An ISO 27001-based, systematic baseline identification of all network devices and resources, and the establishment of valuations for all groups of data residing on the network. Assessment converts general descriptions of the network into measurable data sets that can that be used to design an effective security management policy and infrastructure.
Conversion of assessment data into lists of network security applications, deployment locations, implementation strategies and specific configuration guidelines for each network device or security application. At the completion of this stage, the security policy exists as a completed document, accompanied by a deployment plan for all necessary technologies.
The physical process of implementing the plans created in the design phase. Includes the installation, testing, training and conversion to a production environment.
Measuring performance data horn the network security infrastructure against the goals stated in the security policy. Non-compliant systems and events trigger specific actions, as stated in the policy, including a re-evaluation of the policy and restart of the policy generation process. This stage can manifest itself as either in-house operation or. more commonly, as outsourced managed security services, and should include a detailed incident response plan.
An ongoing effort to raise awareness of the need for network security of the executive management, administrator and end user levels. This process cuts across all other steps, and includes both administrator training for emerging threats to systems and awareness among end users of the benefits of working within the security architecture.
Open Source Solutions