Previous Topic: How the Commit Process WorksNext Topic: Phase 1: Customize Security Management Options


How Security Management Is Implemented

The implementation of a security policy for a server is the result of planning, implementing, testing, evaluating, and adjusting. Understanding the implementation process, including why specific procedures are performed in a particular order, is critical to the success of your Security Management solution.

Security Management is implemented in the following phases:

This chapter provides detailed information and points you to procedures that allow you to accomplish each of the phases of implementation.