22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

– The resource does not permit communications or access to (or through)<br />

the resource by any external entity (that is, routing to an Intranet zone<br />

system).<br />

– The resource may store and process classified information in accordance<br />

with the organization’s security standards.<br />

– Access to resources on a Data Access zone must require strong<br />

authentication of any entity requiring access to the resource or data<br />

storage.<br />

4. Intranet zone<br />

This is the internal IP network. All internally reachable servers and workstations<br />

are in this zone. Characteristics of resources in the Intranet zone are:<br />

– The resource’s IP address is within the internal IP address ranges<br />

assigned to the organization and the resource’s Domain Name is only<br />

contained in the internal domain reserved for internal use only.<br />

– The resource is protected from foreign networks and systems by a<br />

managed secure perimeter.<br />

– The resource is under the physical control of the organization. Physical<br />

control requires the resource to be located at an organization facility, a<br />

facility operated by a subsidiary, or a facility operated by a trusted<br />

outsourced operation provider.<br />

– The resource must be administered and operated by organization<br />

employees, subsidiary employees, or the organization’s approved I/T<br />

provider.<br />

– The resource must be in compliance with applicable organizational<br />

security policies.<br />

– The resource does not permit communications or access to (or through)<br />

the resource by any non-organization entity unless designated as an<br />

infrastructure component (for example, routing to an external entity).<br />

Note that we have four types of zones, not necessarily just four actual zones. For<br />

example, we could have multiple Proxy zones in order to separate different<br />

externally reachable services. We might include a special, dedicated Proxy zone<br />

just for administrative access. We can also have multiple intranet zones to isolate<br />

critical business systems such as financial systems and HR systems. In this<br />

model, we have a key assumption that all servers in zone types 2 through 4 must<br />

be in controlled premises and managed by trusted personnel.<br />

Now that we have defined the four types of zones, our model appears to be<br />

relatively simple, but it is far from complete. We next need to describe the<br />

controls we will use to connect and or isolate systems in different zones.<br />

Chapter 4. Security components and layers 141

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!