19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.70 Developing a firewall concept<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

<strong>The</strong> connection of existing sub-networks with global networks, such as the<br />

Internet, leads to a new supply of information. At the same time, the<br />

increasing amount of local networks leads to the situation where all<br />

workstation computers have access to a wide variety of information.<br />

This networking gives rise to new threats, however, as it is not only possible<br />

for information to flow into the network requiring protection from outside, but<br />

also in the other direction. Furthermore, the possibility of remote access, i.e. a<br />

remote computer (e.g. through the Internet) can execute commands in the<br />

local network, poses a threat to the integrity and availability of the local<br />

computers and thus indirectly also to the confidentiality of the local data.<br />

A sub-network requiring protection should thus only be connected to another<br />

network if this is essential. This particularly applies to connections to the<br />

Internet. It should be checked to what extent the network requiring protection<br />

can be divided into parts which cannot be connected, which can be connected<br />

and which can be connected with limitations. It should also be checked<br />

whether a stand-alone system is not sufficient for the connection to the<br />

Internet (see S 5.46 Installing stand-alone systems for Internet usage).<br />

In order to guarantee the security of the network requiring protection, a<br />

suitable firewall must be used. For the firewall to offer effective protection,<br />

the following conditions must be fulfilled. <strong>The</strong> fire wall must be:<br />

- based on a comprehensive security policy<br />

- incorporated into the <strong>IT</strong> security concept of the organisation<br />

- installed correctly and<br />

- administered correctly.<br />

<strong>The</strong> connection to an external network can only take place when it has been<br />

checked that all risks can be handled by the firewall concept and the personnel<br />

and organisational conditions.<br />

<strong>The</strong>re are several ways to implement a firewall. In order to determine which<br />

firewall concept is most suitable for the intended uses, it must first be clarified<br />

which security objectives are to be fulfilled by the firewall. Examples of<br />

security objectives are:<br />

- <strong>Protection</strong> of the internal network against unauthorised remote access,<br />

- <strong>Protection</strong> of the firewall against attacks from the external network, but<br />

also against manipulation from the internal network,<br />

- <strong>Protection</strong> of the locally transmitted and stored data against attacks on their<br />

confidentiality or integrity,<br />

- <strong>Protection</strong> of local network components against attacks on their availability<br />

(this particularly applies to information servers which provide information<br />

from the internal area for general use),<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!