Summary
This chapter discussed the purpose of mitigation techniques used to secure the enterprise. This discussion involved an exploration of several such methods, such as segmentation (used to reduce the attack surface), the ACL, through which we can control access to our systems, the decommissioning of legacy systems, and hardening techniques to protect our environment.
The knowledge gained in this chapter will prepare you to answer any questions relating to Exam Objective 2.5 in your CompTIA Security+ certification exam.
The next chapter is Chapter 10, Compare and contrast security implications of different architecture models.