Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Architecture and Recommendations to Implement Compensating…
Security Architecture and Recommendations to Implement Compensating Controls
Security data analytics
Trend analysis
Historical analysis
Data aggregation and correlation
Defense in depth
Processes
Scheduled reviews
Retirement of processes
Continual improvement
Technologies
Security appliances
Security suites
Automated reporting
Outsourcing
Cryptography
Personnel
Third party/consultants
Cross training
Separation of duties
Mandatory vacation
Dual control
Training
Succession planning
Other security concepts
Network design
Network segmentation
Manual review
Syslogs
Authentication logs
Firewall log
Event logs