Creating Appropriate Security
Policies and Enforcement
- Security audits: attack your system proactively
- You must really be able to trust your testers
- Incident handling
- Restoring the system
- Prosecution
- Planning and practicing
- Privacy
- Need to protect employee & customer privacy