N e t w o r k R e lia b ili t y a n d I n t e r o p e r a b ilit y C o u n c i l
FG2B Cybersecurity
- Dr. Bill Hancock, CISSP, CISM
FG2B Cybersecurity Dr. Bill Hancock, CISSP, CISM SAVVIS - - PowerPoint PPT Presentation
N e t w o r k R e lia b ili t y a n d I n t e r o p e r a b ilit y C o u n c i l FG2B Cybersecurity Dr. Bill Hancock, CISSP, CISM SAVVIS Communications FG2B Chair bill.hancock@savvis.net 972-740-7347 Purpose of Todays Brief Brief
N e t w o r k R e lia b ili t y a n d I n t e r o p e r a b ilit y C o u n c i l
NO, SP Implementor Dependency ISF SB52, www.sans.org Reference Compartmentalization of technical assets is a basic isolation principle of security where contamination or damage to one part of an overall asset chain does not disrupt or destroy other parts of an asset chain. Network Operators and Service Providers should give deliberate thought to and document an Architecture plan that partitions and isolates network communities and information, through the use of firewalls, DMZ or (virtual) private networks. In particular, where feasible, it is suggested the user traffic networks, network management infrastructure network, customer transaction system networks and enterprise communication/business operations networks be separated and partitioned from one another. Special care must to taken to assess OS, protocol and application vulnerabilities, and subsequently hardened and secure systems and applications, which are located in DMZ's or exposed to the open Internet. Preventative Best Practice Network Architecture Isolation/Partitioning Title 6-6-8008 Number
N e t w o r k R e lia b ili t y a n d I n t e r o p e r a b ilit y C o u n c i l