[Post from Roger Castillo, AlterPoint CTO] Network Management Evolution: The Beauty of Self-Organizing Systems, Part 3: Qualities of Good Policy Driven Management
“Figuring out the Who, What, When, Where and How requires a good set of rules that everyone can understand and respect. From my experience, I’d suggest a few guidelines, that if followed, can streamline maintenance, freeing your systems to beautify themselves through learning and self-organization.”
ComputerWorld: 10 ways to protect yourself with ‘pragmatic network security’
“Security Policy: This defines exactly who sees what information on the
enterprise network. The beauty of modern, network-based IT architectures is that all information is potentially available on the network. The problem is that all information, including information regulated by Sarbanes-Oxley and other regulations, is potentially available to anyone who can get on the network.”
ComputerWorld: Best Practices for Configuring Group Policy Objects
“Although group policies are an extremely powerful security mechanism, it can be a bit tricky to deploy them in an effective manner. That’s because the effective group policy is made up of multiple and sometimes contradictory group policy elements that are applied to the user object and/or to the computer that the user is working from.” While more focused on Active Directory, this article has good points you can apply to any policy/rule paradigm.
informit.com: Troubleshooting Cisco Secure ACS on Windows
“For many security administrators, the robust and powerful AAA engine, along with CS ACS’s ability to flexibly integrate with a number of external user databases, makes the CS ACS software the first and sometimes only choice for an AAA server-side solution.”
White paper (reg. required): “There are many areas of concern for senior IT executives these days - choosing which technologies will have the greatest reach into those areas is critical and can give a company competitive advantage through both efficiencies and protection of resources. Network Change and Configuration Management (NCCM) is one such technology - it has the ability to positively impact security, performance, compliance, and availability management as well as workflow, IT governance, service provisioning, and planning.”