HP ProCurve Threat Management Solution Design Guide 2009-04

2-10
Concepts
The Security Management Life Cycle
The Security Management Life Cycle
Threat detection and response form the backbone of the day-to-day security management
operation on your network, but they are only part of the story. Additional management
functions expand the day-to-day operations into a full security management life cycle, as shown
in Figure 2-7.
.
Figure 2-7. Security Management Life Cycle
This life cycle is described in the sections that follow.
Security Policy
To strengthen your network security, you should write a comprehensive security policy for
your company. Part of this policy should include how you will protect your network from
threats. Specifically, what will your HP ProCurve Threat Management Solution include, and
what actions will be taken if a threat is detected?
You can then use PCM+ and NIM to configure individual policies that will enforce these actions.
In practical terms, the policies are just a collection of threats and responses. They are derived
from:
Available choices for events (as modified by situations such as time and location)
Available choices for responses