3 Planning a Secure Environment

Security guidelines should be in place before the arrival of the system. After arrival, security guidelines should be periodically reviewed and adjusted to stay current with the security requirements of your organization.

Use the information in these sections before and during the installation and configuration of a server and related equipment:

Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.