The Cisco network designer may or may not have a role in creating the corporate security policy. Every organization, regardless of size, should have some form of written security policy and procedures, along with a plan for enforcing that policy and a disaster and recovery plan.
Figure 8.4 – Cisco Security Policy Methodology
When initially developing a security policy, Cisco recommends a methodology that is comprised of the following five steps (illustrated in Figure 8.4 above):
- Risk assessment The content below this message is for members only.