Summary
As you can see, some of the concepts we’ve learned previously, such as purple team exercises and threat modeling, can all play a role when it comes to prioritization and mapping tactics to gaps. As you’ll continue to see, security, in general, is interconnected, which means that when processes and teams work in synergy, then you are more likely able to implement a defense-in-depth approach to make your organization more secure. In the next chapter, we’ll continue to talk through implementation and examine some of the mistakes that get made when implementing securing infrastructure and processes. I’ll also walk through some of my previously failed security projects to go through what the lessons learned from those experiences were and what I would do differently if I were to complete those projects again.