Understand Your Environment
Address key questions about your environment to better understand your security needs.
Which resources need to be protected?
For STA, the host server and the associated network must be protected from unauthorized access.
From whom are the resources being protected?
STA must be protected from everyone on the Internet, external users, and unauthorized internal users. You should ensure that you have intrusion protection and monitoring software.
What will happen if the protection on strategic resources fail?
As STA is a device monitoring and usage application, unauthorized access to STA will only affect STA. The monitored devices and associated data will not be affected.