From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Decommissioning and disposal processes
From the course: ISC2 Information Systems Security Engineering Professional (ISSEP) Cert Prep
Decommissioning and disposal processes
- [Brad] Welcome back to Cybrary's ISO course. I'm your instructor, Brad Rhodes. Let's talk about decommissioning and disposal processes. So in this lesson, we're going to talk about decommissioning, we're going to talk about disposal, and then we're going to compare the two. So when we talk about decommissioning, that's where we're taking a system out of service and we're likely going to, very important here, reuse it. And so you can see the process here. The decommissioning process actually starts at the beginning of our systems engineering work and our information system security engineering work. We got to determine the end of life of the system. That's where it starts. If we don't know when we need to decommission a system, it's really hard to determine what we're going to do with it. We then need to look at data. What data are we going to archive? Do we need to keep any? Are there regulatory requirements that we should be paying attention to that require us to keep data a…
Contents
-
-
-
-
-
-
-
Objectives and introduction to operations2m 58s
-
(Locked)
Secure operations3m 44s
-
(Locked)
Continuous monitoring5m 36s
-
(Locked)
Secure maintenance & supply chain7m 7s
-
(Locked)
Incident response3m 59s
-
(Locked)
Change management5m 18s
-
(Locked)
Disposal strategies4m 19s
-
(Locked)
Decommissioning and disposal processes4m 32s
-
(Locked)
Module summary3m 14s
-
-
-
-
-