Firewall Wizards mailing list archives
Re: Firewall Audit Programme/checklist
From: blast <blast () broder com>
Date: Tue, 17 Mar 1998 10:10:53 -0800 (PST)
I would like to bring another perspective to this thread. A checklist is a tool. Other tools include Fishbone Diagrams, Impact Analysis, Flow Charting, etc.etc. The tools to be used is qualified by the phase of your process. The phase that is being discussed here is the Analyze Phase. A classical tool for the Analyze Phase is the Checklist. As mentioned above, other tools would include Sampling, Fishbone Diagram, Checksheet, Pareto Analysis, etc. After the system has finished the Deploy Phase, you can use tools that help with the Execute Phase like 'Measuring & Monitoring', 'Specification and Control Limits'. The trick is to use the right tool for the phase that you are in. The 4 phases would be: Phase 1: Scope your objectives or problems to this integration. Phase 2: Learn about your Phase 1 output from your data. Phase 3: Engineer your plan based on your Phase 2 output. Phase 4: Implement the plan, monitor, and start process over. Each phase has a set of tools that can be very effective in helping all parties understand dependencies, get people thinking out of the box, and gather data that might have been otherwise invisible or missed. If this thread subject did not have the work 'checklist' in it I would have kept quiet. I just wanted to offer the perspective that a Checklist is a part of a larger process and that the Checklist may not facilitate the particular phase of your process. This "tool and phase" process structure is only effective when it is a common language with all parties involved in the process. If everyone is working with this common language, it can be very powerful. -Tim Keanini %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \ Tim Keanini | "The limits of my language, / / | are the limits of my world." \ \ blast () broder com | --Ludwig Wittgenstein / \ +================================================/ |Key fingerprint = 7B 68 88 41 A8 74 AB EC F0 37 98 4C 37 F7 40 D6 | / PUB KEY: http://www-swiss.ai.mit.edu/~bal/pks-commands.html \ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Current thread:
- Re: NTp config - for the databases :}, (continued)
- Re: NTp config - for the databases :} Bret Watson (Mar 12)
- Re: NTp config - for the databases :} Kees Hendrikse (Mar 13)
- Re: NTp config - for the databases :} Bret Watson (Mar 13)
- Re: NTp config - for the databases :} Joseph S. D. Yao (Mar 13)
- Re: NTp config - for the databases :} John Painter (Mar 14)
- Firewall Audit Programme/checklist Bret Watson (Mar 16)
- Re: Firewall Audit Programme/checklist Marcus J. Ranum (Mar 16)
- Re: Firewall Audit Programme/checklist Chad Schieken (Mar 16)
- Re: Firewall Audit Programme/checklist Bret Watson (Mar 17)
- Re: Firewall Audit Programme/checklist Marcus J. Ranum (Mar 17)
- Re: Firewall Audit Programme/checklist blast (Mar 17)
- Re: Firewall Audit Programme/checklist tqbf (Mar 16)
- Re: Firewall Audit Programme/checklist kant (Mar 16)
- Re: DNS -vs- the firewall: security thoughts Bennett Todd (Mar 12)