First page Back Continue Last page Overview Graphics
Securing stage three.
One of the keys to securing stage three networks is to abstract the security of hosts and virtual networks.
- Once the security of a host is abstracted the abstract can be shared and accessed by a computer program.
- A key aspect of stage three networks is their automation.
- How do you know if the security today is the same as yesterday, or last month?
Depending on the nature of the abstract a third party may be needed to validate or certify the security settings.
- Examples for this might be HIPPA, GLB, FIL 12-99 or ISO7799.