Threat Mitigation
For the designs in this chapter, it is a good idea for you to spend time mapping the security technologies discussed thus far in the book against the policy requirements and risk analysis from Chapter 2, "Security Policy and Operations Life Cycle." Referring to Table 6-1, you can see how the technologies can map against the relevant attacks. In the designs shown in this chapter, you will see how the deployed technologies mitigate the top threats. This gives you a good start, but the designs should later be tuned based on your own requirements.