AGENDA
Operations necessary to protect and control information processing assets
Identify the security services available
Process and techniques that can be implemented to keep the system operational when faced with threats
Privileged entity controls
Resource protection
Continuity of operations
Change control management