I. IntroductionII. Infrastructure Planning and Management Is All about Protection, Where the Rubber Meets the RoadA. Identity Management, Authentication, and Access Control1. Always Be Aware of Who Has Access to Which System, for Which Period of Time, and from Where the Access Is Granted2. Establish, Maintain, and Audit an Active Control List and Process for Who Can Physically Gain Access to Systems3. Establish Policies, Procedures, and Controls for Who Has Remote Access to Systems4. Make Sure That Users Have the Least Authority Possible to Perform Their Jobs and Ensure That at Least Two Individuals Are Responsible for a Task5. Implement Network Security Controls on All Internal Communications, Denying Communications among Various Segments Where NecessaryA Word about Firewalls6. Associate Activities with a Real Person or a Single Specific Entity7. Use Single– or Multi–Factor Authentication Based on the Risk Involved in the InteractionIII. Awareness and TrainingA. Make Sure That Privileged Users and Security Personnel Understand Their Roles and ResponsibilitiesIV. Data SecurityA. Protect the Integrity of Active and Archived DatabasesB. Protect the Confidentiality and Integrity of Corporate Data Once It Leaves Internal NetworksC. Assure That Information Can Only Be Accessed by Those Authorized to Do So and Protect Hardware and Storage MediaD. Keep Your Development and Testing Environments Separate from Your Production EnvironmentE. Implement Checking Mechanisms to Verify Hardware IntegrityV. Information Protection Processes and ProceduresA. Create a Baseline of IT and OT SystemsB. Manage System Configuration Changes in a Careful, Methodical WayA Word about Patch ManagementC. Perform Frequent Backups and Test Your Backup Systems OftenD. Create a Plan That Focuses on Ensuring That Assets and Personnel Will Be Able to Continue to Function in the Event of a Crippling Attack or DisasterVI. MaintenanceA. Perform Maintenance and Repair of Assets and Log Activities PromptlyB. Develop Criteria for Authorizing, Monitoring, and Controlling All Maintenance and Diagnostic Activities for Third PartiesVII. Protective TechnologyA. Restrict the Use of Certain Types of Media On Your SystemsB. Wherever Possible, Limit Functionality to a Single Function Per Device (Least Functionality)C. Implement Mechanisms to Achieve Resilience on Shared InfrastructureSummaryChapter QuizEssential Reading on Network Management