| ||
Step | Description |
---|---|
Develop security zones. | Identify all network elements that a critical system is dependent upon when defining a security zone. |
Consider potential weaknesses in DMZ design. | Review Table 6-1 when designing a DMZ (or security zone). |
Utilize reverse-proxy systems. | Reverse-proxies are flexible, scalable, economical, and can provide higher security than various DMZ designs when implemented properly. |
SANS Security Policy Project (http://www.sans.org/resources/policies/)
Information Assurance Technical Framework (http://www.iatf.net/)
Cisco SAFE: Security Blueprint for Enterprise Networks (http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.pdf)
NTLM Authentication (http://davenport. sourceforge .net/ntlm.html)
NTLM Authentication with HTTP (http://www.innovation.ch/java/ntlm.html)
| ||