Deployment and Operations
The objective of this content area is to describe (and provide pointers to) commonly accepted best practices and processes and relevant characteristics of organizations that are demonstrating competence in sustaining adequate security during deployment and operations. Armed with this information, you can better determine which practices are most applicable to the deployment and operations of your own software and systems.
Title | Updated | Authors |
---|---|---|
Risk-Centered Practices | 2013-07-02 | Julia H. Allen |
"Prioritizing IT Controls for Effective, Measurable Security" | 2013-07-02 | Daniel Phelps, Gene Kim, Kurt Milne |
"Plan, Do, Check, Act" | 2013-07-02 | Julia H. Allen |
Navigating the Security Practice Landscape | 2013-07-02 | Julia H. Allen |
Integrating Security and IT | 2013-05-21 | Julia H. Allen |
Deployment and Operations References | 2013-05-14 | Julia H. Allen |
Deploying and Operating Secure Systems | 2013-05-14 | Julia H. Allen |