19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Data Transmission Systems Firewall<br />

_________________________________________________________________________________________<br />

<strong>The</strong> firewall should be sited in a separate server room. <strong>The</strong> appropriate measures are described in<br />

Chapter 4.3.2. If no server room is available, the firewall can alternatively be set up in a server cabinet<br />

(see chapter 4.4 Protective Cabinets).<br />

In order to successfully set up a firewall, a series of measures should be taken, including the<br />

conception, purchase and operation of a firewall. <strong>The</strong> steps and measures involved are described<br />

below:<br />

1. Concept of the network coupling using a firewall: (c.f. S 2.70 Developing a Firewall Concept)<br />

-<br />

- Determining the security objectives<br />

- Adapting the network structure<br />

- Basic requirements<br />

2. Security policy of the firewall: (c.f. S 2.71 Determining a Security Policy for a Firewall)<br />

- Selecting the communications requirements<br />

- Selection of Services<br />

(Prior to the selection of services, the chapter S 5.39 Safe use of protocols and services<br />

should be consulted)<br />

- Organisational regulations<br />

3. Procuring the firewall:<br />

- Selecting the type of firewall<br />

(c.f. S 2.72 Demands on a Firewall and S 2.73 Selecting a Suitable Firewall)<br />

- Procurement criteria<br />

(c.f. S 2.74 Selection of a Suitable Packet Filter and S 2.75 Selection of a Suitable<br />

Application Gateway).<br />

4. Implementation of the firewall:<br />

- Establishing and implementation of filter rules (c.f. S 2.76 Selection and Implementation of<br />

Suitable Filter Rules)<br />

- Implementation of the <strong>IT</strong> baseline protection safeguards for firewall computers (see Chapter<br />

6.2)<br />

- Check implementation of the <strong>IT</strong> baseline protection safeguards for the <strong>IT</strong> systems of the<br />

internal network (c.f. Chapter 6.1 6.2 and 6.3, for example)<br />

- Observe the conditions for the correct use of the various protocols and services (c.f. S 5.39<br />

Safe use of protocols and services)<br />

- Inclusion of other components (see S 2.77 Correct Configuration of Other Components)<br />

5. Operating the firewall: (see S 2.78 Correct Operation of a Firewall)<br />

- Regular checks<br />

- Adaptation to changes and tests<br />

- Logging of firewall activities (c.f. S 4.47 Logging of firewall activities)<br />

- Contingency planning for the firewall (see also Chapter 3.3)<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!