This question is a bit confusing. What's your firewall? Bastion router/hosts? A proxy server? A combination of router & firewall s/w? Reporting varies based on your firewall solution. Are you asking about a specific package or general?
Yes, it is a very broad question and I was hoping for a broad answer so we could shape our preliminary reporting requirements. Our organization will be installing a Firewall-1 and a MS Proxy Server. I would like to produce meaningful management reports as well as reports that are useful to security analysts.
General then...and I don't mean the following to be a criticism or whatever (I'll include the answers for my current employer as an example, sigh). <br>
<br>
I have to ask the 3 basic questions of security:<br>
<br>
1 - Do you have a Security Policy? (Yes, I believe we do.)<br>
<br>
2 - Have you ever read it? (Nope, don't even know where to find it.)<br>
<br>
3 - Do you understand it? (See last question...ack!)<br>
<br>
<br>
Definition:<br>
<br>
A Security Policy defines how an organization manages, protects, and distributes sensitive information and resources. Security experts agree that a good security policy is essential and that network security is not really possible without one.<br>
<br>
An effective security policy is known by everyone. It should be widely distributed and part of ongoing training. That said, I don't think that my current employer has an effective security policy. In fact, a majority of companies don't... which is why crackers and hackers are so effective at what they do.
Don't feel alone in your quest for security. It seems to be an ever growing problem trying to get management to understand the importance of a good security policy and implementation of that policy. Too many times, I am currently experiencing this at my company, a security policy is written, but that's about as far as it goes. That is until a break in occurs and even then that is usually blown off. <br>
<br>
Until companies start to recognize this importance every employee is at the mercy of hope. Hope that no one hacks in. Hope that no one has figured out how to commit fraud against the company, hope that an employee isn't seeking revenge. But then how can we get management to understand this when the major companies like Microsoft prefer to deny and ignore the security issues with their products rather than warn and repair the problems.<br>
<br>
Check the current issue of Information Security on what to do before even writing your security policies and what to expect as far as implementation.
Thanks danno5 & jfk<br>
<br>
Good advise & I'll check out the Info Security edition. It's a long road from theoretical ("words on paper") to actual working procedures. But, I think we have a good start....thanks for your input.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.