As some of you know, Gartner GTP has a brilliant resource called Reference Architecture that is “a unique decision-making tool that provides tailored recommendations to guide IT architecture decisions”, including of course the decisions about security. Apart from Decision Points and Templates, the reference architecture includes Solution Paths that guide our clients to other documents useful for solving a particular problem or addressing the entire domain of information security (or, if you have to have it, “cybersecurity”)
Two of my Solution Paths just published, they are:
- “Solution Path: Vulnerability Assessment, Mitigation and Remediation” helps IT security professionals develop an approach for assessing, prioritizing, mitigating and remediating security vulnerabilities that may lead to data breaches and malware infections.
- “Solution Path: Detecting and Responding to Attacks and Incidents” helps to develop an approach for monitoring, investigating and responding to attacks and security incidents, including data breaches and malware.
These short documents are essentially mini-roadmaps for solving problems described in their titles using various Gartner resources while utilizing many different security tools and practices. The second Solution Path, for example, helps organizations tie their security monitoring with incident response and other security capabilities using SIEM, DLP, NFT, ETDR and other tools.
P.S. Access requires Gartner GTP subscription.
Other documents I’ve recently written:
The Gartner Blog Network provides an opportunity for Gartner analysts to test ideas and move research forward. Because the content posted by Gartner analysts on this site does not undergo our standard editorial review, all comments or opinions expressed hereunder are those of the individual contributors and do not represent the views of Gartner, Inc. or its management.