Additional Security Best Practices

Along with defense in depth, you need to put some additional best practices into practice to ensure that network security is achieved in your business.

Specific issues that you need to address include the following:

  • VPN users are at higher risk of software infection because their environment isn't controlled by a corporate security policy.

  • Security management functions such as logging, reading, and responding to syslog messages and events need to be deployed.

The bulk of the best practices described throughout the book are summarized in Appendix A, “Deploying Effective Security Management.”

Remote-Access Defense

Remote access is a staple of many businesses in today's Internet environment. Increasingly, companies ...

Get Securing Your Business with Cisco ASA and PIX Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.