05.07.2015 Views

GLI-19: - Gaming Laboratories International

GLI-19: - Gaming Laboratories International

GLI-19: - Gaming Laboratories International

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>GLI</strong> Standard #<strong>19</strong> – Standards for Interactive <strong>Gaming</strong> Systems (Suppliers) Version 1.0<br />

Final<br />

facility that allows an alternate network path to be established that bypasses the firewall.<br />

Examples of prohibited facilities are:<br />

• An operator PC equipped with a phone modem; and<br />

• An operator PC with a connection to the <strong>Gaming</strong> Platform VLAN and a<br />

connection to the corporate VLAN.<br />

d) The firewall must be a separate hardware device with the following characteristics:<br />

i. Only firewall-related applications may reside on the firewall; and<br />

ii. Only a limited number accounts may be present on the firewall (e.g. <strong>Gaming</strong><br />

Platform administrators only).<br />

e) All data packets addressed to the firewall must be rejected if they arrive on interfaces to<br />

networks which are outside the baseline envelope. This is to restrict access to the firewall<br />

to authorized workstations inside the baseline envelope;<br />

f) The firewall must reject all connections except those that have been specifically approved<br />

by the jurisdiction;<br />

g) The firewall must maintain an audit log of all changes to parameters that affect what<br />

connections are permitted through the firewall;<br />

h) The firewall must maintain an audit log of all successful and unsuccessful connection<br />

attempts through itself;<br />

i) The firewall must disable all communications if the audit log becomes full;<br />

j) The firewall must reject all messages received on an interface if the message purports to<br />

be on a device attached to another interface;<br />

k) Operators must have approved procedures for following reports of security incidents and<br />

for ensuring that firewalls are kept up to date with respect to advisory recommendations<br />

released after such incidents; and<br />

l) Networks on the secure side of the firewall should use RFC<strong>19</strong>18 private network<br />

numbers. These numbers must be translated into public network numbers for<br />

transmission over the Internet.<br />

7.3.13 Web Application Security. The following requirements apply to the security of the<br />

application used in the end player device:<br />

Chapter Seven: Information Systems Security (ISS) Requirements Page 61<br />

Copyright © 2011 <strong>Gaming</strong> <strong>Laboratories</strong> <strong>International</strong>, LLC<br />

All Rights Reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!