TAILIEUCHUNG - SAFE: A Security Blueprint for Enterprise Networks

The purpose of this document is to provide guidance on network security testing. This document identifies network testing requirements and how to prioritize testing activities with limited resources. It describes network security testing techniques and tools. 1 This document provides guidance to assist organizations in avoiding duplication of effort by providing a consistent approach to network security testing throughout the organization’s networks. Furthermore, this document provides a feasible approach for organizations by offering varying levels of network security testing as appropriate to the organization’s mission and security objectives. . | Cisco Systems White Paper SAFE A Security Blueprint for Enterprise Networks Authors Sean Convery CCIE 4232 and Bernie Trudel CCIE 1884 are the original authors of this White Paper. The second version was authored by Greg Abelar and Jason Halpern of the SAFE Architecture Team. Abstract The SAFE Blueprint from Cisco Systems is a secure blueprint for enterprise networks. Its principle goal is to provide best practices information on designing and implementing secure networks. SAFE takes a defense-in-depth approach to network security design serving as a guide to network designers considering the security requirements of their networks. This type of design focuses on expected threats and their methods of mitigation resulting in a layered approach to security where the failure of one security system is not likely to lead to the compromise of the rest of the network. Although this white paper is a product-agnostic document the SAFE proof-of-concept lab is based on products from Cisco and its partners. This document begins with an overview of the blueprint s architecture and then details the specific modules that make up the actual network design. When discussing each module the first three sections describe the traffic flows primary devices and expected threats with basic mitigation diagrams. Detailed technical analysis of the design follows along with more detailed threat mitigation techniques and migration strategies. Appendix A details the validation lab for SAFE and includes configuration snapshots. Appendix B is a primer on network security. Readers unfamiliar with basic network security concepts are encouraged to read Appendix B before the rest of the document. Appendix C contains definitions of the technical terms used in this document and a legend for the included figures. This document focuses on threats encountered in enterprise environments. Network designers who understand these threats can better decide where and how to deploy mitigation technologies. .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.