Network Security Items to Consider
March 8, 2010Hardware Security
Hardware asset management
Inventory of assets
Inventory of IT assets
Hardware maintenance and support
Network Security
Network security management
Security of network services
Network controls
Security of network services
Network access control
Network routing control
User authentication for external connections
User authentication for external connections
Equipment identification in networks
Remote diagnostic and configuration port protection
Segregation in networks
Network connection control
Network routing control
Network security architecture
Defense in depth
Network security architecture document
Network security zones
Review of network security architecture document
Content filtering
Application layer internet filtering
Intrusion defense monitoring
Network-based intrusion defense monitoring (NIDS)
Host-based intrusion defense system (HIDS)
Network security testing
Network penetration testing
VOIP security
Secure wireless networks
Telephony systems security
Network technical security controls
Layer 7 (application layer) security controls
Layer 6 (presentation layer) security controls
Layer 5 (session layer) security controls
Layer 4 (transport layer) security controls
Layer 3 (network layer) security controls
Layer 2 (data link layer) security controls
Layer 1 (physical layer) security controls