Have you created a map of the to-be architecture?

Have you created a map of the to-be architecture?

About the Author
Dr. Paul Rohmeyer is a faculty member at Stevens Institute of Technology, an independent security consultant focusing on enterprise IT risk management, and a frequent speaker at security and audit industry events. He has advised numerous financial, telecommunications and pharmaceutical companies in the development of secure network architectures.

    Requires Free Membership to View

You will need to review, and perhaps create, detailed network diagrams of the architecture as it will be implemented and may later need to examine the management console software and individual security devices. The creation of network documentation will foster an understanding of the security architecture and also ensure that any security incidents can be traced. Also, network documentation is essential in large networks where multiple parties may be engaged in an investigation. Network documentation should be detailed, including identification of all network security devices, access paths and business-critical segments.

This was first published in July 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: