Considerations for Planning, Structuring and Deploying a New Network Security Strategy

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email

by Bricata

Networks tend to grow over time. Sometimes this growth is organic as the organization adds new devices and components. Other times this growth comes by way of acquisition, as an acquiring company also assumes ownership of the network infrastructure that formerly belonged to the business being acquired.

Either way, the larger the organization, the harder it is to keep up with the addition of new network components. The more growth a network experiences, the less visibility the security team potentially has over the infrastructure.

You can’t protect what you can’t see and so network visibility in the case of a sprawling network is a real problem. To that end, there are clear triggers telling you it’s time to reconsider your network security strategy. The decision to update a strategy conjures up several questions including:

Who should be involved in planning a new network security strategy?

How should the new network security strategy be structured?

What’s the best way to seamlessly deploy the new security strategy?

This piece explores each of these questions and provides considerations for planning, structuring and deploying a new network security strategy.

1) Who should be involved in planning a new network security strategy?

There are four groups that should usually be involved in planning:

a) Business. The business needs to feel confident about security. Leaders need to know that security will both enable it to conduct business without constraints or undue fear of potential breaches. The business needs to be able to answer questions from their corporate board with confidence.

b) Security. This group needs to be sure they can secure the network to their satisfaction. Planning is the chance to make sure they have the tools to carry out the strategy. Their toolset needs to be aligned and provide the granularity data, capacity, scale, performance, and ease-of-use, they need to be sure the requirements for security are satisfied.

c) IT operations. The operations team wants to ensure the security strategy doesn’t impact IT service levels and that it is not a burden to manage. This group looks for characteristics that simplify rather than complicates network operations.

d) Enterprise architecture. The enterprise architecture team is responsible for the overall network design and needs to be sure it both fits with the current conception and evolve to meet future needs. For example, if the business will move offices in the next five years, this is the chance to start planning for it.

To read the entire post, please click here.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
32 Followers
About Bricata
Bricata is a cybersecurity solutions provider that combines a powerful network threat hunting platform into a comprehensive threat detection and prevention solution to help determine the true scope and severity threats. Bricata simplifies network threat hunting by identifying hidden threats using specifically designed hunting workflows that use detailed metadata provided clearly and eases your transition from the known to unknown malicious activities in conjunction with an advanced threat detection and prevention platform which detects zero-day malware conviction.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel