Operations Security

Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs. These differences stem from different cyber security risks. They also present organizations with different choices to define and make in their security policies. As you review Chapter 10, common IT infrastructure policies will be discussed as they relate to different infrastructure domains

What are some best practices organizations can observe when creating and maintaining domain policies?
LAN security policies often center on issues concerning connectivity; this includes determining how devices adhere to the network. What LAN security policies/standards does YOUR organization deploy? Why? (see page 274)
In general, WAN-specific standards identify specific security requirements for WAN devices. What WAN security policies/standards does YOUR organization deploy? Why? (see page 278)

This question has been answered.

Get Answer