From the course: Security Testing Essential Training (2022)

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

The security assessment lifecycle

The security assessment lifecycle

- [Instructor] When you integrate all five of these assessments into your information security program, you gain a considerable amount of visibility into where you might be most exposed. At the end of the day, that's what security's all about, isn't it? Identifying these exposures and shoring up your defenses before someone or something else can exploit these weaknesses. I'm not sure whether you noticed or not, but these assessments feed one another. If you conduct them in the order that I presented them here, you should notice efficiencies and how much effort it takes to conduct each assessment and, more importantly, in the quality of the assessment deliverables. Start with a risk assessment. Gauge the risk appetite of your leadership and identify the likelihood and impact of the risks most relevant to your organization. Next, conduct a security controls assessment. Take stock of the controls you have in place. Begin…

Contents