The document discusses the overall methodology to be adopted in creating a Secure Web Infrastructure. It puts together the best practices alongwith other references to be followed in implementing the same. It tries to cover all broad aspects including strategies like defense in depth using various security controls at network, operating system and application levels. |