Summary
In this chapter, we discussed the infrastructure and architecture of information security. This chapter will help the CISM candidate to understand important methods, tools, and techniques to develop security programs in an effective and efficient manner.
We also learned about security architecture in line with industry best practices. We discussed access control requirements, including biometrics and factors of authentication.
In our next chapter, we will discuss the practical aspects of developing and managing information security programs.