Security Management – Good Practice
 
 
- reporting procedure for security events
- 
- e.g. break-ins
- abuse email address for customers to report complaints (abuse@your-isp.net)
 
- control internal and external gateways
- 
- control firewalls (external and internal)
 
- security log management
- 
- centralized logging host
- Stealth logger, so it cannot be compromised