22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.2.3 Zone boundaries<br />

142 Lotus Security Handbook<br />

Security zones should be separated with zone boundaries. Before we can identify<br />

the specific boundary functions needed, we describe the general objectives and<br />

principles of a zone boundary. The functions of the zone boundary are to:<br />

► Protect the organization’s data and resources from tampering, misuse, and<br />

theft<br />

► Provide logical and physical separation of server and network resources in<br />

the environment<br />

► Deny all traffic, by default, except that which is specifically required to<br />

facilitate application enablement for business needs<br />

► Reduce exposure of information that indicates the structure of the<br />

architecture itself, including the hiding or obfuscation of back-end server<br />

resources and networks<br />

► Log boundary ingress and egress activity and attempt to identify suspicious<br />

data traffic patterns where possible<br />

Zone boundaries, from a network design point of view, consist of firewalls. Recall<br />

the literal definition of a firewall as a physical barrier to prevent the spread of fire?<br />

We will apply this metaphor to using network firewalls to block or limit an<br />

intruder’s ability to “spread” influence across zones. Also recall that there are<br />

several different types of firewalls. We will define firewalls placed throughout the<br />

architecture in terms of what functions are needed at that particular boundary.<br />

For example, a router that has IP filtering enabled is technically a firewall, at least<br />

in the strictest sense of the definition. Granted, this is a very low-level type of<br />

firewall. But perhaps we need both IP filtering and application-level proxy<br />

functions. To build this type of firewall, we might need two devices back-to-back.<br />

The point is, we cannot simply draw a firewall as a cute cartoon of a brick wall<br />

and provide any real meaning in our network diagrams. We have to indicate the<br />

functions that are performed at the boundary, then the physical manifestation will<br />

be dictated by the functions and the products available that provide the functions<br />

and performance we require. As you document your environment with diagrams,<br />

be prepared to explode any logical firewalls and clouds into the underlying<br />

detailed network and components. Just keep in mind that a zone boundary can<br />

begin to appear as a zone itself when the number of defenses employed grows.<br />

The zone boundaries can become quite non-trivial.<br />

One of the principles stated previously is that by default we should deny all traffic<br />

except that which is necessary. This is considered a “best practice” in IT security,<br />

but it is often a challenge to enforce. The challenge comes from being able to<br />

accurately identify all addresses, ports, and protocols in advance, then configure<br />

the various filters to allow just the things identified. In addition, some protocols

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!