Design Process; Security Compliance Management Business Process - IBM Tivoli and Cisco User Manual

Building a network access control solution with ibm tivoli and cisco systems
Table of Contents

Advertisement

2.3 Design process

The MASS methodology that we follow in this book includes the following steps of
the design process:
1. Model business process.
2. Establish security design objectives.
3. Select and enumerate subsystems.
4. Document conceptual security architecture.
We now walk through these steps.

2.3.1 Security compliance management business process

Figure 2-6 illustrates the
which is described in detail in the redbook Deployment Guide Series: IBM Tivoli
Security Compliance Manager, SG24-6450.
administration
administration
5. Correct
settings
Figure 2-6 Generic security compliance management business process
The security compliance management business process consists of these
general steps:
1. Apply security policy.
The first step in setting up a health check process is to make sure that the
required security control settings of the enterprise security policy are audited.
28
Building a Network Access Control Solution with IBM Tivoli and Cisco Systems
security compliance management business process
System
System
administration
System
4. Report
deviations
2. Check control
Servers
7.Request
exceptions
Security Audit Team
3. Document health
check and deviations
9. Document accepted
deviations
settings and compare to
Security Policy
,
Security
Policy
1. Apply security
policy
6. Report compliance status
8. Ask for risk accaptance
Authority
Management

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network access control solution

Table of Contents