Planning considerations for secure management

When devices are being configured and implemented to ensure secure network management, it becomes important to consider a few other aspects as well. For a network containing only Cisco routers, configuring the devices will not be a complex task. On the contrary, logging and procuring information from multiple devices could be a complex and challenging task giving rise to a few concerns such as:

  • Categorizing important logs/messages from regular ones
  • Preventing the tampering of logs
  • Ensuring time coordination
  • Controlling the volume of messages
  • Managing all devices

To address these concerns, it is important for an organization to seek input from the network and security teams to help identify its priorities in reporting and monitoring. A robust and detailed security policy would also help to address the mentioned concerns. Security management also relates to configuring change management. Including a change management plan in the security policy will help in quickly accessing the modifications made to the important network devices. This will be especially useful during a network attack to know the status of important devices.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.230.82