This webinar focuses on the popular topic of infrastructure security and will provide a high-level overview of the ins and outs of datacenter security, network security and even application security. This webinar dials into the importance of a solid security strategy for your business, especially as it concerns your business-critical data.
Often, visitors are greeted by staff that makes them pass through a detailed check-in before allowing access. This could involve a badge or biometrics. Basically, the more money you spend, the easier it is to audit and control your physical security presence. Research shows that most breeches occur when someone is standing right in front of the system. (An example of this is the famous Target customer data breech.)
One tip would be to have a “fly trap area” at the entrance that lets deliveries or visitors access the building but not the actual datacenter where the data is kept.
Once the servers are in and set up, it is paramount to use rigid blueprints for everything you stand up. Edge of network is where public access begins. The routing protocol protects from the outside in. Server security involves patch management. Your firewall layers can be as robust or narrow as you like. It is critical to keep up with bugs as well.
The port access essentially involves only keep the ports you need open. This can be established by auditing your current open ports and closing any that are not being used or do not to be open. IDS/IPS behind firewalls only see traffic getting through.