April 09, 2008 The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 1 The Demilitarized Zone as an Information Protection.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Security Controls – What Works
Firewall Configuration Strategies
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Security Awareness: Applying Practical Security in Your World
Stephen S. Yau CSE , Fall Security Strategies.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Department Of Computer Engineering
Network security policy: best practices
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
IT Infrastructure Chap 1: Definition
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Lecture 7 Network & ISP security. Firewall Simple packet-filters Simple packet-filters evaluate packets based solely on IP headers. Source-IP spoofing.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
AWS Cloud Firewall Review Architecture Decision Group October 6, 2015 – HUIT-Holyoke-CR 561.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Role Of Network IDS in Network Perimeter Defense.
Overview of Network Security. Network Security2 New Challenges 1.Security does not focus on a “product” only; it is a process and focuses on the whole.
IS3220 Information Technology Infrastructure Security
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Securing Access to Data Using IPsec Josh Jones Cosc352.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
CS457 Introduction to Information Security Systems
CompTIA Security+ Study Guide (SY0-401)
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
IS4550 Security Policies and Implementation
* Essential Network Security Book Slides.
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
Introduction to Network Security
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

April 09, 2008 The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 1 The Demilitarized Zone as an Information Protection Network Presented By Parvathy Subramanian

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 2 Agenda ► Introduction ► Fundamental IPN concepts ► Enterprise Security principles ► Implementing IPN’s with complex security  Integrated IPN  Virtual IPN  Connectivity policy (uncontrolled network connection)  Nested IPN configuration ► Enterprise information in the IPN ► IPN Technology components

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 3 Introduction ► Information protection requires an in-depth risk-based approach involving network, host, and application security, which together constitute a defense-in-depth approach to information protection [1] ► DMZ provides network layer security from untrusted network via an intermediary network charged with granting or denying access to external hosts and ports within the enterprise network. ► Hosts within the enterprise network provides the second level network security ► Finally, Applications within the hosts provide the final layer of defense. ► Risk = threat * vulnerability * value  Threat and vulnerability are real numbers between (0,t) and (0,v)  Value is represented in dollars. It ranges between ($0, $n).

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 4 Enterprise security core principles and supporting requirements

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 5 Fundamental IPN (Information Protection Network) Concepts A typical IPN separates trusted network and external network. The trusted network is connected to an internal router. The External network is connected to an external router.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 6 Fundamental IPN (Information Protection Network) Concepts The public access server and DNS can be accessed and responds to requests from external network. They cannot initiate any outbound sessions. All these controls involves authentication. Some servers are needed to support IPN security function.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 7 Enterprise Security Principles ► “Never assume that another component of the IPN is completely trusted to perform its intended function with 100% reliability.”  Example: It’s the responsibility of the external router to permit external network DNS query request and nothing else to the DNS server. ► ► “The IPN and all its components constitute a security system, and it should be managed accordingly — as a system, not a collection of independent components”.  Example: A group of staff are responsible for administration of DNS host/service. Each individuals should work together and there should be some coordination mechanism built into change control process.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 8 Implementing IPN’s with complex security ► Large enterprise is composed of several geographically distributed campus network. ► IPN Principle:  The IPN can be used to implement an array of department wide mandatory and recommended baseline security policies and practices, as well as those that might be site specific or used by the site to augment the department wide direction or guidelines.[1] ► IPN is used to:  Control the flow of traffic through it.  Hide local site details.  Facilitate protection of data in transit.  Monitor network activities.  Resist unauthorized use of site resources.  Protect the site and itself from unauthorized change.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 9 Integrated IPN ► Same physical facility and equipment are used to protect both the networks ► One router can be configured as two virtual router. Or use just a single router with complex access control policies

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 10 Virtual IPN ► From the equipment and the circuit perspective there are 2 separate IPN ► From the system’s perspective there is only one virtual IPN ► Less efficient, but appropriate depending on the site and organizational structure of the enterprise

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 11 Connectivity policy (Uncontrolled network connection) ► Network A and B have different security policies ► Data flow between them should be mediated via an IPN ► Direct connectivity compromises the information security ► There is no “Stronger than” relation between network A and B. ► Clearly, there is an expose to vulnerabilities, even though the IPN protect each according to its own needs.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 12 Nested IPN ► Most often there is a “stronger than” relationship that exist between two networks. ► In such case clear and formal agreement should be specified between the directly adjacent network, particularly to ingress policy. ► Egress policy is solely within the control of a single network.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 13 Enterprise information in the IPN ► IPN along with security measures, also provides a means for information and application sharing between the enterprises and/or the business partners. ► With the introduction of private business data into the IPN, extra diligence should be given to security measures. ► Strict configuration change control procedure should be maintained and trained security professionals should be part of IPN mgnt team. ► Clear separation of roles should be ensured, so that security is not compromised in a misguided attempt to satisfy a single business need.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 14 ► IPN implementation includes network zones. This includes both security and business components ► Example: Access to restrictive zone is limited to site users whose roles is to manage and maintain business application. ► Ingress to public zone is permitted if the source is from restrictive zone. ► Its denied otherwise. ► Strong authentication should be provided for ingress policies that are allowing access to the restrictive zone.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 15 IPN Technology components IPN Tech. components Connectivity Component Security Components Network and Application systems Example: Switches, Routers, Load balancers, DNS Systems designed to ensure: Confidentiality Integrity Availability Example: Firewall, Intrusion detection system, SSL, VPN

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 16 ► Router:  A pair of routers serve as the demarcation point of an IPN environment. It also provides a set of ACL defining the ingress and egress policies.  The ACL should explicitly deny all other traffic.  Router based ACLs are extremely important to the IPN, they are the first line of defense against all unknown security threats. ► Switching:  IPN’ are highly dependent upon the layer-two switches for primary network connectivity.  Problems related to switches in IPN network are related to human errors.  VLAN technology is commonly employed in IPN environment to provide logical separation using shared security and network connectivity hardware.  Zones in the IPN can be implemented using VLAN technology. Connectivity Components

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 17 Security Components ► Firewalls:  Stateful inspection devices.  Monitors bi-directional traffic to ensure compliance with predefined security policies.  They take specific action like session termination, redirection, logging and alarms in response to unauthorized traffic. ► Intrusion Detection Systems:  Based on the capabilities and policies, an IDS can decode any malicious traffic flow.  IDS devices are placed inside, outside and on each host of an IPN.  Suspected events are consolidated, normalized and correlated for real-time analysis.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 18 Security Components (Cont..) ► Intrusion Prevention Systems:  It’s a hybrid between firewall and IDS.  It functions as a IDS, but can be placed with the network devices like firewall. ► Domain Name Services:  Provides name resolution service  Provides local and geographical load distribution.  Split DNS is implemented to hide internal hostnames from external views. ► Web cache and reverse proxy: ► Business Continuity: Disaster recovery

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 19 Conclusion ► Final goal is to provide simple and secure IPN environment. ► Scalability and expansion to accommodate growth should be allowed. ► Performance, Availability and scalability are extremely important for a successful implementation of an IPN.

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 20 Reference ► [1] Enterprise information systems assurance and system security Managerial and Technical issues, Merrill Warkentin and Rayford B. Vaughn. ► [2]

April 09, 2008The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 21 Questions