Mitigating Dependencies

Finally, many pages into the chapter, we get to the part about how to solve the problem. It has taken this long because the concepts we have discussed so far are barely touched on in the vast majority of security literature, which often does not even mention these issues.

One of the most important techniques for mitigating security dependencies today involves isolating computers that do not need to communicate so that they cannot do so. Microsoft calls this Server and Domain Isolation. To build a strategy to do so is best done in a step-wise process:

  1. Define a classification scheme.

  2. Model your network.

  3. Analyze your network model relative to the classification scheme.

  4. Revise the classification scheme as needed and reanalyze.

Get Windows Server® 2008 Security Resource Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.