ISA/IEC 62443-2-1 removes material on the information security management program (ISMS), allowing stakeholders to rely on ISO/IEC 27001 for the information security program and ISO/IEC 27002 for related controls.
A detailed IT documentation tool can provide the necessary data for teams to find ghost systems, consolidate IT, avoid cooling hot spots, bundle resource planning and operations, and reclaim capacities.
I encourage everyone reading this to practice in all aspects of both their personal and professional lives — practice being healthy, kind, understanding, empathetic, resourceful, etc. But, I'd also like to challenge you to practice being more sustainable.
By focusing on network monitoring tools that have removable storage, InfoSec specialists and other security analysts can strengthen what will otherwise be a weak link.