This chapter provides a methodology and steps for securing a network. The methodology can be adapted for your own scenario. The steps put the methodology into practice.
To get most out of this chapter:
Read Chapter 2, "Threats and Countermeasures." This will give you a better understanding of potential threats to Web applications.
Use the snapshot . Table 15.3, which is at the end of this chapter, provides a snapshot of a secure network. Use this table as a reference when configuring your network.
Use the Checklist . Use "Checklist: Securing Your Network" in the "Checklist" section of this guide, to quickly evaluate and scope the required steps. The checklist will also help you complete the individual steps.
Use vendor details to implement the guidance . The guidance in this chapter is not specific to specific network hardware or software vendors . Consult your vendor's documentation for specific instructions on how to implement the countermeasures given in this chapter.