Architecture implementation
The security manager should consider the following important factors during the implementation of the security architecture:
- Termination process: An effective employee termination process is one of the most important aspects of the information security process. A terminated employee can misuse their credentials for unauthorized activity. Hence, the termination process should ensure the timely revocation of all access at the time an employee is terminated or otherwise ceases to be employed by the organization.
- Security rules: The security manager should also ensure that rules related to security tools, such as firewalls, IDS, anti-malware software, security information and event management (SIEM), and so on, should be reviewed at periodic intervals. Rules should be simple and easy to implement. However, if too many security rules are implemented, they can become difficult to manage, and there is a chance that a particular rule may conflict...