Understanding the FTRA Environment
When planning your FTRA implementation, consider the following questions:
- Which resources need to be protected?
- You need to protect customer data, such as network routing data.
- You need to protect internal data, such as proprietary source code.
- You need to protect system components from being disabled by external attacks or intentional system overloads.
- Who are you protecting the data from?
For example, is the FTRA application being installed on a stand-alone server or virtual machine with restricted access, or on a server with shared access? The latter presents more open access and potential threats from both the users and other applications.
- What happens if protections on strategic resources fail?
In some cases, a fault in your security scheme is nothing more than an inconvenience. In other cases, a fault might cause great damage to you and your customers. Understanding the security ramifications of each resource will help you protect it properly.