Skip to Main Content
In this final chapter, we provide an overview of modern network and infrastructure management as a context for the management of deployed security mechanisms. In this review we discuss the need for management mechanisms specific to the management of security at all layers within the Telecommunications Management Network (TMN). We then progress to a discussion of operational security, necessary mechanisms, including forensics, third-party access reviews, and certification. We conclude our treatment of security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. The third aspect of security management considered is that of compliance. Compliance links back to security policies and requirements that must be adhered to by operations and management personnel.