First page Back Continue Last page Overview Graphics
The big picture.
When a host or virtual network can be classified and scanned with the results summarized, applications can be designed to adapt to changing security environments.
Security abstractions could be generated for hosts and groups of hosts, ultimately leading up to an abstraction for the entire network.
- Some examples of groups would be systems by function, type of system, where the systems are located or who controls the systems.
By standardizing on certain abstractions organizations would be able to determine if the other party is “secure enough” or complies with a specified policy.