Network Security as a Process
The security process is driven by the security policy. The Security Wheel demonstrates the
four ongoing steps used to continuously improve the security of a network:
■ Secure—Implement the necessary security hardware, management and operational
processes, and secure your system configurations to reduce your network exposure.
■ Monitor—Monitor the network to determine how changes have affected your network
and look for additional threats.
■ Test—Test the current network and system configurations to determine if any
vulnerabilities exist.
■ Improve—Make continuous improvements based on the results of your testing, based on
vulnerabilities noted during the network monitoring, or based on normal component
upgrades and improvements.