Скачать презентацию
Идет загрузка презентации. Пожалуйста, подождите
Презентация была опубликована 10 лет назад пользователемДемид Момотов
1 © 2006 Cisco Systems, Inc. All rights reserved. SND v Introduction to Network Security Policies Designing a Secure Network Life-Cycle Model
2 © 2006 Cisco Systems, Inc. All rights reserved. SND v Outline Overview Components of Network Security Design Secure Network Life-Cycle Management Planning a Secure Network Designing a Secure Network Implementing a Secure Network Operating a Secure Network Optimizing a Secure Network Disposing of Secure Network Components Principles of Secure Network Design Summary
3 © 2006 Cisco Systems, Inc. All rights reserved. SND v Secure Network Design Factors Many factors affect the design of a secure network: Business needs Risk analysis Security policy Industry best practices Security operations Security System Security Operations Incident Response, Monitoring Maintenance, and Compliance Auditing Industry Best Practices Business Needs Risk Analysis Security Policy Policies, Guidelines, Standards
4 © 2006 Cisco Systems, Inc. All rights reserved. SND v Typical Business Goals Increase revenue and profit Increase market share Expand into new markets Increase competitive advantages over companies in the same market Reduce costs Increase employee productivity Shorten product- development cycles Use just-in-time manufacturing Plan around component shortages Offer new customer services Offer better customer support Open the network to key constituents (prospects, investors, customers, business partners, suppliers, and employees) Build relationships and information accessibility to a new level, as a basis for the network organizational model Avoid business disruption caused by network security problems Avoid business disruption caused by natural and unnatural disasters Modernize outdated technologies Reduce telecommunications and network costs, including overhead associated with separate networks for voice, data, and video
5 © 2006 Cisco Systems, Inc. All rights reserved. SND v Phases of a secure network life cycle: Plan Design Implement Operate Optimize Dispose Secure Network Life Cycle Corporate Security Policy Plan Design Implement Operate Optimize
6 © 2006 Cisco Systems, Inc. All rights reserved. SND v PDIOO Applied to the Secure Network Life Cycle Plan Design Implement Operate Optimize Assess the Effectiveness of the Security Policy Domain of Managers and Users
7 © 2006 Cisco Systems, Inc. All rights reserved. SND v Secure NetworkPlanning Phase Planning and network security assessments: Security posture assessment Internal assessment External assessment Wireless assessment Dial-up assessment Security posture assessment analysis and documentation Plan Design Implement Operate Optimize Corporate Security Policy
8 © 2006 Cisco Systems, Inc. All rights reserved. SND v Secure NetworkDesign Phase Design a scalable, flexible and easy-to-use security solution: Design review –Review security business goals –Review existing network security architecture –Identify design vulnerabilities Design deployment –Develop a logical design of network topology and capabilities –Develop a physical design to specify hardware and software requirements –Test, optimize, and document the design Plan Design Implement Operate Optimize Corporate Security Policy
9 © 2006 Cisco Systems, Inc. All rights reserved. SND v Secure NetworkImplement Phase Plan Design Implement Operate Optimize Corporate Security Policy Implement integrated security into the network infrastructure: Implementation plan review –Review implementation plans –Review network staging, implementation, and test plans Implementation engineering –Develop an implementation plan –Provide education
10 © 2006 Cisco Systems, Inc. All rights reserved. SND v Secure NetworkOperate Phase Plan Design Implement Operate Optimize Corporate Security Policy Analyze the information gathered from the operational network: Review network and security changes periodically –Review changes in the network (devices, applications, policies) –Document changes and their impact Analyze incidents –Identify and classify the incident –Conduct a detailed analysis
11 © 2006 Cisco Systems, Inc. All rights reserved. SND v Continually identify and mitigate risk: Network security optimization –Define criteria for optimization –Monitor and inspect security logs –Impact analyses of new software and features –Use hardware and software to optimize the system Secure NetworkOptimize Phase Plan Design Implement Operate Optimize Corporate Security Policy
12 © 2006 Cisco Systems, Inc. All rights reserved. SND v Disposal of Secure Network Components The reality: Systems and components break down, wear out, or become obsolete. Information, hardware, and software provide an open vulnerability. Decomissioning and disposal must be completed in accordance to all applicable regulations and practices. Therefore: Move information to another system, archive, discard, or destroy information. –Consider storage media and technology –Destroy hard drives and other media Keep keys for encrypted information secure and available.
13 © 2006 Cisco Systems, Inc. All rights reserved. SND v Principles of Secure Network Design A principle is a rule or standard or a basic truth. NIST provides a list of system-level security principles to use throughout the life cycle of a secure network. Principles are used by users, system engineers and architects, and IT staff and managers.
14 © 2006 Cisco Systems, Inc. All rights reserved. SND v Selected Principles for IT Security PrincipleDescription 1Establish a sound security policy as the foundation for the design. 5Assume that external systems are insecure. 6 Balance potential trade-offs of reducing risk against increasing costs and decreasing operational effectiveness. 7Implement layered security to prevent single points of vulnerability. 11Minimize the number of elements to be trusted. 12Use a combination of measures distributed physically and logically. 16Isolate public access systems from critical business assets. 20 Design and implement audit mechanisms to detect unauthorized use and to support incident investigations 21Ensure that your secure network design is scalable. 22 Authenticate users and processes to ensure appropriate access control decisions both within and across domains. 25Do not implement unnecessary security mechanisms. 26Protect information while being processed, in transit, and in storage. 30Ensure proper security in the shutdown or disposal of a system. Source: Engineering Principles for Information Technology Security, NIST
15 © 2006 Cisco Systems, Inc. All rights reserved. SND v Summary Building secure networks requires proactive thought and action to deal with unforeseen security issues after the network is in operation. Use the PDIOO network life-cycle model to assist in secure network design. Balance business and operation needs against the provisions of security policies. The plan phase helps identify network requirements. The design phase provides the logical and physical design based on requirements gathered during the plan phase.
16 © 2006 Cisco Systems, Inc. All rights reserved. SND v Summary (Cont.) The implement phase builds the network and verifies the design. The operate phase is the final test of the effectiveness of the design and provides input into the optimize phase of the network life cycle. The optimize phase uses proactive network management techniques to identify and resolve problems before network disruptions arise. Final disposal of network components is an activity that needs attention from the very beginning of the network life cycle. NIST engineering principles for network security aid in designing a secure information system.
17 © 2006 Cisco Systems, Inc. All rights reserved. SND v
Еще похожие презентации в нашем архиве:
© 2024 MyShared Inc.
All rights reserved.