Tags
Aaron Woody, book, Data-Centric Approach, review, risk, Security
So I’m back to reading Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody. I’ve not finished reading the book yet but as I’m reviewing one or two chapters at a time, I thought I’d blog about Chapter 3 – particularly given its value (previous blog entry here and here).
Chapter 3 goes by the name of Security As A Process, which addresses the processes to determining security risk, the analysis of cost benefit of implementing security features to address those risks. The chapter then goes on to provide guidance on defining good policies and standards.
In hindsight the process for determining and analyzing the security risks and classifying them is fairly obvious – it took the reading to to draw the points and the mechanisms into focus. But the fact it makes sense in hindsight suggests that the approach the workability and the chance for the business to understand the risks and challenges being taken on.
The chapter also provides some really good information sources for people to use to support the adotion of the processes described. Some I’ve known about such as the SANS Institute others I hadn’t.
I have to say that based on the strength of this chapter alone I’d recommend the book to any architect who is seeking to develop practical appreciation of addressing security considerations or understand what they should be looking for what to ask for in a new organisation. Those trying to drive up the quality of processes or get across the need for a more proactive security strategy that is also pragmatic – reading this chapter alone should help provide some serious points to get a handle on things.
The book has been published by Packt (who at the time of writing are running a promotion – more here)
There is also a supporting website for the book at http://www.datacentricsec.com/
Pingback: Enterprise Security – A Data Centric Approach – Chapter 4 | MP3Monster's Blog
Pingback: Enterprise Security – A Data Centric Approach – Chapters 5 & 6 | MP3Monster's Blog
Pingback: Enterprise Security – A Data Centric Approach – Chapters 7 & 8 | MP3Monster's Blog
Pingback: Enterprise Security – A Data Centric Approach – the final chapter | MP3Monster's Blog
Pingback: Enterprise Security – A Data Centric Approach – A brief review | MP3Monster's Blog