Compaq 307560-001 Compaq Enterprise Security Framework - Page 20

TABLE 4: PLATFORM AND LEVEL-SPECIFIC SOLUTIONS, Level A, Level B, Level C, Client/Server Device,

Page 20 highlights

WHITE PAPER (cont.) ... TABLE 4: PLATFORM AND LEVEL-SPECIFIC SOLUTIONS Level A Level B Level C Client/Server Device • Local information privacy- • Robust privacy using basic encryption (selective strong encryption (long key, file, drive). dedicated encryption engine) • Strongest identification: biometric devices coupled with digital certificates • Basic integrity protection (standalone anti-virus software) • Physical security measures • Strong two faction local • Very strong file and drive identification and access control privacy solution, using software protection/encryption (password) and hardware (tokens/smartcards) • Robust access passwords Internal Network • Network operating system • Secure e-mail and Web • Enterprise-wide replication password • Software enabling multiple • Basic ACLs, embedded in robust security services of security services with centralized management network operating system • Centralized access control/authorization with flexible rules and scaleable infrastructure (enabling single sign on) • Standardbased/interoperable public key infrastructure offering which covers key recovery, certificate creation/management, • Auditing/Management tools signatures, and hashing algorhythms External Network • Basic boundary control (firewall) • Access and integrity protection (secure Web server/browser) • VPN abilities (I.D., privacy, • Robust infrastructure integrity) with known enabling VPN abilities partners using public key even with unknown parties technologies (certificate based on interoperable servers) and transmission certificate servers and encryption (firewalls) firewalls • Secure E-commerce application • Accountability software (logging and tracking) • Intrusion detection/investigation tools • Single sign-on across internal and external networks enabled by interoperable access control and authorization servers • Network integrity protection 20

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21

W
HITE
P
APER
(cont.)
20
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
TABLE 4: PLATFORM AND LEVEL-SPECIFIC SOLUTIONS
Level A
Level B
Level C
Client/Server Device
Local information privacy-
basic encryption (selective
file, drive).
Basic integrity protection
(standalone anti-virus
software)
Physical security
measures
Robust access passwords
Robust privacy using
strong encryption (long key,
dedicated encryption engine)
Strong two faction local
identification and access control
solution, using software
(password) and hardware
(tokens/smartcards)
Strongest identification:
biometric devices coupled with
digital certificates
Very strong file and drive
privacy
protection/encryption
Internal Network
Network operating system
password
Basic ACLs, embedded in
network operating system
Secure e-mail and Web
Software enabling multiple
robust security services
Centralized access
control/authorization with
flexible rules and
scaleable infrastructure
(enabling single sign on)
Auditing/Management
tools
Enterprise-wide replication
of security services with
centralized management
Standard-
based/interoperable public
key infrastructure offering
which covers key
recovery, certificate
creation/management,
signatures, and hashing
algorhythms
External Network
Basic boundary control
(firewall)
Access and integrity
protection (secure Web
server/browser)
VPN abilities (I.D., privacy,
integrity) with known
partners using public key
technologies (certificate
servers) and transmission
encryption (firewalls)
Secure E-commerce
application
Accountability software
(logging and tracking)
Intrusion
detection/investigation
tools
Network integrity
protection
Robust infrastructure
enabling VPN abilities
even with unknown parties
based on interoperable
certificate servers and
firewalls
Single sign-on across
internal and external
networks enabled by
interoperable access
control and authorization
servers