Exactly. I feel like I am reinventing the wheel here when it is not really
needed. I feel that I will also need to expand my knowledge a bit, to
perform comprehensive monitoring requires knowledge in all areas. I will see
what I can do, thanks for the comments.

On Tue, Mar 1, 2011 at 1:20 PM, Chris Keladis <[email protected]> wrote:

> On Tue, Mar 1, 2011 at 7:10 AM, Michael Lubinski <
> [email protected]> wrote:
>
> Hey Michael,
>
> As it stands many think that security starts with solid policies and
>> procedures. Every good policy and procedure will have a scope. I am in the
>> midst of taking an organization and applying some best practices with some
>> audit requirements. How do you scope a project that is based on best
>> practices and encompasses everything from servers, routers, switches,
>> firewalls, and unused network drops?
>>
>
> Definitely. You can look at implementing ISO-27001 which is exactly this
> (implementing an Information Security Management System or ISMS).
>
> Wikipedia has an overview:
>
> http://en.wikipedia.org/wiki/ISO/IEC_27001
>
> No point re-inventing the wheel :)
>
>
> Cheers,
>
> Chris.
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to