Planning Task List for Distributed Security
To develop your network security deployment plan, complete the tasks listed in Table 11.4.
Table 11.4 Security Planning Task List
Task |
Location in Chapter |
---|---|
Identify the security risks that apply to your network. Tabulate and explain them in the plan. |
Security Risks |
Provide background material on security concepts and vocabulary to orient the reader of your plan. |
Security Concepts |
Introduce and explain the security strategies that address the risks in your plan. |
Distributed Security Strategies |
Ensure that all access to network resources requires authentication using domain accounts. |
Authenticating All User Access |
Determine what part of the user community needs to use strong authentication for interactive or remote access login. |
Authenticating All User Access |
Define the password length, change interval, and complexity requirements for domain user accounts and develop a plan to communicate these requirements to the user community. |
Authenticating All User Access |
Define your organization policy to eliminate transmission of clear text passwords on any network and develop a strategy to enable single sign on or protect password transmission. |
Authenticating All User Access |
Identify a plan to deploy public key security for smart card logon if strong authentication meets your security objectives. |
Smart Card Logon |
Describe your policy for enabling remote access for users. |
Remote Access |
Develop a plan to communicate remote access procedures, including connection methods, to general user community. |
Remote Access |
Identify how your organization currently uses groups and establish conventions for group names and how group types are used. |
Applying Access Control |
Describe the top-level security groups you intend to use for broad security access to enterprise-wide resources. These are likely to be your enterprise universal groups. |
Applying Access Control |
Describe your access control policies with specific reference to how security groups are used in a consistent manner. |
Applying Access Control |
Define the procedures for creating new groups and who has responsibility to manage group membership. |
Applying Access Control |
Determine which existing domains belong in the forest, and which domains use external trust relationships. |
Establishing Trust Relationships |
Describe your domains, domain trees, and forests, and explicitly state the trust relationships among them. |
Establishing Trust Relationships |
Define a policy for identifying and managing sensitive or confidential information and your requirements to protect sensitive data. |
Enabling Data Protection |
Identify network data servers that provide sensitive data that might require network data protection to prevent eavesdropping. |
Enabling Data Protection |
Develop a deployment plan for using IPSec for protection data for remote access or for accessing sensitive application data servers. |
Enabling Data Protection |
If using EFS, describe your Data Recovery Policy, including the role of Recovery Agent in your organization. |
Encrypting File System |
If using EFS, describe the procedures you plan to use to implement data recovery process and verify that the process works for your organization. |
Encrypting File System |
If using IPSec, identify the scenarios for how it will be used in your network and understand the performance implications. |
IP Security |
Define domain-wide account policies and communicate those policies and guidelines to the user community. |
Setting Uniform Security Policies |
Determine the local security policy requirements for different categories of systems on the network, such as desktops, file and print servers, e-mail servers. Define the Group Policy security settings appropriate to each category. |
Setting Uniform Security Policies |
Define application servers where specific security templates can be used to manage security settings and consider managing them through Group Policy. |
Setting Uniform Security Policies |
Apply appropriate security templates for systems that upgrade from Windows NT 4.0 instead of a clean install. |
Security Templates |
Use security templates as a means of describing the level of security you intend to implement for different classes of computers. |
Security Templates |
Develop a test plan to verify your common business applications run correctly under properly configured secure systems. |
Deploying Secure Applications |
Define what additional applications are needed that provide enhanced security features to meet your organization security objectives. |
Deploying Secure Applications |
State the levels of security you require for downloaded code. |
Authenticode and Software Signing |
Deploy internal procedures for implementing code signing for all in-house developed software that is publicly distributed. |
Authenticode and Software Signing |
State your policies for securing the Administrator account and the administration consoles. |
Managing Administration |
Identify the situations where you plan to delegate administrator control for specific tasks. |
Delegation |
Identify your policies regarding auditing, including staffing. |
Auditing |