7 Chapter 7FIGURE 7.1 Depiction of the Differences between MDM, EMM, and UEMFIGURE 7.2 Typical Identity Management Life Cycle
8 Chapter 8FIGURE 8.1 Heat Map of Chief Security Officer Hiring Across the United State...
9 Chapter 10FIGURE 10.1 Depiction of OWASP Top 10 2017FIGURE 10.2 CIS Controls and LevelsFIGURE 10.3 SOC Report Types ComparisonFIGURE 10.4 NIST Cybersecurity Framework PillarsFIGURE 10.5 Joint Authorization Board (JAB) WorkflowFIGURE 10.6 Agency Authorization Source: www.fedramp.gov
10 Chapter 11FIGURE 11.1 Popular Certification Control Coverage RobustnessFIGURE 11.2 Shared Assessments Third-Party Risk Management Toolkit Workflow...FIGURE 11.3 CSA STAR Levels
11 Chapter 13FIGURE 13.1 The Four Pillars of BSIMM and High-Level ComponentsFIGURE 13.2 OpenSAMM Framework Pillar and PracticesFIGURE 13.3 CMMI Maturity LevelsFIGURE 13.4 Microsoft SDL Workflow
Guide
1 Cover
2 Table of Contents
Pages
1 i
2 v
3 vi
4 vii
5 xv
6 xvi
7 xvii
8 xviii
9 xix
10 xxi
11 xxii
12 xxiii
13 xxv
14 1
15 2
16 3
17 4
18 5
19 7
20 8
21 9
22 10
23 11
24 12
25 13
26 14
27 15
28 16
29 17
30 18
31 19
32 20
33 21
34 23
35 24
36 25
37 26
38 27
39 28
40 29
41 30
42 31
43 32
44 33
45 34
46 35
47 36
48 37
49 38
50 39
51 40
52 41
53 42
54 43
55 44
56 45
57 46
58 47
59 48
60 49
61 50
62 51
63 52
64 53
65 54
66 55
67 56
68 57
69 58
70 59