22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

astion (sacrificial) host. But now we are seeing business demand for additional<br />

services such as instant messaging, virtual meetings, collaborative workgroup<br />

Web spaces, extranet and intranet portals, remote employee access, and the list<br />

seems to keep growing. The three zone model with the DMZ as the middle limits<br />

the flexibility we need to improve the levels of defense required by a diverse<br />

number of services.<br />

4.2.2 The four zone model<br />

Moving forward, we define a zone in the simplest sense as a network segment or<br />

subnet where all devices located in the same zone can connect to each other<br />

without network or application-level filtering. Subnets provide a reliable method<br />

of separating resources because the connections between subnets can be<br />

controlled and regulated by the devices that are used to interconnect them.<br />

By grouping our resources into security zones, we can keep resources with<br />

similar security-related characteristics together. Another way to define a security<br />

zone is: “a logical grouping of systems, networks or processes that have similar<br />

levels of acceptable risk.” We also want to separate resources with different<br />

security characteristics to limit an intruder’s potential areas of access or<br />

influence. We call this model a multi-zone architecture.<br />

The criteria used to group and separate resources vary by factors such as the<br />

size of the organization, the number of different resources, geography, types of<br />

data and their different levels of classification or sensitivity, and of course the<br />

cost involved to build the infrastructure. In addition to dividing or segmenting the<br />

network, we may need to utilize dedicated servers for specific functions in order<br />

to provide the maximum level of separation. In this section we discuss methods<br />

to segment networks and provide recommendations regarding the separation of<br />

certain key services.<br />

Chapter 4. Security components and layers 137

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!