Professional Documents
Culture Documents
Seven Domains of A Typical IT Infrastructure PDF
Seven Domains of A Typical IT Infrastructure PDF
User Domain—This domain refers to actual users whether they are employees, consultants,
contractors, or other third-party users. Any user who accesses and uses the organization’s IT
infrastructure must review and sign an acceptable use policy (AUP) prior to being granted access
to the organization’s IT resources and infrastructure. This set of users must also agree to abide
to the organization defined rules and regulation, as well as operate in deferent level of trust with
the assigned privileges and permissions based on need to know.
Workstation Domain—This domain refers to the end user’s desktop devices such as a
desktop computer, laptop, VoIP telephone, printer, scanner and other end-point device.
Workstation devices typically require security countermeasures such as antivirus, antispyware,
and vulnerability software patch management to maintain the integrity of the device.
LAN Domain—This domain refers to the physical and logical local area network (LAN)
technologies (i.e., 100 Mbps/1000 Mbps switched Ethernet, 802.11-family of wireless LAN
technologies) used to support workstation connectivity to the organization’s network
infrastructure. This domain requires security control such as port security, AAA (Authentication,
Authorization and Accounting), layer 2 protections to protect against MAC Spoofing attacks, ARP
Cache poisoning attacks, DHCP spoofing attacks, etc.
Remote Access Domain—This domain refers to the authorized and authenticated remote
access procedures for users to remotely access the organization’s IT infrastructure, systems, and
data. Remote access solutions typically involve Secure Sockets Layer (SSL) 128-bit encrypted
remote browser access or encrypted virtual private network (VPN) tunnels for secure remote
communications.