prov:value
| - Things such as patch management, monitoring, incident handling, integration with dev, having contacts in other teams, other teams knowing how to engage the security department, threat modeling/security questionnaires, regular security testing, using security tools, system hardening, etc all are likely not implemented as they should be (or at all).
|