Design fundamentals of SAFE SMR Blueprint
Security and attack mitigation based on policy
Security implementation throughout the infrastructure
Cost-effective deployment
Secure management and reporting
Authentication and authorization of users and administrators to critical network resources
Intrusion detection for critical resources and subnets
SAFE SMR Blueprint axioms
Routers are targets.
Switches are targets.
Hosts are targets.
Networks are targets.
Applications are targets.
Secure management and reporting.
Security wheel: secure, monitor, test, improve; repeat