Necessary Prerequisites. In: Cybersecurity Incident Response. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3870-7_2
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3870-7_2
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3869-1
Online ISBN: 978-1-4842-3870-7
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books