ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    question on security form

    IT Discussion
    6
    7
    757
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Mike DavisM
      Mike Davis
      last edited by

      I'm filling out a form for a government agency and it has the question below. Does this look like VLANS? I'm trying to figure out what they are looking for.

      CONTROL#12 - BOUNDARY DEFENSE
      Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

      scottalanmillerS KellyK 2 Replies Last reply Reply Quote 0
      • dbeatoD
        dbeato
        last edited by

        @mike-davis said in question on security form:

        CONTROL#12 - BOUNDARY DEFENSE
        Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

        Looking for IDS, DMZ limit, VLANs, NCLs and so forth. FIrewall and Intrusion Prevention systems.
        Based on
        https://resources.trendmicro.com/rs/945-CXD-062/images/sans_top20_csc_trendmicro2016.pdf

        1 Reply Last reply Reply Quote 1
        • DashrenderD
          Dashrender
          last edited by

          Yeah, I wouldn't say it's limited to VLANs, but it's about limiting data access from one network to the next.

          1 Reply Last reply Reply Quote 2
          • scottalanmillerS
            scottalanmiller @Mike Davis
            last edited by

            @mike-davis said in question on security form:

            I'm filling out a form for a government agency and it has the question below. Does this look like VLANS? I'm trying to figure out what they are looking for.

            CONTROL#12 - BOUNDARY DEFENSE
            Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

            This is what happens when "IT Buyers" try to write technical docs.

            This means nothing, nothing at all. This is monkies throwing words at a page. You can use VLANs to meet the requirements of the words, and that's likely the best course of action. Just be aware that there is no intent behind them, no intelligence strung this gibberish together, it's just BS to convince someone higher up that they could write words on paper.

            momurdaM 1 Reply Last reply Reply Quote 3
            • momurdaM
              momurda @scottalanmiller
              last edited by

              @scottalanmiller said in question on security form:

              @mike-davis said in question on security form:

              I'm filling out a form for a government agency and it has the question below. Does this look like VLANS? I'm trying to figure out what they are looking for.

              CONTROL#12 - BOUNDARY DEFENSE
              Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

              This is what happens when "IT Buyers" try to write technical docs.

              This means nothing, nothing at all. This is monkies throwing words at a page. You can use VLANs to meet the requirements of the words, and that's likely the best course of action. Just be aware that there is no intent behind them, no intelligence strung this gibberish together, it's just BS to convince someone higher up that they could write words on paper.

              This is what I thought when I read that requirement. Just total gibberish words thrown down on paper. But Red Tape is Red Tape. G-man managers gotta eat to, apparently.

              scottalanmillerS 1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @momurda
                last edited by

                @momurda said in question on security form:

                @scottalanmiller said in question on security form:

                @mike-davis said in question on security form:

                I'm filling out a form for a government agency and it has the question below. Does this look like VLANS? I'm trying to figure out what they are looking for.

                CONTROL#12 - BOUNDARY DEFENSE
                Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

                This is what happens when "IT Buyers" try to write technical docs.

                This means nothing, nothing at all. This is monkies throwing words at a page. You can use VLANs to meet the requirements of the words, and that's likely the best course of action. Just be aware that there is no intent behind them, no intelligence strung this gibberish together, it's just BS to convince someone higher up that they could write words on paper.

                This is what I thought when I read that requirement. Just total gibberish words thrown down on paper. But Red Tape is Red Tape. G-man managers gotta eat to, apparently.

                Exactly, he needs to follow it, but needs to understand that there is no rhyme or reason.

                1 Reply Last reply Reply Quote 1
                • KellyK
                  Kelly @Mike Davis
                  last edited by Kelly

                  @mike-davis said in question on security form:

                  I'm filling out a form for a government agency and it has the question below. Does this look like VLANS? I'm trying to figure out what they are looking for.

                  CONTROL#12 - BOUNDARY DEFENSE
                  Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

                  Most government security controls are based on NIST Special Publication 800-53 (http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf). There is some guidance within that document itself to define what they're referring to with the control.

                  1 Reply Last reply Reply Quote 2
                  • 1 / 1
                  • First post
                    Last post