Page 1019 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1019

security needs. However, a security policy usually does not go into
               details about how to fulfill the security needs or how to implement the

               policy. For example, it may state the need to implement and enforce
               separation of duties and least privilege principles but not state how to
               do so. Professionals within the organization use the security policies as
               a guide to implement security requirements.




                          Chapter 1, “Security Governance Through Principles and

                  Policies,” covers security policies in more depth. It includes
                  detailed information on standards, procedures, and guidelines.




               Implementing Defense in Depth

               Organizations implement access controls using a defense-in-depth
               strategy. This uses multiple layers or levels of access controls to

               provide layered security. As an example, consider Figure 14.1. It shows
               two servers and two disks to represent assets that an organization
               wants to protect. Intruders or attackers need to overcome multiple
               layers of defense to reach these protected assets.
   1014   1015   1016   1017   1018   1019   1020   1021   1022   1023   1024