IDG security report
Data that circulate through monitoring systems represent by themselves an asset to be protected



The report
This document aims to help organizations make their monitoring systems safer by introducing security into monitoring conversations and decisions.
.01
Security importance
.02
Monitoring strategy

.03
Asset evaluation
.04
Basic safety principles

.05
Architecture outline
.06
Safe base system

