7

Introduction
Security Management Approach

    Defense-in-depth.

    • end-host defense mechanisms (e.g. host firewall)
    • host configuration discovery and management
    • ubiquitous network monitoring and policy enforcement

    Investigative tools and evidence collection.