This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact email@example.com if you have any questions about the US-CERT website archive.
Deployment and Operations
The objective of this content area is to describe (and provide pointers to) commonly accepted best practices and processes and relevant characteristics of organizations that are demonstrating competence in sustaining adequate security during deployment and operations. Armed with this information, you can better determine which practices are most applicable to the deployment and operations of your own software and systems.
|Risk-Centered Practices||2013-07-02||Julia H. Allen|
|"Prioritizing IT Controls for Effective, Measurable Security"||2013-07-02||Daniel Phelps, Gene Kim, Kurt Milne|
|"Plan, Do, Check, Act"||2013-07-02||Julia H. Allen|
|Navigating the Security Practice Landscape||2013-07-02||Julia H. Allen|
|Integrating Security and IT||2013-05-21||Julia H. Allen|
|Deployment and Operations References||2013-05-14||Julia H. Allen|
|Deploying and Operating Secure Systems||2013-05-14||Julia H. Allen|