Topic > Network Security Management with Macro and Micro Views

Network Security Management with Macro and Micro Views: Organizations need a holistic view of their network. With devices and hosts from different vendors, security teams need a normalized and comprehensive view of the network, including: routing rules, access rules, NAT, VPN, etc.; host, including all products (and versions), services, vulnerabilities and patches; and goods, including groupings and classifications of goods. With a comprehensive view of the network, security teams can view hosts on the network, as well as configurations, ratings, and other relevant information. A network map or model is both a useful visualization tool and a diagnostic tool, providing an analysis that is only possible when taking the big picture. For example, security and compliance teams can use this macro view to see how data would move between points on the network. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay While macro viewing is necessary to see how all the pieces of the network fit together, network administrators also need to be able to drill down into details for a particular device, easily accessing information about rules, access policies, and configuration compliance. And this information must be considered within the framework of the larger network, including context such as segments or zones, routing, routers, switches, intrusion prevention systems (IPS), and firewalls. Network components impacting the device will undoubtedly come from various vendors, creating data in multiple vendor languages ​​that must be deciphered, correlated, and optimized to allow administrators to streamline rule sets. Daily or weekly reviews of all devices on the network are not achievable with a manual process, and reviewing device configurations less frequently puts network security and compliance at risk. Policy compliance automation helps ensure compliance and consistency and preserves IT resources. Ideally, a network modeling tool that provides a macro view should also allow administrators to drill down to a micro view of each device, providing information about users, applications, vulnerabilities, and more. This allows administrators to have a broader view of the network and therefore focus on particular devices for management. Create usage policy statements: Create usage policy statements that outline users' roles and responsibilities regarding security. You can start with a general policy that covers all network systems and data within the company. This document should provide the general user community with an understanding of the security policy, its purpose, guidelines for improving their security practices, and definitions of their security responsibilities. Create an administrator acceptable use statement to explain procedures for administering user accounts, enforcing policies, and reviewing privileges. If your company has specific policies regarding user passwords or subsequent data processing, clearly present those policies as well. Compare the policy to your partner's and your acceptable use policy statements to ensure consistency. Ensure that the administrator requirements listed in the acceptable use policy are reflected in training plans and evaluations.