U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.


Deployment and Operations

The objective of this content area is to describe (and provide pointers to) commonly accepted best practices and processes and relevant characteristics of organizations that are demonstrating competence in sustaining adequate security during deployment and operations. Armed with this information, you can better determine which practices are most applicable to the deployment and operations of your own software and systems.

Title Updated datesort ascending
Risk-Centered Practices 2013-07-02
"Prioritizing IT Controls for Effective, Measurable Security" 2013-07-02
"Plan, Do, Check, Act" 2013-07-02
Navigating the Security Practice Landscape 2013-07-02
Integrating Security and IT 2013-05-21
Deployment and Operations References 2013-05-14
Deploying and Operating Secure Systems 2013-05-14
Back to Top