22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

term has been used less frequently of late. The application protocols typically<br />

supported are HTTP, FTP, and telnet, but can include virtually any TCP/IP<br />

protocol. Proxy systems are usually transparent to the end-user. We delve into<br />

the characteristics of firewalls and proxies and the specific functions performed<br />

by proxies in later chapters. The key point you should understand at this stage is<br />

that proxies are an essential component of security best practices.<br />

Not too long ago, security experts regularly used the term “bastion host.” This<br />

term has fallen out of common use in security jargon, probably due to the original<br />

concept of a bastion host serving the role of a “sacrificial host” between the<br />

Internet and the internal network. In the past few years, the functions performed<br />

by the defense layers between the Internet and the internal network have<br />

become more sophisticated. Rather than put a host in an area vulnerable to<br />

attack (and in the worst case, “sacrificed”), the mind set today is to minimize<br />

vulnerability of all infrastructure components as well as avoid storing any data<br />

directly in externally accessible networks. So rather than be willing to sacrifice a<br />

server and potentially the data on it, we employ an architecture that uses<br />

technology and separation methods to remove data from the networks adjacent<br />

to the Internet.<br />

Proxy systems are a valuable tool to provide a high degree of separation of<br />

resources, and provide a bridge to get selected packets from one network to<br />

another. Proxy systems disguise or hide what is on the side opposite from the<br />

end-user’s point of view, which makes reconnaissance by would-be attackers<br />

difficult if not impossible. Unlike a TCP/IP router performing simple network<br />

address translation (NATS), a proxy usually re-writes portions of the application<br />

data headers in addition to network packet header information. If proxy systems<br />

have one general weakness, it is related to performance limitations caused by<br />

the amount of overhead incurred filtering, inspecting, and rewriting data packets<br />

from one network port to another.<br />

Utilize intrusion detection<br />

An intrusion is when a party (or parties) accesses, attempts to access, or<br />

attempts to disrupt a computer resource that they are not authorized to use. The<br />

party involved may be a person or a program, or a combination. The target<br />

computer resource could be a server, an application, database, network link, and<br />

so forth. Intrusion detection systems (IDS) are important security measures<br />

because they can alert you when an attack is in progress (successful or not).<br />

Early detection is an important security consideration because attempted<br />

breaches or attacks commonly begin with a “probing” of the target to look for<br />

possible weaknesses or access opportunities. This probing is usually done by<br />

scanning TCP/IP ports for responsive services in order to identify opportunities<br />

for attacks. Ideally, our intrusion detection methods will detect suspicious activity<br />

during the earliest phases of an attacker’s efforts.<br />

Chapter 3. Secure infrastructure requirements 105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!