22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.2 Infrastructure security requirements<br />

The security needs of any business are traditionally based on risk assessment<br />

and management. How risks are managed is a business decision based on the<br />

business’s assessment of the risks involved in not providing various security<br />

measures as compared to the benefit achieved by those measures. The key<br />

point being made is that you must use multiple measures, or what we also refer<br />

to as “layers of defense.”<br />

The factors that influence the choice of a particular security architecture depend<br />

mainly on the type of application the business is building and the business value<br />

of the transactions and data that the application will support, weighed against the<br />

cost of the security measures.<br />

The security requirements for a business generally include:<br />

► Access control<br />

► Flow control<br />

► Audit control<br />

► Credential management<br />

► Integrity<br />

In the overall scheme of things, access control must be provided end-to-end in<br />

order to support required confidentiality. The general security requirements of an<br />

infrastructure, as well as a “best practices” infrastructure, are expected to provide<br />

both data confidentiality and data integrity.<br />

3.2.1 Data confidentiality assurance<br />

In this section, we describe the following methods for providing data<br />

confidentiality:<br />

► Encrypt confidential and sensitive information where required.<br />

► Facilitate both physical and logical server and network separation wherever<br />

possible.<br />

► Reduce exposure to network sniffing.<br />

► Identify appropriate parties authorized to access and update content.<br />

► Provide protection to back-end application and Web servers using network<br />

proxy layers.<br />

► Protect organizational resources with monitoring utilizing intrusion detection<br />

systems (IDS).<br />

Chapter 3. Secure infrastructure requirements 99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!