Security builder & leader

Network Perimeter Defense Architecture: A Case Study

This paper, written as a case study in 2001, documents a comprehensive architecture for defending network resources of a fictitious company. It illustrates an approach to setting up a strong security perimeter. This document was submitted to SANS GIAC to fulfill GIAC Certified Firewall Analyst (GCFW) certification requirements. This paper is only available in Adobe Acrobat PDF format. You may download it here. The table of contents is listed below for your convenience:

Part 1: Security Architecture

Part 2: Security Policy

Part 3: Audit of the Security Architecture

Part 4: Design Under Fire

About the Author

Lenny Zeltser is a cybersecurity executive with deep technical roots, product management experience, and a business mindset. As CISO at Axonius, he leads the security and IT program, focusing on trust and growth. He is also a Faculty Fellow at SANS Institute and the creator of REMnux, a popular Linux toolkit for malware analysis. Lenny shares his perspectives on security leadership and technology at zeltser.com.

Learn more →