Compaq 108164-003 - ProLiant - 800 White Paper page 19

Compaq enterprise security framework
Hide thumbs Also See for 108164-003 - ProLiant - 800:
Table of Contents

Advertisement

W
P
HITE
APER
(cont.)
. .
. .
TABLE 3: LEVELS OF SECURITY
. .
. .
. .
. .
. .
Robustness
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
Comprehensiveness/
. .
. .
Interoperability
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
Availability/ Performance
. .
. .
. .
. .
. .
. .
. .
. .
. .
Ease of Use/Integration
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
In practice, several solution sets fit into each level and across devices and networks. However,
. .
certain types of solutions characterize each security level. For example:
. .
. .
Level A solutions are primarily concerned with achieving basic security through stringent
. .
. .
access control to local devices, and basic boundary protection for the network.
. .
. .
Level B solutions require greater levels of authentication and authorization control locally, and
. .
. .
centralized security services for the internal network.
. .
. .
Level C solutions enable secure Externet applications and communications with advanced
. .
external network functionality. Level C also contains robust security at the boundary of and
. .
. .
inside the corporate network.
. .
. .
Higher security levels primarily operate as network services. Table 4 details at what platforms and
. .
. .
levels specific solutions operate:
. .
. .
19
Level A
Level B
Capable of deterring basic,
Capable of repelling more
unsophisticated attacks:
sophisticated attacks by those
with some level of computing
Colleagues attempting
power/expertise:
to log-on as
different/higher level
users
Employees who
unwittingly introduce
viruses
Offers measures addressed to
Offers measures addressed to
a single point (e.g., log-in,
multiple points and objectives.
data storage) and/or security
These measures are to some
objective (e.g., identification
degree interoperable with
access control) typically on a
other solutions and work
device.
across many (but not all)
platforms (e.g., single sign on
for segment of enterprise).
Solution is generally available
Solution has high availability,
with some periodic
but sometimes requires
maintenance and set-up
scheduled maintenance.
required. Overall performance
Security feature performance
is acceptable.
is strong and has no impact
on other operations.
Offers a solution which is not
Offers more integrated
well integrated with other
solutions for enterprises which
security solutions. Limited
make many security
flexibility and management
measures transparent to
tools for enterprise security
appropriate users. Offers easy
administrators.
to use administration tools.
Level C
Capable of defeating
sophisticated/organized
attacks uniformly across the
enterprise by those with
significant computing
Attacker with
power/expertise:
sophisticated hacking
utilities and ability to
Organizations with the
break encryption
ability to break strong
encryption, targeting
competitive data
Offers pervasive package that
functions across all the
heterogeneous
platforms/environments within
a large enterprise and/or
across Externet environment,
seamlessly. These solutions
may only address a single
objective, but offer a complete
solution (Externet/large
enterprise single sign-on).
Solution is available 24x7 with
limited maintenance time
required.
Solution performs
transparently to user.
Offers centralized, seamless
administration for internal
network, and Externet security
services. Easy to manage;
Enterprise can flexibly
build/change solutions to
meet their needs. Based on
open standards.

Advertisement

Table of Contents
loading

Table of Contents