22.3 – Baseline Analysis & Desired State

Perform and document a baseline analysis and evaluate the desired state Well, it is essential to perform and document the current state of security within the organization. Without this phase it is not possible to detect the gaps within the enterprise. It is advisable to have a third party do a security analysis of your systems. There are many organizations who execute this operation including Axent, ISS and definitely the big consulting companies. Axent practices all life cycle security models, which includes what should be in enterprise security and they perform their analysis with this life cycle method. This may…