HP ProCurve Threat Management Solution Implementation Guide 2009-05
1-2
Introduction
Using This Guide
Using This Guide
The security management design outlined in the Threat Management Solution Design Guide
includes a series of design steps (see Chapter 4: “Design” in that guide). Because security
management is more of a process than a steady state, the design steps are actually an iterative
cycle. This Implementation Guide gives you the step-by-step procedures for the activities in
that cycle.
Both guides are based on the security management life cycle shown Figure 1-1.
Figure 1-1. Security Management Life Cycle
For each step in the security management life cycle, this guide lists the activities you may need
to perform and details of the tasks in each activity.