Building An Information Security Policy, Part 5: Managing Identities
NetworkComputing.com
In my previous blog post in this multi-part series on constructing an information security policy, I reviewed identifiers such as IP addresses and VLAN IDs and their role as security policy match criteria for identifying traffic flows subject to