1 / 3
文档名称:

A Firewall & Security Policy Checklist - Techrepublic.pdf

格式:pdf   页数:3
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

A Firewall & Security Policy Checklist - Techrepublic.pdf

上传人:bolee65 2014/4/21 文件大小:0 KB

下载得到文件列表

A Firewall & Security Policy Checklist - Techrepublic.pdf

文档介绍

文档介绍:A Firewall & Security Policy Checklist
SCOPE:
Whether anization has firewalls and a security policy or not, it’s prudent to
regularly evaluate your security approach. Review and answer the following
questions before implementing any further firewall technology and/or security
policy additions or changes.

Identify which resources must absolutely be secure and in which order
of priority:
• Mission critical
• Redundant back-up system(s)
• Secondary
• Base systems

Identify minimum security needs for the following WAN connections:
• Employee remote dial-up
• Office-to-office VPN
• Employee and vendor broadband (DSL, cable modem, etc.)
• Vendor access
• Business-to-business access

Does your security team have quick access to work
documentation?
• Network diagrams
• Trending data
• Protocol utilization
• Data points
• Access points
• Major vendors’ point of contact information (ISP, telco, firewall vendor)

Does your security team know the order in which systems must be
restored?
• The security response team must have a full understanding of which systems need to be restored to
full operation and in what order.
• Does this order meet your business objectives and priorities?

Does your information disclosure policy address the following in
relationship to a security issue?
• What information is shared with