Deployment planning - web reverse proxy
The first step in planning the deployment of an ISAM security environment is to define the security requirements for the computing environment. Defining security requirements means determining the business policies that must apply to users, programs, and data. This definition includes:
- Objects to be secured
- Actions permitted on each object
- Users permitted to perform the actions
Enforcing a security policy requires an understanding of the flow of access requests through the network topology. In the plan, identify correct roles and locations for firewalls, routers, and subnets. Deploying an ISAM security environment also requires identifying the optimal points within the network that evaluates user access requests, and grants or denies the requested access. Implementation of a security policy requires understanding the number of users, quantity of data, and throughput the network must accommodate. Evaluate performance characteristics, scalability, and the need for failover capabilities.
Supplemental product:
Parent topic: Deployment