19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- Availability of information from the external network in the internal<br />

network requiring protection (the availability of this information is<br />

secondary to the protection of the local computers and information,<br />

however),<br />

- <strong>Protection</strong> against attacks based on IP spoofing or which abuse the source<br />

routing option, the ICMP protocol, or routing protocol,<br />

- <strong>Protection</strong> against attacks as a result of the leaking of new software<br />

weakness relevant to security. (As it must be considered that the number of<br />

potential attackers using an Internet connection is very high, as is their<br />

expertise, this security objective is of particular importance).<br />

Based on the security objectives, a security policy must be drawn up which<br />

stipulates the tasks of, and requirements placed on, the firewall. This security<br />

policy must be included in the <strong>IT</strong> security strategy of the organisation and thus<br />

agreed with the <strong>IT</strong> management.<br />

<strong>The</strong> firewall security policy is put into effect by the implementation of the<br />

firewall, the selection of suitable hardware components, such as packet filters<br />

and application gateways, and the careful implementation of filter rules.<br />

Note:<br />

Packet filters are <strong>IT</strong> systems with special software which filter the<br />

information of the lower layers of the OSI model and pass on or intercept<br />

packets in accordance with special regulations (see S 2.74 Selection of a<br />

Suitable Packet Filter).<br />

An application gateway is a computer which filters the information of the<br />

application layer and permits or forbids connections in accordance with<br />

special regulations (see S 2.75 Selection of a Suitable Application<br />

Gateway). Whilst packet filters work on layer 3 and 4 of the OSI model,<br />

gateways work on layer 7 and are thus considerably more complex. An<br />

application gateway is generally implemented on an <strong>IT</strong> system which is<br />

used solely for this purpose and whose command set is reduced to a<br />

minimum.<br />

In order for a firewall to offer effective protection of a network against<br />

external attacks, several fundamental factors must be fulfilled:<br />

- All communication between the two networks must be carried out via the<br />

firewall. To achieve this, it must be ensured that the firewall is the only<br />

connection between the two networks. Provisions must be taken so that no<br />

other external connections bypassing the firewall are permitted (see also S<br />

2.77 Secure Configuration of Other Components).<br />

- A firewall must only be used as a protective connection to the internal<br />

network. Only the services required for this purpose must be available on<br />

the firewall, therefore, and no other services must be offered, such as<br />

remote log-in.<br />

- Administrative access to the firewall must only be possible via a secure<br />

route, e.g. via a secure console, an encrypted connection or a separate<br />

network. For the establishment of a secure console, see S 1.32<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!