Legal Information
PC Knowledge Base - Firewall Testing: Prepare System For Production Use

Good Knowledge Is Good2Use

Create and record cryptographic checksums or other integrity-checking baseline information of your firewall system once you have completed testing. Refer to Detecting Signs of Intrusion, specifically the practice "Identify data that characterise systems and aid in detecting signs of suspicious behaviour."

Make a backup of your operational configuration once you have completed testing. Refer to Securing Desktop Workstations [Simmel 99], specifically the practice ôConfigure computers for file backups.ö

Given the complex nature of networks, their traffic, and firewall systems, ongoing monitoring is the only way to ensure that you have specified the correct security policy and that the policy is being implemented properly. Ensure that you have the necessary policies, procedures, tools, and staff resources in place to monitor your networks and systems including your firewall system.



Search Knowledge Base Feedback
If you like our web site refer a friend.
Your friends name.
Your friends email address.
Your Name
Your Email Address


© Copyright 1998-1999 GOOD2USE