The Business-Minded Chief Information Security Officer by Bryan C. Kissinger

The Business-Minded Chief Information Security Officer by Bryan C. Kissinger

Author:Bryan C. Kissinger
Language: eng
Format: epub
Published: 2020-03-05T04:41:23+00:00


Network documentation should include network configuration diagrams showing nodes and connections; an inventory of communications equipment, software, and services provided by external parties; and one or more diagrams of in-house cable runs. Network documentation (e.g., diagrams, inventories, and schedules) should be kept up-to-date and readily accessible to authorized individuals. Management should periodically review network documentation, which can be, ideally, generated automatically using software tools.

As you organize your security architecture component, understand what network segmentation practices are in place. Flat networks, or networks that connect freely between resources without consideration of zoning, create vulnerabilities and exposures to the entire network if infected. The use of zones and subzones, either with hardware or software boundaries, can help control traffic as it traverses east–west in your corporate network. For everyday network management, these zone schemes assist administrators in ensuring applications and users operate only within the part of the network needed for their roles. When an attack finds itself on the network, these zone schemes can help contain the attack or malicious software in one area of the network versus being able to traverse freely to all network segments.

Figure 3.7 is an example of a zoning scheme that takes full advantage of multiple zones to control different user groups and resources. In this example, the Restricted Zone could be where your most sensitive applications and databases reside and where most of your organization may not need to access for their jobs.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.