Chapter 4. The Security Policy

Terms you'll need to understand:

  • Security policy

  • Security wheel

  • Secure

  • Monitor

  • Test

  • Improve

Techniques you'll need to master:

  • Separating a security implementation into stages

  • Assigning a task to a stage in the security wheel

Cisco is quite plain in the SAFE Blueprint: "This document presumes that you already have a security policy in place. Cisco Systems does not recommend deploying security technologies without an associated policy." Everything that follows from this early paragraph in the Blueprint assumes that you are implementing your organization's policy; the Blueprint is about the technologies to do that effectively. To look at the problem another way, the SAFE Blueprint offers the most effective technical means to do the job; the security policy defines the job to be done. If you don't know what you're supposed to be doing, how do you know if you've done it wellor done it at all?



CSI Exam Cram 2 (Exam 642-541)
CCSP CSI Exam Cram 2 (Exam Cram 642-541)
ISBN: 0789730243
EAN: 2147483647
Year: 2002
Pages: 177
Authors: Annlee Hines

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net