Security Operations – Security Guidance
February 10, 2012Secure by Design
- Design for defense-in-depth
- Plan for security management
- Design system architecture for security
- Build network threat models
Secure by Default
- Minimize the network attack surface
- Deny access by default
- Use security features in Windows Server 200x, Unix, MVS and Risc OS’s
Secure in Deployment
- Software maintenance
- Security policy
- Educate users on security
- Customers…Understand the value of protecting their assets, their data and customer transactionsDesire a single, simple solution to complex, daily problemValue a low Total Cost of Ownership
www.bestitdocuments.com