CHAPTER 2Information Security Departments and Roles
© Antishock/Shutterstock
A DEVELOPMENT AND OPERATIONS (DEVOPS) TEAM WORKING AT THE FYI CORPORATION discovered a violation of the Health Insurance Portability and Accountability Act (HIPAA) in software they had developed for medical doctors. The regulations required that patient record data be encrypted and stored in a separate location from identifiers associated with those records. Unfortunately, even though the DevOps team used a software development method called Agile for their software development life cycle, it was late in an iteration on a software upgrade to an application that had ...
Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.