The Security Wheel
The implementation of a security policy typically involves four steps:
Step 1. | Develop the security policy. |
Step 2. | Implement the security products called for by the security policy. |
Step 3. | Inspect the policy periodically. |
Step 4. | Handle incidents as they occur. |
This process does not provide for the continual adaptation of the security policy to changes in the network environment. The Security Wheel concept treats network security as a continuous process that is built around the corporate security policy. This process is divided into four stages:
- Securing the network.
- Monitoring the network.
- Testing the security of the network.
- Improving the security of the network.
Figure 5-1. The Security Wheel

