First a multi-layered security plan
When designing a layered security solution for an IT infrastructure. The more layers or compartments that block or protect private data and intellectual property, the more difficult it is to find and steal. Now the Seven Domains of a Typical IT Infrastructure
The User Domain – Defines the people who access an …show more content…
This will get the most out of availability, ensure data integrity, and maintain confidentiality.
This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.
The WAN Domain – Connects remote locations
A level of security is the IP stateful firewall a security appliance that is used to filter IP packets and block unwanted IP, TCP, and UDP packet types from entering and leaving the network.
Some organizations use the public internet as their WAN infrastructure. While it is cheaper, the internet does not guarantee delivery or security. A security solution for maintaining high WAN service availability is to obtain WAN service availability SLA’s. Deploy redundant internet and WAN connections when 100 percent availability is required.
The Remote Access Domain- connects remote users to the organization’s IT infrastructure. Remote access is critical for staff members who work in the field or from