Table of Contents Overview ................................................................................. 3 Company Background ............................................................ 4 More Advanced Vetting ................................................. 5 Training .......................................................................... 6 Frameworks / Compliance ..................................................... 7 Policies ................................................................................... 8 Privilege Account Management ............................................. 9 General ........................................................................... 9 Role-Based Access Control (RBAC) ............................ 10 Authentication Management ....................................... 10 Password Management .............................................. 10 Session Management ................................................. 10 Systems Management ......................................................... 11 Incident Response................................................................ 12 Critical Patch and Vulnerability Management ...................... 13 Detection / Prevention ......................................................... 14 Service Recovery .................................................................. 15 Backups ....................................................................... 15 Recovery Planning ....................................................... 15 Security Assessments ......................................................... 16 Insurance .............................................................................. 17 About the CompTIA Cybersecurity Advisory Council .......... 18
