HP ProCurve Threat Management Solution Design Guide 2009-04

4-26
Design
Follow an Iterative Design Process
Figure 4-16. Network Map Window
Plan Refinements to the NIM Policy. Based on the analysis above, update the event list for
your network and plan responses for new events. You may want to change threshold levels for
alerts, and you may want to change responses that have proved ineffective. This is also the
time to plan for changes to the equipment on your network: adding new equipment to gain
needed capabilities (such as an IPS or IDS or adding a switch with remote mirroring capabili-
ties) and moving equipment on your network to get the right capabilities in the right places.
Optionally, Use Reports for Additional Purposes. Some of the reports available from
NIM may be useful for purposes outside your network:
Improvements to general business processes
Regulatory reporting, such as Sarbanes-Oxley and Health Insurance Portability and
Accountability Act submissions
Repeat
The security management life cycle is a continuous improvement cycle. Once you have finished
with step 4, return to step 1 and repeat the process. With time, the number of changes you make
between cycles will decrease to a relatively steady amount.