Introduction
Security Management Approach
Defense-in-depth.
- end-host defense mechanisms (e.g. host firewall)
- host configuration discovery and management
- ubiquitous network monitoring and policy enforcement
Investigative tools and evidence collection.