Throughout this entire phase, CSA does not need to be touched. Because CSA can potentially control almost every action of every host on your network, a good deal of information needs to be discovered and gathered before any agents are deployed.
However, you do need a good working knowledge of the capabilities of CSA and what it does. As you gather this information, think about how you can use it to plan the deployment. Determine which parts of the written Security Policy CSA will enforce. Make a list of past security incidents that CSA could help you avoid. Create an inventory of systems CSA will protect. Most importantly, state your goals using well-defined criteria.
Was this article helpful?