Compaq 108164-003 - ProLiant - 800 White Paper page 20

Compaq enterprise security framework
Hide thumbs Also See for 108164-003 - ProLiant - 800:
Table of Contents

Advertisement

W
P
HITE
APER
(cont.)
. .
. .
TABLE 4: PLATFORM AND LEVEL-SPECIFIC SOLUTIONS
. .
. .
Level A
. .
. .
. .
Client/Server Device
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
Internal Network
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
External Network
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. .
20
Level B
Local information privacy-
basic encryption (selective
strong encryption (long key,
file, drive).
dedicated encryption engine)
Basic integrity protection
(standalone anti-virus
identification and access control
software)
solution, using software
(password) and hardware
Physical security
(tokens/smartcards)
measures
Robust access passwords
Network operating system
password
Basic ACLs, embedded in
network operating system
Basic boundary control
(firewall)
Access and integrity
protection (secure Web
server/browser)
Level C
Robust privacy using
biometric devices coupled with
digital certificates
Strong two faction local
Secure e-mail and Web
Software enabling multiple
robust security services
Centralized access
control/authorization with
flexible rules and
scaleable infrastructure
(enabling single sign on)
Auditing/Management
tools
VPN abilities (I.D., privacy,
integrity) with known
partners using public key
technologies (certificate
servers) and transmission
encryption (firewalls)
Secure E-commerce
application
Accountability software
(logging and tracking)
Intrusion
detection/investigation
tools
Network integrity
protection
Strongest identification:
Very strong file and drive
privacy
protection/encryption
Enterprise-wide replication
of security services with
centralized management
Standard-
based/interoperable public
key infrastructure offering
which covers key
recovery, certificate
creation/management,
signatures, and hashing
algorhythms
Robust infrastructure
enabling VPN abilities
even with unknown parties
based on interoperable
certificate servers and
firewalls
Single sign-on across
internal and external
networks enabled by
interoperable access
control and authorization
servers

Advertisement

Table of Contents
loading

Table of Contents