Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Feds Reach Out and Touch IT: Page 8 of 31

Under the guidelines, you must use appropriate logging functions to monitor access to customer information and audit changes to user and data security profiles. And you must review and analyze the information received to detect any improper disclosure or theft of customer information. This can be a lot of data to monitor and review. Storing logs on central servers or using a central logging facility can help.

This is only the beginning. An effective security program goes beyond workstations and customer information systems to safeguard the network.

IDSs and IPSs (intrusion-prevention systems) are becoming common in large enterprises, and though systems such as Enterasys Dragon and Cisco Secure IDS may be overkill for you, this is an area to watch. At a minimum, if your institution has an Internet connection and you provide remote access to customers, employees and partners, a firewall and/or a secure VPN become necessary. These intermediate devices serve as the first line of defense. Keep them up-to-date.

Maintain an aggressive stance on vulnerabilities. Monitor security sites like Neohapsis and the SANS/FBI's 20 Most Critical Internet Security Vulnerabilities.

Once your workstations, customer information systems and networks are secure, you will need documentation to comply with the guidelines.