Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Chapter 7. Identifying Assets and Activities to Be Protected Seven domains of a typical IT infrastructure are: User Domain Workstation Domain LAN Domain LAN-to-WAN Domain WAN Domain Remote Access Domain System/Application Domain With your partner discuss Seven Domains of a Typical IT Infrastructure For each of the seven domains, consider the assets you have and ask yourself some basic questions: Are the assets valuable to the organization? Are they included in any type of inventory or asset management system? There is a difference between inventory management and asset management. Inventory management This is used to manage hardware inventories. It includes only the basic data, such as model and serial numbers. It shows : 1. what assets are on hand, 2. where they're located, 3. and who owns them. Inventory management is valuable to ensure that the inventory isn't easily lost or stolen. Asset management This is used to manage all types of assets. It includes much more detailed data than an inventory management system includes. For example, asset management would cover installed components, hardware peripherals, installed software, update versions, and more. The User Domain includes people or employees. An HR department maintains records on employees. These can be manual records, such as folders held in filing cabinets, or files held on servers. Data on users includes: Personal and contact data Employee reviews Salary and bonus data Health care choices A significant concern with asset management in the User Domain is confidentiality. Data must be protected against unauthorized disclosure The Workstation Domain includes the PCs used by employees. It could include typical desktop PCs. It could also include mobile computers or laptops. Assets in the Workstation Domain have two risks to address: Theft An organization has a significant investment in these systems. It can't afford to allow them to disappear. Inventory management systems include processes where each item is manually located on a periodic basis. This verifies the system is still in the organization's control. Updates As updates, fixes, and patches are released, they need to be applied to the systems. If the systems are not updated, they become vulnerable to new exploits. Use automated asset management systems to keep systems up to date. An automated system will often perform three steps: 1) inspect systems for current updates, 2) apply updates, and 3) verify the updates. The LAN Domain includes all the elements used to connect systems and servers together. The local area network (LAN) is internal to the organization. The primary hardware components are hubs, switches, and routers. It's important to have a basic inventory of these devices. This includes the basics such as model, serial number, and location. Although any network device includes firmware, the more functional network devices such as routers and switches have a built-in operating system (OS). The version of the OS determines its capabilities, so it's often useful to include the version in the inventory. The LAN-to-WAN Domain is the area where your internal LAN connects to the wide area network (WAN). In this context, the WAN is often the Internet. The primary devices you're concerned with here are the firewalls. You can have a single firewall separating the LAN from the WAN. You can also have multiple firewalls to create a demilitarized zone (DMZ) or a buffer area. You'll want to include the following information in an asset management system: Hardware information This includes basics, such as the model and serial number. If the model supports different add-ins, such as additional memory, or additional network interface cards, you'll want to include these. Configuration data A significant amount of time goes into creating a firewall policy. You then create firewall rules and exceptions to implement the policy. At the very least, all these rules and exceptions need to be documented. Whenever possible, you should create scripts to automate the process. You should then back up these scripts. The WAN Domain includes any servers that have direct access to the Internet. This includes any server that has a public Internet Protocol (IP) address Inventory and asset management information for WANbased servers include: Hardware information This information includes basics, such as the model and serial number. Documentation is similar to how you'd document servers in the LAN-to-WAN Domain. Update information Servers in the WAN need to be kept up to date. This is an important step to ensure the server stays secure. Remote access technologies give users access to an internal network via an external location. This can be done via direct dial-up or virtual private network (VPN). When dial-up is used, clients and servers have modems and access to phone lines. When a VPN is used, the VPN server has a public IP address available on the Internet. Clients access the Internet, and then use tunnelling protocols to access the VPN server. Inventory and asset management information needed for servers in the Remote Access Domain are similar to those in the WAN Domain The System/Application Domain includes servers used to host server applications. Some examples of different types of application servers include: E-mail servers—This can be a single e-mail server. It can also be a larger e-mail solution, including both frontend and back-end server configurations. Database servers—This can be an Oracle or Microsoft SQL server. It can be a single server or a group of servers. Web servers Web servers host Web sites and serve them to Web clients. A single Web server can host a single Web site or hundreds of Web sites. Inventory and asset management systems should include the following information on any servers in the System/Application Domain: Hardware information—This includes basics such as the model and serial number, just as you'd inventory a workstation. It should also include an inventory of the hardware components. Update information—Servers need to be kept up to date. This is especially true if any of these servers are public-facing servers, such as Web servers and some email servers.