Planning Task List for Distributed Security

To develop your network security deployment plan, complete the tasks listed in Table 11.4.

Table   11.4 Security Planning Task List

Task

Location in Chapter

Identify the security risks that apply to your network. Tabulate and explain them in the plan.

Security Risks

Provide background material on security concepts and vocabulary to orient the reader of your plan.

Security Concepts

Introduce and explain the security strategies that address the risks in your plan.

Distributed Security Strategies

Ensure that all access to network resources requires authentication using domain accounts.

Authenticating All User Access

Determine what part of the user community needs to use strong authentication for interactive or remote access login.

Authenticating All User Access

Define the password length, change interval, and complexity requirements for domain user accounts and develop a plan to communicate these requirements to the user community.

Authenticating All User Access

Define your organization policy to eliminate transmission of clear text passwords on any network and develop a strategy to enable single sign on or protect password transmission.

Authenticating All User Access

Identify a plan to deploy public key security for smart card logon if strong authentication meets your security objectives.

Smart Card Logon

Describe your policy for enabling remote access for users.

Remote Access

Develop a plan to communicate remote access procedures, including connection methods, to general user community.

Remote Access

Identify how your organization currently uses groups and establish conventions for group names and how group types are used.

Applying Access Control

Describe the top-level security groups you intend to use for broad security access to enterprise-wide resources. These are likely to be your enterprise universal groups.

Applying Access Control

Describe your access control policies with specific reference to how security groups are used in a consistent manner.

Applying Access Control

Define the procedures for creating new groups and who has responsibility to manage group membership.

Applying Access Control

Determine which existing domains belong in the forest, and which domains use external trust relationships.

Establishing Trust Relationships

Describe your domains, domain trees, and forests, and explicitly state the trust relationships among them.

Establishing Trust Relationships

Define a policy for identifying and managing sensitive or confidential information and your requirements to protect sensitive data.

Enabling Data Protection

Identify network data servers that provide sensitive data that might require network data protection to prevent eavesdropping.

Enabling Data Protection

Develop a deployment plan for using IPSec for protection data for remote access or for accessing sensitive application data servers.

Enabling Data Protection

If using EFS, describe your Data Recovery Policy, including the role of Recovery Agent in your organization.

Encrypting File System

If using EFS, describe the procedures you plan to use to implement data recovery process and verify that the process works for your organization.

Encrypting File System

If using IPSec, identify the scenarios for how it will be used in your network and understand the performance implications.

IP Security

Define domain-wide account policies and communicate those policies and guidelines to the user community.

Setting Uniform Security Policies

Determine the local security policy requirements for different categories of systems on the network, such as desktops, file and print servers, e-mail servers. Define the Group Policy security settings appropriate to each category.

Setting Uniform Security Policies

Define application servers where specific security templates can be used to manage security settings and consider managing them through Group Policy.

Setting Uniform Security Policies

Apply appropriate security templates for systems that upgrade from Windows NT 4.0 instead of a clean install.

Security Templates

Use security templates as a means of describing the level of security you intend to implement for different classes of computers.

Security Templates

Develop a test plan to verify your common business applications run correctly under properly configured secure systems.

Deploying Secure Applications

Define what additional applications are needed that provide enhanced security features to meet your organization security objectives.

Deploying Secure Applications

State the levels of security you require for downloaded code.

Authenticode and Software Signing

Deploy internal procedures for implementing code signing for all in-house developed software that is publicly distributed.

Authenticode and Software Signing

State your policies for securing the Administrator account and the administration consoles.

Managing Administration

Identify the situations where you plan to delegate administrator control for specific tasks.

Delegation

Identify your policies regarding auditing, including staffing.

Auditing