preview

Architecture and design considerations that should go into building a "secure" network.

In today’s technological environment, there are many tools that are easily obtainable and deployed by individuals with nefarious intent. From Windows or Linux based applications, to entire operating systems and software suites are readily available for a quick download. These facts drive network administrators to use innovative means with which to keep the attackers at bay. When designing a network, architects and administrators must make security an integral part of drafting the documentation, physical and software requirements that go into building a secure network.
Regardless of the size of the project, a good plan should be the first step in the process. The principal question that should be asked is: What is the purpose of this network and what are the resources required to meet this purpose? This will lead to creating a project plan that will include all of the standards which will be utilized to design, implement, test, review and revise the entire process as required. Amongst those standards should be a clear, thorough and concise security policy to use during the implementation of every network asset. Physical security, software and configuration for all aspects of the network design must be addressed in the security policy.
Detailed plans for meeting the physical security requirements are paramount to achieve the creation of a secure network. The physical security for critical network assets must be adequate when compared to the severity of damages that a breach could cause. Integrity of construction, cypher locks, access cards, keypads, biometrics, cameras, and guards with access logs are all considerations that must be specified as appropriate for the network and the data which will be used on it. The level of clea...

... middle of paper ...

...and IPS they make the entire network more secure by adding more layers of security at the host to harden the security posture. Doing so reduces the risk of an accidental breach from an employee or a malicious internal threat by policing the software and data on each workstation.
The final aspect they cannot be overlooked is people. A proper security screening for individuals that are to be granted any access, right, or permission for any portion of the network is instrumental. Lots of work goes into creating a secure network environment, and it can all be circumvented by a malicious inside threat. Additionally, sufficient training for every member of the organization on proper handling of data and use of network resources will mitigate the risk of accidental exposure to security threats. These are all consideration that must be taken when creating a secure network.

More about Architecture and design considerations that should go into building a "secure" network.

Get Access