200 likes | 546 Views
Auditing IT Infrastructures for Compliance Chapter 12 Compliance Within the WAN Domain. Learning Objective. Use an appropriate framework to implement ISS compliance within the WAN Domain. Key Concepts. Compliance law requirements and business drivers for the WAN Domain
E N D
Auditing IT Infrastructures for Compliance Chapter 12 Compliance Within the WAN Domain
Learning Objective • Use an appropriate framework to implement ISS compliance within the WAN Domain.
Key Concepts • Compliance law requirements and business drivers for the WAN Domain • Devices and access controls for the WAN Domain and steps to maximize A-I-C • Policies, standards, procedures, and guidelines in the WAN Domain • Vulnerability management in the WAN Domain • Best practices for WAN Domain compliance requirements
Business Drivers and Compliance • Availability of communications • Protecting data privacy • Secure data traveling across an untrusted network • Implementing proper security controls for the WAN Domain
WAN Domain Access Control Lack of control for data traveling across a WAN.
WAN Domain Access Control Protecting WAN traffic using encryption.
Devices, Components, and Access Controls • WAN service provider • Dedicated lines/circuits • MPLS/VPN WAN or Metro Ethernet • WAN Layer 2/Layer 3 Switches • WAN Backup and Redundant Links
Maximizing WAN Domain A-I-C • Requiring WAN service availability SLAs • Requiring WAN recovery and restoration SLAs • Requiring WAN traffic encryption/VPNs
Best Practices for WAN Domain Compliance • Map your proposed WAN architecture, including redundant and backup hardware and connections before establishing WAN service. • Update the network map any time you make physical changes to your network. • Establish multiple WAN connections to avoid any single point of failure. • Use load-balancing techniques on the multiple WAN connections to utilize the bandwidth of both connections.
Best Practices for WAN Domain Compliance (Continued) • Develop a backup and recovery plan for each component in the WAN Domain. • Don’t forget to include configuration settings for network devices in your backup and recovery plans.
Best Practices for WAN Domain Compliance (Continued) • Implement frequent update procedures for all operating systems, applications, and network-device software and firmware in the WAN Domain. • Monitor WAN traffic for performance and traffic for suspicious content.
Summary • Business drivers for LAN-to-WAN and WAN Domains • Devices and access controls • IT-security framework • Vulnerability management • Best practices for LAN-to-WAN and WAN Domains