Elements and Performance Criteria
- Prepare configuration of security devices
- Conduct a needs analysis and determine organisation’s needs to configure security devices
- Determine devices required for configuration according to organisational requirements
- Determine network and system security requirements
- Obtain and review manufacturing and technical requirements for devices
- Research and document device risk threats and vulnerabilities according to organisational requirements
- Design configuration plan
- Configure security devices
- Isolate devices according to technical specification and configuration plan
- Configure virtual networks according to specifications and plan
- Configure secure site-to-site connectivity and VPN requirements
- Implement required encryption according to specifications and plan
- Implement a DMZ according to specifications and plan
- Test configured devices
- Test configuration capabilities against requirements
- Conduct penetration test and record outcomes according to organisational requirements
- Document and communicate test findings to required personnel and implement any required configuration changes
- Lodge documentation according to organisational policies and procedures