
3-12
Designing Access Controls
Comprehensive Security Policy
The PCU staff also creates a simple diagram of the current network configu-
ration and assigns endpoints and resources to network access zones.
Figure 3-3. Network Infrastructure Divided into Access Zones