eBooks & Reports

SecOps Playbook

Issue link: https://resources.threatstack.com/i/871286

Contents of this Issue

Navigation

Page 1 of 11

i THE SECOPS PLAYBOOK • TABLE Of COnTEnTS 1 2 3 4 5 Introduc on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 The Briefest History of DevOps The Present and Future: SecOps Who Should Implement SecOps? What are the Challenges of Implementa on? Budget Talent Tools Security is People: Powering a Cultural Shi 6 Prac cal Steps to Succeed at SecOps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. Get the Right People in the Room 2. Educate the Team About SecOps 3. Implement a Buddy System 4. Start With Low-Hanging Fruit 5. Compile Your Suite of Tools Configura on Management Incident Management Security Monitoring 6. Climb From Low-Hanging Fruit to the Top of the Trees Iden fy KPIs & Success Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Summary & Next Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Select Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 TABLE Of COnTEnTS

Articles in this issue

view archives of eBooks & Reports - SecOps Playbook