02. Defense in Depth

ND545 C02 L01 A02 Defense In Depth Big Picture

New Terms:

  • Framework: A set of agreed-upon policies, procedures, and processes that define how information is managed.
  • Best Practices: procedures and processes that are widely accepted within an industry as being effective.
  • Vendor Documentation: A combination of requirements and suggestions for the specific security configuration of their product.
  • Regulatory Requirements: Laws that you must comply with.

You'll be using Frameworks, Industry Best Practices, Vendor Documentation and Regulatory Requirements, both in this course and in the real world. When working in Cybersecurity, it is very important that you have a solid familiarity with all of these if you want to be successful.

Note: If your organization is subject to regulatory compliance, such as FERPA, HIPAA or PCI, there will certainly be documentation in the form of requirements, best practices and recommendations for your security program. There are links at the bottom of this page to learn more as these are not the focus of this course.

Big Picture Heading Image

The Cyber Security profession is similar to our judicial system it's built to protect us and has a long history. Why reinvent the wheel when you can use other proven sources to build your security program?

The Cyber Security profession is similar to our judicial system it's built to protect us and has a long history. Why reinvent the wheel when you can use other proven sources to build your security program?

Additional Resources