Understanding the FTRA Environment

When planning your FTRA implementation, consider the following questions:

  • Which resources need to be protected?
    • You need to protect customer data, such as network routing data.
    • You need to protect internal data, such as proprietary source code.
    • You need to protect system components from being disabled by external attacks or intentional system overloads.
  • Who are you protecting the data from?

    For example, is the FTRA application being installed on a stand-alone server or virtual machine with restricted access, or on a server with shared access? The latter presents more open access and potential threats from both the users and other applications.

  • What happens if protections on strategic resources fail?

    In some cases, a fault in your security scheme is nothing more than an inconvenience. In other cases, a fault might cause great damage to you and your customers. Understanding the security ramifications of each resource will help you protect it properly.