Chapter 7. Proactive Security Framework

This chapter covers the following topics:

SAVE Versus ITU-T X.805

Identity and Trust

Visibility

Correlation

Instrumentation and Management

Isolation and Virtualization

Policy Enforcement

Visualization Techniques

Many network security frameworks are in the marketplace and most of them have the common goal of providing a methodical and efficient approach to network security. No framework is perfect, you should choose an approach that can help reduce the time, cost, and resources needed to plan and deploy your security strategy. This chapter highlights best practices and benefits of different security frameworks.

A framework can help you establish a view of your entire security landscape, identify ...

Get End-to-End Network Security: Defense-in-Depth now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.