18
Developing a security plan
Security policy worksheets
5
What are your network access points?
6
Name of the primary administrator:
7
Use
Table 2-1
to list all persons involved in administering the system.
8
Are organization computer resources accessible by remote dial-in?
9
Are organization computer resources accessible by an internal network?
10
What communications servers (e-mail) are used? (such as SMTP or Microsoft Exchange)
11
What form of authentication will be used for remote access to company resources?
12
Will there be different authentication and group servers?
______________________________________________________________________
______________________________________________________________________
____________________________________
Table 2-1
Administrator names
Name
Phone
Pager
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
_____ Yes
_____ No
_____ Yes
_____ No
______________________________________________________________________
______________________________________________________________________
_____ User name/password
_____ RADIUS Defender
_____ Entrust
_____ RSA SecurID
_____ LDAP
_____ Other
_____ RADIUS
_____ Yes
_____ No
Содержание SGM 1600
Страница 1: ...Symantec Gateway Security 1600 Series v3 0 Installation Guide Supported platforms 1620 1660 ...
Страница 4: ......
Страница 6: ...6 Contents ...
Страница 28: ...28 Developing a security plan Security policy worksheets ...