HP ProCurve Threat Management Solution Design Guide 2009-04
2-17
Concepts
The Security Management Life Cycle
Event Analysis
NIM can provide reports on the location and frequency of threat events on your network,
identity of persistent offenders, actions taken to protect the network, and similar information.
You can use these reports for a variety of purposes:
■ Network policy refinement—With additional knowledge about the types and seriousness
of threats against your network, you can tune your network policies to provide more
effective protection.
■ Regulatory compliance and business process improvement—Information about network
security activity can be useful beyond the bounds of network management. You may need
some of this information for regulatory compliance reporting. Similarly, network activity
reports may help you improve general business processes.
Some major business and security regulations are listed below:
• United States
– Sarbanes-Oxley (SOX) Act of 2002
– Health Insurance Portability and Accountability Act (HIPAA)
– Gramm-Leach-Bliley Act (GLBA)
– Federal Information Security Management Act of 2002 (FISMA)
– Payment Card Industry Data Security Standard (PCI DSS)
•Canada
– Personal Information Protection and Electronic Documents Act (PIPEDA)
• United Kingdom
– Data Protection Act of 1998
•Australia
– Private Sector Provisions of the Privacy Act 1988 (Cth)
•France
– Law 78-17 (revised)
•Germany
– Bundesdatenschutzgesetz (Federal Data Protection Act)
• Japan
– Personal Information Protection Law
NIM currently provides the following security reports:
■ Security History Report
■ Password Policy Compliance Report
■ Current Credentials Report
■ Port Access Security Report
■ Device Access Security Report