Have you created a map of the to-be architecture?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
You will need to review, and perhaps create, detailed network diagrams of the architecture as it will be implemented and may later need to examine the management console software and individual security devices. The creation of network documentation will foster an understanding of the security architecture and also ensure that any security incidents can be traced. Also, network documentation is essential in large networks where multiple parties may be engaged in an investigation. Network documentation should be detailed, including identification of all network security devices, access paths and business-critical segments.