Identify and Align Security-Related Roles

  title={Identify and Align Security-Related Roles},
  author={Dan Blum},
  journal={Rational Cybersecurity for Business},
  • Dan Blum
  • Published 2020
  • Computer Science
  • Rational Cybersecurity for Business
Most technical security controls, or processes, do little without people in control. Firewalls require administrators to install and configure them. Access request systems need managers to review who should have access to the target application or database. Secure software coding depends almost entirely on the coders learning the right practices and testing or scanning tools. Everyone in the business has some part to play. Therefore, this chapter introduces some core concepts that Chapters 3…