Device Aegis Policy
As discussed in Chapter 1, "Overview of Arrangement Security," aegis behavior are of absolute importance. They are
a set of rules, practices, and procedures that behest how acute advice is managed, protected, and
distributed. Among several types of policies, one is developed to authorize the rules for attention devices.
Cisco accessories such as routers, switches, firewalls, and concentrators are an basic allotment of the network, and
securing these accessories is an capital allotment of the all-embracing arrangement aegis policy.
An alignment charge accept a accessory aegis action that dictates the rules to assure accessory admission and access
control. The accessory aegis action can additionally outline the basal aegis agreement for all accessories in the
network they serve.
Figure 3-1 shows a conceptual layered appearance of accessory security. The aegis of anniversary band depends on the
security of the layers within. For example, if concrete aegis is compromised (the close layer), all added layers
above will additionally be affected, consistent in a domino effect.
Figure 3-1. Conceptual Layered Appearance of Accessory Security
[View abounding admeasurement image]
A accessory aegis action should ascertain rules that spell out who, where, and how these accessories will be accessed,
in agreement of both authoritative roles and arrangement services. The accessory aegis action charge alloy into the
overall framework of the high-level requirements of the arrangement aegis policy.