Discuss WAN configuration and change management
Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
ISSC 471
RESPONSE 1:
1. Discuss LAN-to-WAN traffic and performance monitoring and analysis
According to our textbook, an important part of ensuring proper security is monitoring the traffic that flows through the LAN to WAN domain. Traffic monitoring and analysis is the process of capturing network traffic and examining it to determine how users and applications are using your network. After the traffic is captured, software can be used to analyze it. The goal is to detect problems before they become critical. Your efforts should focus on identifying degrading performance that might affect data availability or traffic that might indicate attack activities.
2. Discuss WAN configuration and change management
According to our textbook, the functionality in the LAN-to-WAN Domain depends on the configuration of the devices in the domain. Each device or software component operates based on configuration settings and rules. Any change to settings or rules changes the way the domain components operate. After you configure the components in the LAN-to-WAN Domain to operate securely, you must prohibit unauthorized changes to the domain configuration. The change-management process must be enforced to ensure only authorized changes are made to any configuration and that you document all changes for later auditing.
Change Management Steps:
- requestor submits a configuration setting or rule change request.
- configuration control board reviews each request and approves/denies it.
- implementers receive approved change requests and make the approved changes.
- security administrators validate the current configuration against the latest authorized baseline.
- security administrators should validate configuration changes in a test environment.
- after applying changes, security administrators should create a new authorized baseline.
- implementers validate the changes made to ensure they satisfy the original request.
3. Discuss remote access domain best practices
- assume threats will occur.