Confirmed users
502
edits
Gdestuynder (talk | contribs) mNo edit summary |
|||
| Line 23: | Line 23: | ||
* Network security | * Network security | ||
* Risk analysis | * Risk analysis | ||
* | * Controls, practices, standards development and checking conformance to these | ||
=== Contacts === | === Contacts === | ||
| Line 70: | Line 70: | ||
* Query a pool of endpoints to verify the presence of a specific indicators | * Query a pool of endpoints to verify the presence of a specific indicators | ||
* Provide response mechanisms to lock down compromised endpoints | * Provide response mechanisms to lock down compromised endpoints | ||
* Periodically verify endpoint's | * Periodically verify endpoint's conformance with the security requirements | ||
==== Audisp-json: System Auditing ==== | ==== Audisp-json: System Auditing ==== | ||