compliances , data-center-soc-noc , security

Security Operations – Security Guidance

February 10, 2012

Secure by Design

  • Design for defense-in-depth
  • Plan for security management
  • Design system architecture for security
  • Build network threat models

Secure by Default

  • Minimize the network attack surface
  • Deny access by default
  • Use security features in Windows Server 200x, Unix, MVS and Risc OS’s

Secure in Deployment

  • Software maintenance
  • Security policy
  • Educate users on security
  • Customers…Understand the value of protecting their assets, their data and customer transactionsDesire a single, simple solution to complex, daily problemValue a low Total Cost of Ownership

www.bestitdocuments.com