Technical Guide on Network Security

The increase in the use of information technologies, the development of the Internet, and communication networks have given information systems crucial importance in our societies. This increase and development have been accompanied by a resurgence of cyber threats and, therefore, significant investments by organizations to implement security rules and measures to ensure an adequate level of security maturity. Communication networks hold a prominent place in security investments. Indeed, a secure network must be protected against all malicious attacks and should meet the organization's confidentiality, integrity, and availability needs.

In this regard, this document offers recommendations and best practices related to network security based on the state of the art. The objective of this document is to provide recommendations for designing and configuring the network to make it as less vulnerable as possible. Since the security process is not static, this document does not cover all areas of network security. However, risk can be significantly reduced by implementing a secure configuration and improving security functions according to threats and the criticality of the target system.

To report any criminal digital content, including threats to the security of individuals and groups, praise or incitement of terrorism, and violations of the rights and freedoms of children, please use the following platform : www.e-blagh.ma

DGSSI2024 All rights reserved