22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.4 Summary<br />

The updated data is then replicated to the Domino content server (circle 11).<br />

Again, we check our data being accessed to see if we are meeting our security<br />

policies:<br />

1. The administrator uses strong authentication (Notes ID and password) to<br />

access the staging server; however, our Intranet to Data Access policy does<br />

not require this flow to be encrypted. The Domino replication between the<br />

staging server and the content server meets our Data Access to Data Access<br />

policy because the data is not confidential.<br />

Although this may appear to be a somewhat complex example, in fact it has been<br />

greatly simplified. In practice, servers are usually duplicated for redundancy.<br />

Also, we did not show in all cases how an administrator in the Intranet can<br />

access each server in the different zones. One way this is done is by using yet a<br />

fifth type of zone just for administrative access, an “Admin Zone.” And we did not<br />

attempt to depict every possible network connection. In most cases, hosts in the<br />

Proxy zones and Data Access zones are dual-homed, meaning they do, in fact,<br />

have separate network connections to the upper and lower zone boundary<br />

routers and firewalls. Remember, even though they might have physical network<br />

connections, we block all traffic at each boundary by default, except what is<br />

explicitly required and permitted by our policy tables.<br />

In this chapter, we have discussed several topics that comprise security<br />

architecture:<br />

► Infrastructure components<br />

► Using multiple network zones<br />

► Data flow and data access policies<br />

► Analysis of data flows to ensure policy fulfillment<br />

We presented a multi-zone architecture model that is based on four types of<br />

network zones:<br />

1. Internet zone<br />

2. Proxy zone<br />

3. Data access zone<br />

4. Intranet zone<br />

These zones were described in terms of what types of data we recommend<br />

locating in each, as well as the data access requirements. We also presented a<br />

Chapter 4. Security components and layers 163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!