22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

356 Lotus Security Handbook<br />

and is left inadvertently with services and ports open. Such a system could be<br />

used to mount an attack against other systems in the organization.)<br />

Furthermore, proper security relies on proper documentation. This is the reason<br />

why a proper PSPG (Policies, Standards, Procedures Guideline) document, in<br />

which the details of the baseline configurations are kept, should exist for the<br />

organization.<br />

9.1.2 Protection and prevention tools<br />

Protection tools are one of the major elements that provide a secure buffer<br />

between IT systems and the people who would attack them. These tools include<br />

anti-viral scanners, application filters, firewalls, and other tools.<br />

It’s worth repeating that protection tools only reduce the likelihood of attackers<br />

successfully gaining access to an IT system. Given that there are many ways an<br />

attack can be mounted, you should limit your reliance on these tools and<br />

consider them more like delay tactics than attack prevention.<br />

Firewalls<br />

The details about firewalls, their architecture, and how to best use them is<br />

explained in 4.1, “Infrastructure components” on page 116. In this section we<br />

review some basic firewall concepts.<br />

A firewall is a device that screens incoming network traffic and allows or<br />

disallows the traffic based on a set of rules. Firewalls normally sit at the perimeter<br />

of an organization's network, protecting it from the Internet, extranets, or other<br />

less secure network segments. A firewall can run on UNIX or Windows<br />

(preferably NT-kernel based) or other operating systems with software that<br />

performs packet filtering, which, at a minimum, has been hardened against<br />

attack, and has multiple network cards to connect different network segments.<br />

Firewalls are so commonplace these days that there has been an overreliance<br />

on them, with many system administrators thinking that firewalls provide all the<br />

network security they will need. Worse, some system administrators think they<br />

can take a firewall out of the box, plug it in, never look at it again, and still have it<br />

protect their network.<br />

Firewalls are only as effective as their rule base, their configuration, and the<br />

system administrators monitoring them. Firewalls must be configured with an<br />

appropriate rule set and must be constantly patched to address new emerging<br />

vulnerabilities. As well, they must be monitored to detect suspicious activity.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!