
上QQ阅读APP看书,第一时间看更新
Security considerations for the usage viewpoint
Following are the security considerations for implementing the usage viewpoint:
- Security monitoring continuously collects security-related data from events or activities, and analyzes it for security risks
- Security auditing collects, stores, and analyzes security-related information
- Security policy defines the usage and constraints for each user, role, and component
- Cryptographic support management stores, manages, grants, and revokes secure credentials, and provides global key management