7.2. A Team Security Blanket

An organization's network security team typically secures anything that's on, that connects to, or that even attempts connection to their enterprise network. The long and impressive list of items that connects or attempts connection to a network encompasses network devices, network monitoring (such as SNMP), file servers, print servers, applications servers, computing devices (particularly for their connections to the network), networked fax machines and printers, and so on. Basically, any device that connects to the network usually falls under the network security team's purview; in today's typical organization structure, those entities can include just about every device used in the organization.

In some organizations, the scope of the network security team even crosses over into covering network authentication or security devices, such as RADIUS servers or appliances, or network access databases or data stores. In other organizations, even Voice over Internet Protocol (VoIP) or networked e-mail devices, such as e-mail servers, fall under the auspices of the security team. Whether authentication or security devices are the bailiwick of the network security team really depends on your organization and their corporate make-up.

NOTE

From organization to organization, independent of their corporate make-up, the charter of the network security team typically doesn't change. The charter of the network security team focuses on network security and the policies ...

Get Network Access Control For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.