Security Management – Good Practice
reporting procedure for security events
- e.g. break-ins
- abuse email address for customers to report complaints (abuse@your-isp.net)
control internal and external gateways
- control firewalls (external and internal)
security log management
- centralized logging host
- Stealth logger, so it cannot be compromised