22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3. Secure infrastructure<br />

requirements<br />

3<br />

Doing business on the Internet exposes an organization the possibility of attack,<br />

misuse, and errors that are well beyond those that exist in a non-Internet<br />

computing environment. Even if an organization does not do business on the<br />

Internet, there are ever increasing requirements for organizations to permit<br />

access to their internal IT systems from external networks. Even most small<br />

organizations today have a connection to the Internet to send and receive e-mail.<br />

As organizations move to provide external access to Web-based services, the<br />

security issues increase substantially as the nature of the services expand.<br />

In this chapter we introduce principles of secure infrastructure design. By<br />

“infrastructure,” we mean:<br />

► Network topologies, network components, and server placement<br />

► Data flows (inter-server connections and workstation-server connections)<br />

In the context of the security methodology described in the previous chapter, the<br />

infrastructure design affects all five security functional categories<br />

(Identity/Credential management, Access control, Flow control, Audit, and<br />

Solution Integrity). However, the primary focus of this chapter will be guidelines<br />

for implementing adequate and appropriate flow control and solution integrity<br />

between external networks (the Internet) and internal networks.<br />

© Copyright <strong>IBM</strong> Corp. 2004. All rights reserved. 97

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!