Previous Topic: Security Implementation is OngoingNext Topic: Formulating a Security Policy


Remaining Chapters

The following chapters detail the steps required to successfully implement CA Top Secret. Although it is not necessary to follow these steps in order, it is recommended that each step be detailed somewhere in your implementation plan, and that you allot the appropriate time allowance for completion. You may find that some steps can be addressed concurrently in your installation while others must be single-threaded. You can choose the most appropriate order for your installation after you have reviewed the material in this guide.