[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: survey of isp security practices
Might I observe that a document called "Survey of ISP Security
Practices" isn't necessarily a logical place for functions for which
the architectural models are still under development? Perhaps there
is a place for a new document "Requirements for (new) ISP Security
Practices", but the value of the current one seems to be what people
actually do. If they do things that have problems with scalability,
it still may be relevant to note the technique, its limitations, and
move on.