2.5 Creating the Security Standards Document


2.5 Creating the Security Standards Document

Knowing what countermeasures are going to be effective in securing our network assets, we are ready to begin the process of creating our standards document. This document simply outlines what technologies, administrative procedures, and physical controls we will implement in order to enforce the security policy. While the security policy statement is general, this is where we will discuss technologies such as IPSec, firewall solutions, intrusion detection systems, hiring and firing procedures, and standards for environmental controls, among others. I often explain the relationship between the standards document and the policy document by pointing out that the standards document can follow much the same format as the policy document, but in this case we will specifically spell out the steps required to enforce the policy document.




Network Perimeter Security. Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Cliff Riggs

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net