Chapter 7. Proactive Security Framework

This chapter covers the following topics:

SAVE Versus ITU-T X.805

Identity and Trust

Visibility

Correlation

Instrumentation and Management

Isolation and Virtualization

Policy Enforcement

Visualization Techniques

Many network security frameworks are in the marketplace and most of them have the common goal of providing a methodical and efficient approach to network security. No framework is perfect, you should choose an approach that can help reduce the time, cost, and resources needed to plan and deploy your security strategy. This chapter highlights best practices and benefits of different security frameworks.

A framework can help you establish a view of your entire security landscape, identify ...

Get End-to-End Network Security: Defense-in-Depth now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.