Part 3: Best Practices to Achieve Continuous Monitoring, Vulnerability Management, Threat Monitoring and Hunting, and to Align the Business Model Toward Zero Trust
In this section, the focus is on how continuous monitoring, asset inventory, vulnerability management, and threat monitoring help organizations implement the zero-trust model. We align this with the NIST security framework to achieve agility and better response by establishing best practices in the organization to monitor, secure, and manage the OT-IoT environment.
This section includes the following chapters:
- Chapter 7, Asset Inventory
- Chapter 8, Continuous Monitoring
- Chapter 9, Vulnerability Management and Threat Monitoring
- Chapter 10, Zero Trust Architecture and the NIST Cybersecurity Framework