ABSTRACT

Network entities that exist beyond the connes of an owned computing center or private cloud are often used in providing a connected network. ese entities are mostly out of an enterprise architect’s control; however, there are some principles and concerns that should be accommodated for security. e communication path contains an almost incomprehensible array of entities. As networks have grown, so have niche markets for specic functionality. Although not all of these are contained in all networks, many will be in between your users and the applications as part of the connectivity process from outside the network. In most cases, your

computing environment has little or no control because the network entities belong to another party, adhere to network or de facto standards, and there are few options for the enterprise to secure these entities. Some steps can be taken to mitigate (not preclude) WHAT? Some are reviewed in this chapter and others are covered in detail in Chapter 20.