
NMS Security Architecture Considerations & Approaches
The purpose of this article is to provide some practical guidance on securing Network Management systems and associated infrastructure. While it can’t make any guarantees of absolutely protecting from similar attacks in the future, implementing these approaches can make the job of an adversary significantly harder. It will also propose techniques for increasing the probability of detecting breaches, which should be a significant consideration within any security solution.
This article cannot provide exhaustive coverage. However, it will focus on delivering actionable guidance that will have a tangible impact in strengthening the Network Management’s security posture (and potentially other) Systems.

