Identify
Most often, vendors are proposing security solution in a basket of features. They claim for security suite with unified console and dashboard. It is necessary to assess and identify the baseline security in business requirements what are the necessary protection. Otherwise, it will cost more, and more to manage in terms of support, maintenance, skillset, user experience.
Some guiding questions are to facilitate the decision. The answers are situation and organization specific. Taking remote access as an illustration here.
Who are the users accessing the infrastructure or system:
From own organization?From business partners (vendor or contractor)?General public?
When is this service needed? This will decide:
Resilence arrangementMaintenance windowBusiness continuityDisaster recoveryRecovey Time ObjectiveService level pledge
What service needed after connection established
Infrastructure (e.g. storage, email, intranet)?Business applications?
Where do users access
Within organization network (due to network segmentation)From business partners networkInternetOrganization device or any device?
Why this remote access is needed
This is the business justification, for exampleSpeedy vendor support without traveling to siteEnhancing productivity especially in COVID-19 to keep physical distance
How...