HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.70 Developing a firewall concept

S 2.70 Developing a firewall concept

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management

The connection of existing sub-networks with global networks, such as the Internet, leads to a new supply of information. At the same time, the increasing amount of local networks leads to the situation where all workstation computers have access to a wide variety of information.

This networking gives rise to new threats, however, as it is not only possible for information to flow into the network requiring protection from outside, but also in the other direction. Furthermore, the possibility of remote access, i.e. a remote computer (e.g. through the Internet) can execute commands in the local network, poses a threat to the integrity and availability of the local computers and thus indirectly also to the confidentiality of the local data.

A sub-network requiring protection should thus only be connected to another network if this is essential. This particularly applies to connections to the Internet. It should be checked to what extent the network requiring protection can be divided into parts which cannot be connected, which can be connected and which can be connected with limitations. It should also be checked whether a stand-alone system is not sufficient for the connection to the Internet (see S 5.46 Installing stand-alone systems for Internet usage).

In order to guarantee the security of the network requiring protection, a suitable firewall must be used. For the firewall to offer effective protection, the following conditions must be fulfilled. The fire wall must be:

The connection to an external network can only take place when it has been checked that all risks can be handled by the firewall concept and the personnel and organisational conditions.

There are several ways to implement a firewall. In order to determine which firewall concept is most suitable for the intended uses, it must first be clarified which security objectives are to be fulfilled by the firewall. Examples of security objectives are:

Based on the security objectives, a security policy must be drawn up which stipulates the tasks of, and requirements placed on, the firewall. This security policy must be included in the IT security strategy of the organisation and thus agreed with the IT management.

The firewall security policy is put into effect by the implementation of the firewall, the selection of suitable hardware components, such as packet filters and application gateways, and the careful implementation of filter rules.

Note:

In order for a firewall to offer effective protection of a network against external attacks, several fundamental factors must be fulfilled:

A firewall can protect the internal network against many of the dangers encountered when connecting to the Internet, but not against all of them. Thus, when a firewall is established and a firewall security policy is elaborated, it is necessary to be aware of the firewall's limits.

WWW.BSI.DE 194.95.176.226 !
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home