Security Fundamentals: Policy Compliance

Most security practitioners and experts alike agree that establishing foundational security controls will give agencies the biggest security bang for their buck. So where should IT managers focus their efforts in order to ensure a strong foundation of security? As we have examined in parts one and two of this series, there are four key fundamentals at the heart of every effective security foundation: log management, file integrity monitoring, policy compliance and vulnerability management. Here, in part three of this series, we address policy compliance.

Download to Learn More!


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.