From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Unlock the full course today
Join today to access over 24,600 courses taught by industry experts.
Reporting security status
From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Reporting security status
- [Instructor] Multiple teams will need insights into the current security state of your software in order to plan future changes accordingly, and you can report that security status through reports, dashboards, and feedback loops. There's one question that you should ask yourself every time you sit down to prepare any information that you intend to share with other teams, and that question is who's your audience? Are they executives, mid-level managers, frontline employees? Are they highly technical or are they more business oriented? If you don't know your audience going in, chances are you'll spend a lot of time and effort working on things that just won't be relevant to them. Once you've identified your audience, you can ask a few probing questions to make sure that the information you're preparing for them will really resonate. First, what do they need? Don't share unnecessary information with anyone. Not only will it distract them from what you're trying to accomplish, but…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Secure architecture and design patterns3m 43s
-
(Locked)
Identifying and prioritizing controls6m 15s
-
(Locked)
Traditional application architectures7m 23s
-
(Locked)
Pervasive and ubiquitous computing6m 43s
-
(Locked)
Rich internet and mobile applications7m 9s
-
(Locked)
Cloud architectures7m 8s
-
(Locked)
Embedded system considerations8m 45s
-
(Locked)
Architectural risk assessments6m 59s
-
(Locked)
Component-based systems5m 2s
-
(Locked)
Security enhancing tools4m 8s
-
(Locked)
Cognitive computing4m 37s
-
(Locked)
Control systems8m 34s
-
(Locked)
-
-
(Locked)
Components of a secure environment8m 25s
-
(Locked)
Designing network and server controls4m 22s
-
(Locked)
Designing data controls6m 25s
-
(Locked)
Secure design principles and patterns5m 6s
-
(Locked)
Secure interface design6m 49s
-
(Locked)
Security architecture and design review3m 6s
-
(Locked)
Secure operational architecture3m 37s
-
(Locked)