Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements.
Purchasing a particular technology, additional hardware, software, or services may be needed to adequately protect information. Considerations for their selection should include the following:
- Applicability of the IT solution to the intended environment;
- The sensitivity of the data;
- The organization’s security policies, procedures, and standards; and
- Other requirements such as resources available for operation, maintenance, and training.