Monday, October 27, 2008

Security Management

Aligned with the needs of configuration management, the tenants of security management ensure
the integrity and reliability of the network. Many network devices by default enable security
through a shared password concept, which can be a violation of established security policies.
Enabling successful security management means segregating the roles and responsibilities of
administrators and users, logging their activity, and ensuring the privacy of data on the network.
An effective security management system will provide mechanisms for security administrators to
easily record network activity and parse that activity for anomalies. Consider the following
activities as critical for an effective security management system:
• Selective resource access
• Access logs
• Data privacy
• User access rights checking
• Security audit trail log
• Security alarm/event reporting
• Take care of security breaches and attempts
• Security-related information distributions

No comments:

Post a Comment