22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4. Security components and<br />

layers<br />

4<br />

Metagroup defines a security architecture as “an orderly and comprehensive<br />

arrangement of security components.” So, what exactly constitutes an orderly<br />

arrangement? While there is no single answer to this question, we present some<br />

guidelines and recommendations in this chapter. Our sample policies and<br />

guidelines are based on best practices within <strong>IBM</strong> and on our experience working<br />

with customers.<br />

This chapter focuses on the technical methods used to support the general<br />

infrastructure security requirements we described in the previous chapter. In the<br />

first part of this chapter, we describe the various types of infrastructure<br />

components and their security functions. (You may already be familiar with the<br />

security components, so for you this will be a high-level review.) Next we discuss<br />

infrastructure design from a component placement and data flow standpoint. We<br />

describe a secure architecture model for providing security by utilizing multiple<br />

network zones with data flow boundaries, policies, and controls. And last, we<br />

describe a comprehensive top-to-bottom sequence of technologies and methods<br />

to provide a high degree of security in a computing environment.<br />

© Copyright <strong>IBM</strong> Corp. 2004. All rights reserved. 115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!