Network security support
3.3
Employ defense in depth for your network infrastructure
45
UM Security BRS-2A
Release
8.7
05/2022
3.3
Employ defense in depth for your network infrastructure
Defense in creates uses several barriers that a potential attacker has to overcome one after the
other. Hirschmann assumes that, when reading this section, you have already set up a dedicated
plan for defending your system in depth
(see on page 15 “Defense in depth”)
.
From a system view, there are 2 aspects how defense in depth is realized — that is, how they
translate into specific device setups:
Measures to secure the device itself, and in turn to secure the network. These measures are
described in the chapter "Device security"
(see on page 28 “Security configuration”)
.
Measures to secure the network by using specific device functions. These measures are
described in the remainder of this main chapter.
The suggested measures for defense in depth are collected in the chapter
(see on page 47
“Measures to secure the network infrastructure”)
. Pick the measures suitable for defense in depth
first. Then complement them by selecting from the remaining hardening possibilities.
Summary of Contents for HIRSCHMANN HiOS-2A
Page 6: ...Contents 6 UM Security BRS 2A Release 8 7 05 2022 ...
Page 8: ...Document History 8 UM Security BRS 2A Release 8 7 05 2022 ...
Page 10: ...Safety instructions 10 UM Security BRS 2A Release 8 7 05 2022 ...
Page 54: ...Network security support 3 11 Configure logging 54 UM Security BRS 2A Release 8 7 05 2022 ...
Page 62: ...Index 62 UM Security BRS 2A Release 8 7 05 2022 ...
Page 66: ......