9
pdf
keyboard_arrow_up
School
Montgomery College *
*We aren’t endorsed by this school
Course
173
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
3
Uploaded by AgentAlbatross4220
9/13/23, 9:13 PM
TestOut LabSim
https://labsimapp.testout.com/v6_0_571/index.html/productviewer/1187/4.1.3/1d7cf7cd-8090-4aa3-878d-466252820141
1/3
4.1.3 Manageable Network Plan Facts
This lesson covers Manageable Network Plan.
Manageable Network Plan
The Manageable Network Plan is a process created by the National Security Agency (NSA) to
assist in making a network manageable, defensible, and secure. The process identi±es a series
of milestones for creating a manageable network plan, o²ers suggestions, gives crucial security
tips, and provides references.
The milestones to develop a Manageable Network Plan are:
No.
Milestone
Description
1
Prepare to
Document
Prepare to Document means establishing the process you will use to
document your network. A useful document:
Is easy to use
Includes enough detail
Documents the important things
Uses timestamps
Is protected with restricted access and possibly encryption
Has a printed hard copy kept in a secure location
2
Map Your
Network
Map Your Network ensures that you are aware of all the components of the
network and that you know where the physical devices are. The steps are:
Create a map of the network topology.
Create a list of all devices.
Don't forget to include wireless devices.
Use a network scanner and then con±rm manually with a
room-by-room walkthrough.
Identify who is responsible for each device and detail other
information, such as IP address, service tag, and physical
location.
Consider using a database ±le to store the information.
Create a list of all protocols being used on the network by using a
network analyzer. Consider removing unauthorized devices and
protocols from your network.
3
Protect Your
Network
(Network
Architecture)
Protect Your Network (Network Architecture) identi±es the following steps to
protect your network:
Identify and document each user on the network and the information
the user has access to
Identify the high-value network assets
9/13/23, 9:13 PM
TestOut LabSim
https://labsimapp.testout.com/v6_0_571/index.html/productviewer/1187/4.1.3/1d7cf7cd-8090-4aa3-878d-466252820141
2/3
Document the trust boundaries
Identify the choke points on the network
Segregate and isolate networks
Isolate server functions
Physically secure high-value systems
4
Reach Your
Network
(Device
Accessibility)
Reach Your Network (Device Accessibility) helps to ensure that all of the
devices on your network can be easily accessed while still maintaining the
device's security. Accessibility includes physical access as well as remote
access. Important considerations include:
Do not use insecure protocols
Use Windows Group Policies to administer Windows systems
Make sure that remote access connections are secure
Automate administration as much as possible
5
Control Your
Network
(User Access)
Control Your Network (User Access) ensures network security but restricts
user access. It accomplishes the following:
Limits a user to the least privilege required for the user's job
Limits local admins to an absolute minimum
Uses regular user accounts for day-to-day work
Uses role-based access controls
Doesn't let users install software
Sets account expiration dates
Disables or removes accounts when a user leaves the organization
6
Manage Your
Network
Part I
(Patch
Management)
Manage Your Network Part I (Patch Management) establishes an update-
management process for all software on your network.
Patch all systems on a regular schedule
Apply critical patches whenever they are released
Include mobile devices that connect to the network
infrequently
Automate the patching process
Consider using Windows Server Update Services (WSUS)
7
Manage Your
Network
Part II
(Baseline
Management)
Manage Your Network Part II (Baseline Management) provides rules for
establishing a baseline for all systems.
Create an approved application list for each class of device on the
network
Establish the criteria and process for getting an application on the
approved list
Verify apps before adding them to the allowed list
Create device baselines
Secure web browsers
9/13/23, 9:13 PM
TestOut LabSim
https://labsimapp.testout.com/v6_0_571/index.html/productviewer/1187/4.1.3/1d7cf7cd-8090-4aa3-878d-466252820141
3/3
Check baselines for security miscon±gurations.
Consider using the Microsoft Security Compliance Toolkit (SCT).
8
Document Your
Network
Document Your Network is the step in which you create the documentation
for your network.
Processes
Procedures
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry
Association, Inc. All rights reserved.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help