Beruflich Dokumente
Kultur Dokumente
Policies are key to dictating how the network can and cannot be used by personne
l, along with the process for countering security attacks and escalating informa
tion about them.
Reporting is a key aspect. Having a clear, written policy of how and when securi
ty attacks and breaches should be documented is extremely important.
Another aspect of reporting should involve the periodic evaluation and documenti
ng of security tool performance. For instance, do any of the security tools have
log files showing attacks, loss of data, etc. and how often is this data review
ed?
Few Reports we should follow in our daily activities are ->
1.Firewall Rulebase report
2.Hardening Report
3.CI reports (How itz connected and which ports are shut n desc)
4.VA reports
5.Network Diagram
6.Network Procedure Manual
7.Syslog Report
8.Config Backup Report
9.Privilege access report
10.Penetration Testing
Component 3: Perform Network Security - Architecture Assessments -->research mor
e
Security effectiveness
Performance under load
Product vulnerabilities
Visualization of network limits
There are several common security assurance options for network
assessment including the following activities:
Penetration testing
Vulnerability assessment
Security audits
Code testing
Component 4: Implement A Well-Planned
Network Monitoring Solution
In monitoring phase, Security architecture focuses on three core aspects :1.Detaction
2.Prevention
3.Response
Instead of SPAN n VACLs to analyse Traffic, consider about Network TAP for bett
er security .
By their nature, SPANs and VACLs are generating summarized data that may have de
lays associated with the data packets. In addition, SPAN ports tend to create a
lot of duplicate data on the network.
Now that weve looked at a traditional design approach for a network security arch
itecture, there is a better way. Consider adopting a network life-cycle approach
to securing the network.