Reply to post: Securing the Perimeter

Wanna protect your data center? Take tips from the US Secret Service

Anonymous Coward
Big Brother

Securing the Perimeter

Design it so that there is no inside network, as in everyone is on the outside of the perimeter, requiring a hardware dongle to provide credentials and end-to-end-encryption. All traffic on the inside is provided by embedded end-to-end encrypted channels. Anyone else who attaches to the network see nothing but random bits.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER

Biting the hand that feeds IT © 1998–2020