PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

7
PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM

Transcript of PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

Page 1: PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

PERIMETER SECURITYPROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM

Page 2: PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

EQUIPMENT REDUNDANCY

THIS IS THE USE OF MULTIPLE COPIES OF IT INFRASTRUCTURE

THE IT RESOURCES IN USE SHOULD BE LOCATED AT DIFFERENT PLACES

ALLOWS FOR DISASTER RECOVERY IN CASE THERE IS EQUIPMENT FAILURE/DAMAGE

ENSURES MAXIMUM UPTIME

Page 3: PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

ACCESS CONTROL LIST FILTERS

CONFIGURED AT A NUMBER OF DIFFERENT LOCATIONS

MAINLY USED ON FIREWALLS

SUPPORTED BY SOME ROUTERS AND SWITCHES

DEFINE THE NETWORK RESOURCES THAT ARE ACCESSIBLE TO A USER

PRINCIPLE OF LEAST PRIVILEGE SHOULD BE EMPLOYED

Page 4: PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

BORDER ROUTERS

THESE ARE ROUTERS LOCATED AT THE LOGICAL EDGES IN THE NETWORK DESIGN LAYOUT

THEY ACT AS THE INTERFACE OF THE NETWORK TO THE OUTSIDE WORLD

EXPOSED TO A LOT OF RISK, MUST BE PROTECTED

Page 5: PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

PROXY FILTERS

THESE ARE SERVERS THROUGH WHICH LAN USERS ACCESS THE INTERNET

CAN BE CONFIGURED WITH ACCESS LISTS

RESTRICT UNAUTHORIZED USERS FROM ACCESSING THE WEBSITE

ONLY THE PROXY SERVER IS DIRECTLY EXPOSED TO THE INTERNET, MINIMIZING THE AREA OF EXPOSURE

Page 6: PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

DEMILITARIZED ZONES THESE ARE SECURE ZONES ESTABLISHED WITHIN A BIGGER

NETWORK

ESTABLISHED BETWEEN THE INTERNET AND THE OUTWARD-FACING DEVICES E.G. SERVERS

ADDS AN ADDITIONAL LAYER OF SECURITY TO THE SYSTEM

REDUCES AREA OF EXPOSURE

Page 7: PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

REFERENCESNorthcutt, S., Zeltser, L., Winters, S., Kent, K., & Ritchey, R. W. (2005). Inside Network Perimeter Security (Inside). Sams.