19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.75 Selection of a suitable application gateway<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management, Administrators<br />

An application gateway is a computer which uses the information in the<br />

application layer to filter connections.<br />

This can, for example, be user names in connection with a strong<br />

authentication, special information in the transmitted data (e.g. check for<br />

computer viruses) or information of the application layer. An application<br />

gateway also offers the possibility of creating a unified access to the subnetwork<br />

requiring protection and of concealing this network. <strong>The</strong> filter<br />

processes running on the application gateway are called proxy processes.<br />

In the event that an application gateway is required for a firewall, the<br />

following demands should be made upon purchase:<br />

- All important protocols (such as Telnet, FTP, SMTP, DNS, NNTP, HTTP)<br />

of the application layer must be treated.<br />

- Filtering must be possible for each supported protocol according to all<br />

information stipulated in measure S 2.76 Selection and Implementation of<br />

Suitable Filter Rules. In particular, it must be possible to formulate the<br />

filter rules dependent on the user and to merge several users into one<br />

group.<br />

- Filtering for contents should be supported, so that a central virus scan and<br />

the blockage of active contents is possible (see T 5.23 Computer Viruses).<br />

- When using an application gateway, no changes should be necessary to the<br />

software in the network requiring protection or in the external network.<br />

- <strong>The</strong> entry and control of filter rules must be simple and clear, e.g. by<br />

symbolic service and protocol names.<br />

- <strong>The</strong> programs used must be well documented.<br />

- It must be easy to add new protocols.<br />

- It must be possible to record IP numbers, service, time and date for<br />

established and denied connections, with limitations on certain connections<br />

(e.g. for a special user).<br />

- It must be possible to send all logging information to an external host.<br />

- Special, adjustable events must lead to an immediate warning (e.g.<br />

repeated incorrect authentication attempts).<br />

- Strong authentication methods must be used for user identification.<br />

- <strong>The</strong> application gateway must support virtual private networks.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!