networking , security

Network Security Items to Consider

March 8, 2010

Hardware Security

Hardware asset management

Inventory of assets

Inventory of IT assets

Hardware maintenance and support

Network Security

Network security management

Security of network services

Network controls

Security of network services

Network access control

Network routing control

User authentication for external connections

User authentication for external connections

Equipment identification in networks

Remote diagnostic and configuration port protection

Segregation in networks

Network connection control

Network routing control

Network security architecture

Defense in depth

Network security architecture document

Network security zones

Review of network security architecture document

Content filtering

Application layer internet filtering

Intrusion defense monitoring

Network-based intrusion defense monitoring (NIDS)

Host-based intrusion defense system (HIDS)

Network security testing

Network penetration testing

VOIP security

Secure wireless networks

Telephony systems security

Network technical security controls

Layer 7 (application layer) security controls

Layer 6 (presentation layer) security controls

Layer 5 (session layer) security controls

Layer 4 (transport layer) security controls

Layer 3 (network layer) security controls

Layer 2 (data link layer) security controls

Layer 1 (physical layer) security controls