19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.71 Establishing a security policy for a firewall<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

<strong>The</strong> first step in establishing a security policy is to determine which types of<br />

communication with the external network are permitted. When selecting the<br />

communication requirements, the following questions must be answered:<br />

- Which information should the firewall allow out / in?<br />

- Which information should the firewall conceal (e.g. the internal net<br />

structure or the user names)?<br />

- Which authentication procedures should be used within the network<br />

requiring protection or for the firewall (e.g. one-time passwords or chip<br />

cards)?<br />

- Which access possibilites are needed (e.g. only via an Internet service<br />

provider or also via a modem pool)?<br />

- What data throughput is to be expected?<br />

Selection of Services<br />

<strong>The</strong> communication requirements are the basis for determining which services<br />

are permitted in the network requiring protection and which must be<br />

forbidden.<br />

A distinction must be made between those services permitted for the users in<br />

the network requiring protection and those permitted for external users.<br />

If E-mail is to be received, for example, which is generally the minimum<br />

requirement, the firewall must allow the SMTP protocol to pass through. If<br />

files from external <strong>IT</strong> systems are to be collected, FTP must be available.<br />

<strong>The</strong> security policy must clearly state for each service which services are<br />

permitted for which user and/or computer and for which services<br />

confidentiality and/or integrity must be guaranteed. Only services which are<br />

absolutely necessary should be permitted. All other services must be<br />

forbidden. This must be the basic principle: All services for which there are<br />

no explicit rules must be forbidden.<br />

It must be determined whether and which information should be filtered (e.g.<br />

checking for computer viruses).<br />

<strong>The</strong> security policy should be established in such a way that it can meet future<br />

requirements, i.e. it should have a sufficient number of connection<br />

possibilities. Any alteration at a later date must be strictly monitored and<br />

particularly checked for side effects.<br />

Provisions must be made for exceptions, particularly for new services and<br />

short-notice alterations (e.g. for tests).<br />

<strong>The</strong> filters must fulfil certain requirements: the filters using information from<br />

the services of layers three and four of the OSI layer model (IP, ICMP, ARP,<br />

TCP and UDP) and the filter using information from the services of the<br />

application layer (e.g. Telnet, FTP, SMTP, DNS, NNTP, HTTP). An overview<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!