I'm at the screaming point now with a couple of groups and figured I should run this by some impartial folks to get their take on it and also see if anybody has any sort of best practice type of ...
Okay, a question for the hive about security philosophies. Let's say I have a DMZ. In this DMZ I have multiple hosts, providing services to the external network and to the internal network as well.