19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.78 Secure operation of a Firewall<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management, Administrators<br />

In order to ensure correct operation of a firewall, the adherence to the required<br />

safeguards should be checked on a regular basis. In particular, the<br />

organisational provisions for the operation of the firewall should be regularly /<br />

randomly checked to ensure that these are being adhered to. Regular checks<br />

should be carried out as to whether new accesses have been created bypassing<br />

the firewall.<br />

Regular tests should also be carried out to ensure that all filter rules have been<br />

correctly implemented. It should be ensured that only those services stated in<br />

the security policy are permitted.<br />

In the event that alterations are to be made to the security policy at a later date,<br />

these must be closely monitored and checked for side effects, in particular.<br />

<strong>The</strong> demands placed on packet filters and application gateways when these<br />

were purchased should be implemented. <strong>The</strong>y should be updated regularly and<br />

checked for completeness.<br />

<strong>The</strong> default setting of the filter rules and the configuration of the components<br />

must ensure that all connections not explicitly allowed are blocked. This must<br />

also apply in the event of complete failure of the firewall components.<br />

<strong>The</strong> following should generally apply: "Everything is forbidden unless<br />

explicitly permitted". A user with no entry in an access list, for example, has<br />

no way of using the Internet.<br />

<strong>The</strong> following points should also be observed:<br />

- In order to prevent the eavesdropping of, or alterations to, the<br />

authentication information, the Administrator and Auditor may only<br />

authenticate themselves via a trustworthy path. This can be directly via the<br />

console, for example, an encoded connection or a separate network.<br />

- Integrity tests of the software used must be carried out in regular intervals.<br />

<strong>The</strong> firewall must be switched off in case of errors.<br />

- <strong>The</strong> firewall must be tested for its behaviour in case of a system crash. In<br />

particular, an automatic restart must not be possible and it must be possible<br />

to store the access lists on a write-protected medium. <strong>The</strong> access lists are<br />

the main data for the operation of the firewall and must be specially<br />

secured so that no old or faulty access lists are used when the unit is<br />

restarted as the result of an attack.<br />

In case of failure of the firewall, it must be ensured that during this time no<br />

network connections can be made from, or to, the protected network.<br />

- <strong>The</strong> components used may only contain programs which are required for<br />

the operation of the firewall. <strong>The</strong> use of these programs must be<br />

documented and justified in detail. <strong>The</strong> software for the graphic user<br />

interface, for example, should be removed as well as all superfluous<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!