Information Security UNIT-3 Notes
Information Security UNIT-3 Notes
UNIT-III
Syllabus:
Planning for Security: Security policy, Standards and practices, Security blueprint, Security
education, Continuity strategies.
Security Technology: Firewalls and VPNs: Physical design, firewalls, protecting remote
connections.
Objective:
• Define management’s role in the development, maintenance, and enforcement of
information security policy, standards, practices, procedures, and guidelines
• Describe what an information security blueprint is, identify its major components, and
explain how it supports the information security program
Outcome:
Introduction
Organization’s information security effort will succeed only if it operates in
conjunction with the organization’s information security policy. An information
security program begins with policy, standards, and practices, which are the
foundation for the information security architecture and blueprint. The creation and
maintenance of these elements require coordinated planning.
Planning Levels
First organization develops a general strategy and translated it into strategic plans
for each major division or operation. Next step is to translate these plans into tactical
objectives that move toward reaching specific, measurable, achievable, and time-
bound accomplishments. The process of strategic planning seeks to transform broad,
general, sweeping statements into more specific and applied objectives. Strategic
plans are used to create tactical plans, which are in turn used to develop operational
plans.
To execute this broad strategy and to convert general strategy into action, the
executive team (sometimes called the C-level of the organization, as in CEO, COO,
CFO, CIO, and so on) must first define individual responsibilities. The conversion of
goals from one strategic level to the next lower level is perhaps more art than science.
Managers and employees use operational plans to organize the ongoing, day-to-day
performance of tasks.
Planning and the CISO: The first priority of the CISO and the information security
management team is the creation of a strategic plan to accomplish the organization’s
information security objectives.
Security Policy
Definition: A policy is a plan or course of action that conveys instructions from an
organization’s senior management to those who make decisions, take actions, and
perform other duties.
Policies are put in place to support the mission, vision, and strategic planning of an
organization.
An information security policy provides rules for the protection of the information
assets of the organization.
For a policy to be effective and legally enforceable, it must meet the following criteria:
• Dissemination (distribution)
• Review (reading)
• Comprehension (understanding)
• Compliance (agreement)
• Uniform enforcement
The EISP is an executive level document, usually drafted by Chief Information Officer
(CIO) of the organization. This policy is usually two to ten pages long and shapes the
philosophy of security in the IT environment. The EISP usually needs to be modified
only when there is a change in the strategic direction of the organization.
The EISP guides the development, implementation, and management of the security
program.
According to the NIST, EISP typically addresses compliance in the following two areas:
When the EISP has been developed, the CISO forms the security team and initiating
the necessary changes to the information security program.
EISP Elements
Although EISP document may vary from organization to organization, most EISP
documents should include the following elements:
• An overview of the corporate philosophy on security
• Information on the structure of the information security organization and
individuals who fulfill the information security role
• Fully articulated responsibilities for security that are shared by all members of
the organization (employees, contractors, consultants, partners, and visitors)
• Fully articulated responsibilities for security that are unique to each role within
the organization
Component Description
Statement of “What is this policy for?” Provides a framework that helps the
Purpose reader to understand the intent of the document. Can
include text such as the following:
“This
document will:
•Identify the elements of a good security policy
•Explain the need for information security
•Specify the various categories of information security
•Identify the information security responsibilities and
roles
• Identify appropriate levels of security through
standards and guidelines
This document establishes an comprehensive security policy
and direction for the company. Individual departments are
expected to establish standards, guidelines, and operating
procedures that adhere to and reference this policy while
addressing their specific and
individual needs.”
Information Defines information security. For example:
Security Elements “Protecting the confidentiality, integrity, and availability of
information while in processing, transmission, and storage,
through the use of policy, education and training, and
technology…”
This section can also lay out security definitions or
philosophies to clarify the policy.
Need for Provides information on the importance of information
Information security in the organization and the obligation (legal and
Security ethical) to protect critical information, whether regarding
customers, employees, or markets.
Information Defines the organizational structure designed to support
Security information security within the organization. Identifies
Responsibilities categories of individuals with responsibility for information
and Roles security (IT department, management, users) and their
information security responsibilities, including maintenance
of this document.
Reference to Other Lists other standards that influence and are influenced by
Information this policy document, perhaps including relevant laws
Standards and (federal and state) and other policies.
Guidelines
There are a number of approaches for creating and managing ISSPs within an
organization.
Components of ISSP
1 Statement of policy
a. Scope and applicability
b. Definition of technology addressed
c. Responsibilities
2 Authorized access and usage of equipment
a. User access
b. Fair and responsible use
c. Protection of privacy
3 Prohibited usage of equipment
a. Disruptive use or misuse
b. Criminal use
c. Offensive or harassing materials
d. Copyrighted, licensed, or other intellectual property
e. Other restrictions
4 Systems management
a. Management of stored materials
b. Employer monitoring
c. Virus protection
d. Physical security
e. Encryption
5 Violations of policy
a. Procedures for reporting violations
b. Penalties for violations
6 Policy review and modification
a. Scheduled review of policy procedures for modification
b. Legal disclaimers
7 Limitations of liability
a. Statements of liability
b. Other disclaimers as needed
SysSPs can be separated into two general groups, managerial guidance and technical
specifications, or they can be combined into a single policy document.
Managerial Guidance SysSPs
Created by management to guide implementation and configuration of technology as
well as to regulate behavior of people in the organization.
Many security systems, for example firewalls, intrusion detection and prevention
systems (IDPSs), and proxy servers, use specific configuration scripts that represent
the configuration rule policy to determine how the system handles each data element
they process.
Policy Management
Policies are living documents that must be managed. After drafting polices if they are
stored in shelve without implementing them is a loss.
• So, these documents must be properly disseminated (distributed, read,
understood, agreed to, and uniformly applied) and managed.
• Management of policy documents are specified in ISSP.
• Good management practices for policy development and maintenance helps an
organization to withstand in market.
• Special considerations should be made for organizations undergoing mergers,
takeovers and partnerships.
Security Blueprint is the base for the design, selection, and implementation of all
security program elements including policy implementation, ongoing policy
management, risk management programs, education and training programs,
technological controls, and maintenance of the security program.
Security blueprint specifies the tasks and the order in which they are to be
accomplished.
ISO/IEC 27002 “gives recommendations for information security management for use
by those who are responsible for initiating, implementing, or maintaining security in
their organization.
ISO/IEC 27001 provides information on how to implement ISO/IEC 27002 and how
to set up an information security management system (ISMS).
Major steps of information security management system are specified in the below
figure.
ISO/IEC 27001:2005
ISO/IEC 27001 provides implementation details using a Plan-Do-Check-Act cycle
Plan
1 Define the scope of the ISMS
2 Define an ISMS policy
3 Define the approach to risk assessment
4 Identify the risks
5 Assess the risks
6 Identify and evaluate options for the treatment of risk
7 Select control objectives and controls
8 Prepare a statement of applicability (SOA)
Do
9 Formulate a risk treatment plan
10 Implement the risk treatment plan
11 Implement controls
12 Implement training and awareness programs
13 Manage operations
14 Manage resources
15 Implement procedures to detect and respond to security incidents
Check
16 Execute monitoring procedures
17 Undertake regular reviews of ISMS effectiveness
18 Review the level of residual and acceptable risk
19 Conduct internal ISMS audits
20 Undertake regular management review of the ISMS
21 Record actions and events that impact an ISMS
Act
22 Implement identified improvements
23 Take corrective or preventive action
24 Apply lessons learned
25 Communicate results to interested parties
26 Ensure improvements achieve objectives
Many documents available from the Computer Security Resource Center of the
National Institute for Standards and Technology.
The following NIST documents can assist in the design of a security framework:
• It provides best practices and security principles that can direct the security
team in the development of a security blueprint.
• It provides philosophical principles that the security team should integrate into
the entire information security process.
The scope of NIST SP 800-14 is broad. some of the more significant points of NIST
800-14 are
The Guide for Developing Security Plans for Federal Information Systems.
• Baselining and best practices are solid methods for collecting security practices
but can have the drawback of providing less detail for the design and
implementation of all the practices needed by an organization, than would a
complete methodology.
• However, it is possible to gain information by baselining and using best
practices, to piece together the desired outcome of the security process, and
thus work backwards to an effective design.
• The Federal Agency Security Practices Site (fasp.nist.gov) is designed to provide
best practices for public agencies but can be adapted easily to private
institutions. The documents found in this site include specific examples of key
policies and planning documents, implementation strategies for key
technologies, and outlines of hiring documents for key security personnel.
• Professional societies often provide information on best practices for their
members.
Information security program architecture illustrate industry best practices and a few
key security architectural components required to meet an organization’s needs.
Spheres of Security
It is the foundation of the security framework. The spheres of security illustrate how
information is under attack from a variety of sources.
• The sphere of use illustrates the ways in which people access information.
• The sphere of protection illustrates that between each layer of the sphere of
use there must exist a layer of protection.
“Policy and law” and “Education and training” are placed between people and the
information. Controls are also implemented between systems and the information,
between networks and the computer systems, and between the Internet and internal
networks.
This reinforces the concept of defense in depth. A variety of controls can be used to
protect the information.
Levels of Controls
Information security safeguards provide three levels of control:
1. Managerial Controls
Management Controls are security processes that are designed by strategic planners
and implemented by the security administration of the organization.
• Set the direction and scope of the security process
• Provide detailed instructions for its conduct
• Address the design and implementation of the security planning process and
security program management.
• Address risk management and security control reviews.
2. Operational Controls
They are the lower-level planning functions that deal with the operational
functionality of security in the organization, such as disaster recovery and incident
response planning.
• Address personnel security, physical security, and the protection of production
inputs and outputs.
• Guide the development of education, training, and awareness programs for
users, administrators, and management.
• Address hardware and software systems maintenance and the integrity of data.
3. Technical Controls
Tactical and technical implementations of security in the organization.
• These are the components put in place to protect an organization’s information
assets.
• Includes logical access controls such as identification, authentication,
authorization, accountability (including audit trails), cryptography, and the
classification of assets and users.
Defense in Depth
Layered implementation of security is called defense in depth.
Security Perimeter
A security perimeter defines the boundary between the outer limit of an organization’s
security and the beginning of the outside world. It is the level of security that protects
all internal systems from outside threats.
The perimeter does not protect against internal attacks from employee threats or
onsite physical threats.
The security perimeter is an essential element of the overall security framework, and
its implementation details are the core of the security blueprint. The key components
of the security perimeter are firewalls, DMZs, proxy servers, and IDPSs.
Firewalls:
A firewall is a device that selectively discriminates against information flowing into or
out of the organization.
• It is usually a computing device or a specially configured computer that allows
or prevents access to a defined area based on a set of rules.
• Usually placed on the security perimeter, just behind or as part of a gateway
router.
• A firewall can be a single device or a firewall subnet, which consists of multiple
firewalls creating a buffer between the outside and inside networks.
Packet filtering, Stateful packet filtering, Proxy, and Application level are different
types of firewalls.
DMZs:
A buffer against outside attacks is referred as a demilitarized zone (DMZ). The DMZ
is a no-man’s-land between the inside and outside networks.
It is also the place where some organizations place Web servers. These servers provide
access to organizational Web pages, without allowing Web requests to enter the
interior networks.
Proxy Servers:
same information from the true Web server (acting as a proxy for the requestor),
and then responds to the request.
Employee errors are among the top threats to information assets, so it is good to
provide proper education and training to employees.
Organization may outsource the SETSA to local educational institutions if they are
not capable of or willing to undertake them.
Security Training
• Security training provides detailed information and hands-on instruction to
employees to perform their duties securely.
• Management of information security can develop customized in-house training
or outsource the training program.
• Alternatives to formal training programs are industry training conferences and
programs offered through professional agencies such as SANS (www.sans.org),
(ISC) (www.isc2.org), ISSA (www.issa.org), and CSI (www.gocsi.com).
Security Awareness
• One of the least frequently implemented but most beneficial programs is the
security awareness program.
• Designed to keep information security at forefront of users’ minds
• Need not be complicated or expensive.
If program is not actively implemented, employees begin to ‘tune out,’ and the risk
of employee accidents and failures increases.
Continuity strategies
Managers in the IT and information security communities are supposed to provide
strategic planning to ensure the continuous availability of information systems.
So, managers require a contingency plan to react on when a successful attack occurs
from inside or outside, intentional or accidental, human or nonhuman, annoying or
catastrophic.
A disaster recovery (DR) plan addresses the preparation for and recovery from a
disaster, whether natural or man-made.
• The DR plan typically focuses on restoring systems at the original site after
disasters occur, and as such is closely associated with the BC plan.
A business continuity (BC) plan ensures that critical business functions continue if
a catastrophic incident or disaster occurs.
• The BC plan occurs concurrently with the DR plan when the damage is
major or ongoing, requiring more than simple restoration of information and
information resources. The BC plan establishes critical business functions
at an alternate site.
The above figure shows a sample sequence of events and the overlap between when
each plan comes into play.
Disaster recovery activities typically continue even after the organization has resumed
operations at the original site.
Major project work modules performed by the contingency planning project team are
shown in the below figure.
A BIA is an investigation and assessment of the impact that various attacks can have
on the organization.
It begins with the prioritized list of threats and vulnerabilities identified in the risk
management process and adds information about the criticality of the systems
involved and a detailed assessment of the threats and vulnerabilities to which they
are subjects.
The BIA is a crucial component of the initial planning stages, as it provides detailed
scenarios of the potential impact each attack could have on the organization.
The BIA therefore helps to determine what the organization must do to respond to the
attack, minimize the damage from the attack, recover from the effects, and return to
normal operations.
The contingency planning team conducts the BIA in the following stages
1. Threat attack identification and prioritization
2. Business unit analysis
3. Attack success scenario development
4. Potential damage assessment
5. Subordinate plan classification
• Once the threat attack profiles have been developed and the business functions
prioritized, the BIA team must create a series of scenarios depicting the impact
of a successful attack from each threat on each prioritized functional area.
• Attack profiles should include scenarios depicting a typical attack with details
on the method, the indicators, and the broad consequences of the attack.
4. Potential damage assessment
• BIA planning team must estimate the cost of the best, worst, and most likely
cases for each attack success scenarios.
• Identifying what must be done to recover from each possible case.
• Costs include the actions of the response team(s), as they act to recover quickly
and effectively from an incident or disaster, and it didn’t include the cost of
protecting assets.
• The final result of the assessment is referred to as an attack scenario end case.
5. Subordinate plan classification
• Once the potential damage has been assessed, and each scenario and attack
scenario end case has been evaluated, a subordinate plan must be developed
or identified from among the plans already in place.
• These subordinate plans consider the identification of, reaction to, and recovery
from each attack scenario.
In a typical disaster recovery operation, the lives and welfare of the employees are
the most important priority during the attack, as most disasters are fires, floods,
hurricanes, and tornadoes. Please note that there are attacks that are not natural
disasters that fit this category
• Electrical blackouts
• Attacks on service providers that result in a loss of communications to the
organization (either telephone or Internet)
• Massive malicious code attacks that sweep through an organization before
they can be contained.
The bottom line is that each scenario should be classified as a probable incident or
disaster, and then the corresponding actions required to respond to the scenario
should be built into either the IR or DR plan.
1. Checklist
2. Structured walk-through
3. Simulation
4. Parallel test: Individuals act as if an actual incident occurred
5. Full interruption: Realistic test is to react to a mock incident as if it were real
Incident Indicators
There are also several other situations that are definite incident indicators.
5. Violation of law: The law has been broken, and the organization’s information
assets are involved.
The alert message is a scripted description of the incident, contains information for
individual to knows what portion of the IR plan to implement.
Documentation of incident
Incident Containment Strategy: First priority is to stop the incident or contain its
scope or impact.
It depends on the incident and on the amount of damage it causes or may cause. To
contain, determine which information and information systems have been affected
and select the best containment strategy for the systems or networks.
Organization can stop the incident and attempt to recover through number of
strategies:
The ultimate containment option, reserved for only the most drastic of scenarios,
involves a full stop of all computers and network devices in the organization.
Incident Recovery:
Once incident has been contained and control of systems regained, the next stage is
recovery.
• First task is to identify human resources needed
• Full extent of the damage must be assessed.
• Perform computer forensics to determine how the incident occurred and what
happened.
• Organization repairs vulnerabilities, addresses any shortcomings in
safeguards, and restores data and services of the systems
Damage Assessment:
Determination of the scope of the breach of the confidentiality, integrity, and
availability of information and information assets. It may take mere moments, or it
may take days or weeks, depending on the extent of the damage.
Several sources of information can be used to determine the type, scope, and extent
of damage, including system logs, intrusion detection logs, configuration logs.
Recovery Once the extent of the damage has been determined, the recovery process
can begin in earnest. Full recovery from an incident requires that you perform the
following:
1. Identify the vulnerabilities that allowed the incident to occur and spread.
Resolve them.
2. Address the safeguards that failed to stop or limit the incident. Install, replace,
or upgrade them.
3. Evaluate monitoring capabilities (if present). Improve their detection and
reporting methods, or simply install new monitoring capabilities.
4. Restore the data from backups.
5. Restore the services and processes in use.
6. Continuously monitor the system.
7. Restore the confidence of the organization’s communities of interest
Before returning to routine duties, the IR team must conduct an after-action review
(AAR). The after-action review is a detailed examination of the events that occurred
from first detection to final recovery. All key players review their notes and verify that
the IR documentation is accurate and precise.
Backup Media
Although traditional systems were configured to detect incidents and then notify a
human administrator, new systems can respond to the incident threat autonomously,
based on preconfigured options.
The Disaster Recovery Plan provides detailed guidance in the event of a disaster.
• It is organized by the type or nature of the disaster and specifies the recovery
procedures during and after each type of disaster.
• Priorities must be clearly established. The first priority is always the
preservation of human life.
• Roles and responsibilities must be clearly delineated. Ever individual of the DR
team should be aware of his or her expected actions during a disaster.
• Someone must initiate the alert roster and notify key personnel. Those to be
notified may be the fire, police, or medical authorities mentioned earlier.
• Someone must be tasked with the documentation of the disaster.
• If and only if it is possible, attempts must be made to mitigate the impact of the
disaster on the operations of the organization.
Recovery Operations:
• Disaster recovery team should begin the restoration of systems and data to
reestablish full operational capability.
Developing Continuity Programs: Once the incident response and disaster recovery
plans are in place, the organization needs to consider finding temporary facilities to
support the continued viability of the business in the event of a disaster.
• The development of the BC plan is somewhat simpler than that of the IR plan
or DR plan.
• It consists primarily of selecting a continuity strategy and integrating the offsite
data storage and recovery functions into this strategy.
• The first part of business continuity planning is performed when the joint
DR/BC plan is developed.
1. Hot Sites:
Hot site is a fully configured computer facility, with all services, communications
links, and physical plant operations including heating and air conditioning.
2. Warm Sites:
A warm site provides many of the same services and options of the hot site.
• Warm site frequently includes computing equipment and peripherals with
servers but not client workstations.
• Cost is low, requires hours to resume.
3. Cold Sites:
A cold site provides only rudimentary services and facilities. No computer hardware
or peripherals are provided. All communications services must be installed after the
site is occupied.
4. Time-shares: Leased site in conjunction with a business partner or sister
organization.
5. Service Bureaus: A service bureau is an agency that provides a service for a fee.
6. Mutual Agreements: A mutual agreement is a contract between two or more
organizations that specifies how each will assist the other in the event of a disaster.
7. Other Options:
• Rolling mobile site configured in the payload area of a tractor or trailer.
• Rental storage area containing duplicate or second-generation equipment to be
extracted in the event of an emergency
Crisis Management:
The actions taken during and after a disaster are referred to as crisis management.
• It focuses first and foremost on the people involved.
• The disaster recovery team works closely with the crisis management team.
Responsibilities of crisis management team are:
• Supporting personnel and their loved ones during the crisis.
• Determining the event’s impact on normal business operations and, if
necessary, making a disaster declaration
• Keeping the public informed about the event and the actions being taken to
ensure the recovery of personnel and the enterprise
• Communicating with major customers, suppliers, partners, regulatory
agencies, industry organizations, the media, and other interested parties.
Access Control
Access control is the method by which systems determine how to admit a user into a
trusted area of the organization like information systems, restricted areas such as
computer rooms, and the entire physical location.
• Access control is achieved by means of a combination of policies, programs,
and technologies.
• Access controls can be mandatory, nondiscretionary, or discretionary.
• Identification
• Authentication
• Authorization
• Accountability
Firewalls
• Processing mode,
• Generation/Developing
• Structure.
• Packet-filtering firewalls,
• Application gateways,
• Circuit gateways,
• MAC layer firewalls, and
• Hybrids.
In a TCP/IP- based network filtering firewall functions at the IP level and determines
whether to drop a packet (deny) or forward it to the next network connection based
on the rules programmed into the firewall.
Examines every incoming packet header and filter packets based on header
information such as destination address, source address, packet type, and other key
information.
Packet-filtering firewalls scan network data packets based on the rules of the
firewall’s database. If the device finds a packet that matches a restriction, it stops the
packet from traveling from one network to another.
Simple firewall models examine two aspects of the packet header: the destination and
source address. It enforces rules designed to prohibit packets with certain addresses
or partial addresses
Rule: any connection attempt made by an external computer or network device in the
192.168.x.x address range (192.168.0.0–192.168.255.255) is allowed.
There are three subsets of packet-filtering firewalls: static filtering, dynamic filtering,
and stateful inspection.
There are three subsets of packet-filtering firewalls: static filtering, dynamic filtering,
and stateful inspection.
• Static filtering requires filtering rules governing how the firewall decides which
packets are allowed and which are denied are developed and installed.
• Dynamic filtering allows the firewall to react to an emergent event and update
or create rules to deal with the event.
o While static filtering firewalls allow entire sets of one type of packet to
enter in response to authorized requests, the dynamic packet filtering
firewall allows only a particular packet with a particular source,
destination, and port address to enter through the firewall.
• Stateful inspection firewalls, or stateful firewalls, keep track of each network
connection between internal and external systems using a state table, which
tracks the state and context of each packet in the conversation by recording
which station sent what packet and when.
Application Gateways
The application gateway(application-level firewall or application firewall) is installed
on a dedicated computer, separate from the filtering router, but is commonly used in
conjunction with a filtering router.
The application firewall is also known as a proxy server since it runs special software
that acts as a proxy for a service request.
Example of an application-level firewall (or proxy server) is a firewall that blocks all
requests for and responses to requests for Web pages and services from the internal
computers of an organization, and instead makes all such requests and responses go
to intermediate computers (or proxies) in the less protected areas of the organization’s
network.
Application firewalls work at the application layer, they are typically restricted to a
single application (e.g., FTP, Telnet, HTTP, SMTP, and SNMP).
Circuit Gateways:
The circuit gateway firewall operates at the transport layer. Connections are
authorized based on addresses.
Circuit gateway firewalls do not usually look at traffic flowing between one network
and another, but they do prevent direct connections between one network and
another.
MAC layer firewalls are designed to operate at the media access control sublayer of
the data link layer (Layer 2) of the OSI network model.
These firewalls are able to consider specific host computer’s identity as represented
by its MAC or network interface card (NIC) address in its filtering decisions.
Hybrid Firewalls
Hybrid Firewalls Hybrid firewalls combine the elements of other types of firewalls i.e.,
the elements of packet filtering and proxy services, or of packet filtering and circuit
gateways.
A hybrid firewall system may consist of two separate firewall devices each is a
separate firewall system, but they are connected so that they work together.
First generation firewalls are static packet-filtering firewalls: They are simple
networking devices that filter packets according to their headers as the packets travel
to and from the organization’s networks.
Third generation firewalls are stateful inspection firewalls: They monitor network
connections between internal and external systems using state tables.
Fifth generation firewalls include the kernel proxy: A specialized form that works
under Windows NT Executive, which is the kernel of Windows NT. This type of firewall
evaluates packets at multiple layers of the protocol stack, by checking security in the
kernel as data is passed up and down the stack.
Firewall Architectures
The firewall configuration that works best for a particular organization depends on
three factors: the objectives of the network, the organization’s ability to develop and
implement the architectures, and the budget available for the function.
Packet-filtering Routers:
• Most organizations with Internet connection have a router serving as interface
to Internet.
• Many of these routers can be configured to reject packets that organization
does not allow into network.
• Drawbacks include a lack of auditing and strong authentication.
Dual-home Firewalls:
• In this firewall architecture, bastion host contains two NICs (network interface
cards) as in the bastion host configuration.
• One NIC is connected to the external network, and one is connected to the
internal network, providing an additional layer of protection.
• With two NICs, all traffic must physically go through the firewall to move
between the internal and external networks.
• Implementation of this architecture often makes use of NAT (Network Address
Translation).
• NAT is a method of mapping real, valid, external IP addresses to special ranges
of non-routable internal IP addresses.
• NAT prevents external attacks from reaching internal machines with addresses
in specified ranges.
• Dual-homed host can translate many different protocols at their respective
data link layers.
Screened subnet firewall is the dominant architecture used today. Screened subnet
firewall provides a DMZ.
Subnet firewall consists of two or more internal bastion hosts behind packet filtering
router, with each host protecting trusted network.
SOCKS Servers:
• It is another type of firewall implementation.
• SOCKS is the protocol for handling TCP traffic via a proxy server.
• The SOCKS system is a proprietary circuit-level proxy server that places special
SOCKS client-side agents on each workstation.
• It places the filtering requirements on the individual workstation
• A SOCKS system can require support and management resources beyond those
of traditional firewalls.
When selecting a best firewall for an organization, consider the following factors:
• Which firewall offers right balance between protection and cost for needs of
organization?
• Which features are included in base price? and What features are available at
extra cost?
• Ease of setup and configuration? How accessible are staff technicians who can
configure the firewall?
• Can firewall adapt to organization’s growing network?
So, with all security decisions, certain compromises may be necessary in order to
provide a viable solution under the budgetary constraints stipulated by management.
Once the firewall architecture and technology are selected, the organization must
provide the guidelines for configuration and management of the firewall(s).
Good policy and practice dictates that each firewall device must have its own set of
configuration rules for their activities.
for example:
Configuring firewall policies is both an art and a science. Each configuration rule
must be carefully crafted, debugged, tested, and placed into the ACL in proper
sequence.
The most important thing to remember is "when security rules conflict with the
performance of business, security often loses".
o Web servers for internal use on their desktops, the services are invisible
to the outside Internet. If the Web server is behind the firewall, allow
HTTP or HTTPS connections.
• All data that is not verifiably authentic should be denied.
Firewall Rules
Firewalls operate by examining a data packet and performing a comparison with some
predetermined logical rules.
It is important to note that separate rule lists are created for each interface on a
firewall.
Example: for dual-homed hosts, some of the rules are designed for inbound traffic,
from the untrusted to the trusted side of the firewall, and some are designed for
outbound traffic, from the trusted to the untrusted side.
Firewall can process information beyond the IP level (TCP/UDP) and thus can access
source and destination port addresses. Some firewalls can filter packets by protocol
name as opposed to protocol port number.
The system (or well-known) ports are those from 0 through 1023, user (or registered)
ports are those from 1024 through 49151, and dynamic (or private) ports are those
from 49152 through 65535.
Rule Set 2: The firewall device is never accessible directly from the public network. If
attackers can directly access the firewall, they may be able to modify or delete rules
and allow unwanted traffic through.
Rule Set 3: All traffic from the trusted network is allowed out. As a general rule it is
wise not to restrict outbound traffic, unless separate routers and firewalls are
configured to handle it, to avoid overloading the firewall.
Rule Set 4: The rule set for the SMTP data. Packets governed by this rule are allowed
to pass through the firewall but are all routed to a well-configured SMTP gateway.
Rule Set 5: All Internet Control Message Protocol (ICMP) data should be denied. Pings,
formally known as ICMP Echo requests, are used by internal systems administrators
to ensure that clients and servers can communicate. ICMP uses port 7 to request a
response to a query (e.g., “Are you there?”) and can be the first indicator of a malicious
attack.
Rule Set 6: Telnet (terminal emulation) access to all internal servers from the public
networks should be blocked.
Rule Set 7: When Web services are offered outside the firewall, HTTP traffic (and
HTTPS traffic) should be blocked from the internal networks via the use of some form
of proxy access or DMZ architecture.
Rule Set 8: The cleanup rule. As a general practice in firewall rule construction, if a
request for a service is not explicitly allowed by policy, that request should be denied
by a rule.
Content Filters
• Utility that can help to protect an organization’s systems from misuse and
unintentional denial-of-service problems is the content filter.
• A content filter is a software filter that allows administrators to restrict access
to content from within a network.
• It is essentially a set of scripts or programs that restricts user access to certain
networking protocols and Internet locations.
• Primary focus is to restrict internal access to external material.
• Content filter has two components: rating and filtering.
• The rating is like a set of firewall rules for Web sites and is common in
residential content filters.
RADIUS and TACACS are systems that authenticate the credentials of users who are
trying to access an organization’s network via a dial-up connection.
The Remote Authentication Dial-In User Service (RADIUS) system centralizes the
management of user authentication by using central RADIUS server.
Kerberos:
• Named after the three-headed dog of Greek mythology that guards the gates to
the underworld.
• It uses symmetric key encryption to validate an individual user to various
network resources.
• Keeps database containing private keys of clients/servers
• Kerberos also generates temporary session keys, which are used to encrypt all
communications between these two parties.
• Consists of three interacting services:
• Authentication server (AS): A server that authenticates clients and servers.
• Key Distribution Center (KDC): Generates and issues session keys
• Kerberos ticket granting service (TGS): provides tickets to clients who request
services.
• The KDC knows the secret keys of all clients and servers on the network.
• The KDC initially exchanges information with the client and server by using
these secret keys.
• Kerberos authenticates a client to a requested service on a server through TGS
and by issuing temporary session keys for communications between the client
and KDC, the server and KDC, and the client and server.
• Communications then take place between the client and server using these
temporary session keys.
SESAME:
A virtual private network (VPN) is a private and secure network connection between
systems that uses the data communication capability of an unsecured and public
network.
Transport Mode
• Allows user to establish secure link directly with remote host, encrypting only
data contents of packet.
Drawbacks are:
Tunnel Mode
Organization establishes two perimeter tunnel servers that encrypt all traffic.
• In tunnel mode, the entire client packet is encrypted and added as the data
portion of a packet addressed from one tunneling server to another.
• These servers act as encryption points, encrypting all traffic that will traverse
unsecured network.
• The receiving server decrypts the packet and sends it to the final address.