Adopting a DevSecOps mindset
In the previous sections, we drafted a series of best practices that could be summarized with the following key points:
- Consider the organization’s governance, which includes the regulatory frameworks they must comply with
- Adopt a cyber risk management mindset to customize the security controls to be implemented that are appropriate to each business unit instead of a rigid one-size-fits-all cybersecurity policy
- Consider security as a continuous improvement effort of discovering, analyzing, and reporting during all operational activities
We’ve used the term security posture a couple of times in this handbook. Let’s define what it is while utilizing the NIST 800-37 specifications: “The security status of an enterprise’s networks, information, and systems based on information assurance resources (for example, people, hardware, software, and policies) and capabilities in place to manage the defense of...