Chapter 4. The Security Policy
Terms you'll need to understand:
Techniques you'll need to master:
Separating a security implementation into stages
Assigning a task to a stage in the security wheel
Cisco is quite plain in the SAFE Blueprint: “This document presumes that you already have a security policy in place. Cisco Systems does not recommend deploying security technologies without an associated policy.” Everything that follows from this early paragraph in the Blueprint assumes that you are implementing your organization's policy; the Blueprint is about the technologies to do that effectively. To look at the problem another way, the SAFE Blueprint offers the most effective technical means to ...