Reply To: OCU C)SP A Week 01 Lesson 02 Discussion

Syerra Metzler

Some of the security policies that should be in place for a competent incident response within a company or organization are the separations of duties, least privilege, and ongoing security. Separations of duties is a great way to split up the work between a group of people so that not only one person is taking on the burden of securing the company or organization. The other benefit of the separations of duties is that there are multiple people looking at the best way to secure the business or if there was an incident that need to be addressed, then the team would be able to work together in order for the crisis to be averted efficiently and quickly. Least privilege is another great way to make sure that only the people that need to know of the incident are able to work with the team to fix the issue. Least privilege allows only the qualified people who need to know of the issue to be able to result the issue without the whole company getting distracted or working on different things to solve the one incident. Finally, having ongoing security before, during, and after an incident is the best security policy that a company can implement because of it is a great way to prepare for an incident and getting the company back on task. Ongoing security should always important so that the company has less of a risk of getting attacked and an incident ever occurring.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.


Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  



We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense


The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!