Table of Contents
Intended Audience ...............................................................................................................1-1
How to Use this Guide .........................................................................................................1-1
Product Detail ......................................................................................................................1-1
System Architecture .............................................................................................................1-1
Related Documents ............................................................................................................1-3
Mitigation Steps..............................................................................................................2-1
Mitigation Steps..............................................................................................................2-1
Mitigation Steps..............................................................................................................2-2
Forming a Security Team.....................................................................................................3-1
Creating a Mitigation Plan ....................................................................................................3-2
External Storage ..................................................................................................................4-1
Disaster Recover Testing.....................................................................................................4-1
Third Party Applications .......................................................................................................6-1
iii