UNCLASSIFIED

Size: px
Start display at page:

Download "UNCLASSIFIED 12686381"

Transcription

1 CPA SECURITY CHARACTERISTIC IP FILTERING FIREWALLS Version 1.1 Crown Copyright 2011 All Rights Reserved

2 CPA Security Characteristics for IP Filtering firewalls 26/07/2011 Document History Version Date Description 0.5 July 2011 Fourth draft of documentation 0.6 August 2011 Fifth draft of documentation 1.0 September 2011 Document ready for release 1.1 October 2011 Document ready for publishing This Security Characteristic is derived from the following files File Name Version IP Filtering Firewall v1.1.cxl 1.1 Common Libraries - v1.3.cxl 1.3 Crypt Libraries - v1.3.cxl 1.3 Hardware Libraries v1.2.cxl 1.2 Passphrase Libraries - v1.4.cxl 1.4 Soft copy location DiscoverID This document is authorised by: Deputy Technical Director (Assurance) CESG This document is issued by CESG For queries about this document please contact: CPA Administration Team CESG Hubble Road Cheltenham Gloucestershire GL51 0EX United Kingdom Tel: +44 (0) cpa@cesg.gsi.gov.uk The CPA Authority may review, amend, update, replace or issue new Scheme Documents as may be required from time to time. Page ii

3 CPA Security Characteristics for IP Filtering firewalls 26/07/2011 CONTENTS REFERENCES... 1 I. OVERVIEW... 2 A. Product Aims... 2 B. Typical Use Case(s)... 2 C. Expected Operating Environment... 2 D. Compatibility... 3 E. Interoperability... 3 F. High Level Functional Components... 3 G. Future Enhancements... 4 II. SECURITY CHARACTERISTIC FORMAT... 5 III. REQUIREMENTS... 6 A. Design Mitigations... 6 B. Verification Mitigations C. Deployment Mitigations IV. GLOSSARY V. APPENDIX A - GUIDANCE FOR THE TESTING OF VERIFY MITIGATIONS Page iii

4 REFERENCES [a] [b] The Process for Performing Foundation Grade CPA Evaluations, v1.3, August 2011, CESG HMG IA Standard No. 7 Authentication of Internal Users of ICT Systems Handling Government Information [October 2010 Issue No: 1.0] [c] Good Practice Guide 35 Protecting an Internal ICT Network [August 2011 Issue No: 2.0] [d] Appendix A Guidance for the testing of VERIFY mitigations Page 1

5 I. OVERVIEW 1. This document is a CPA Security Characteristic it describes requirements for a particular type of assured product for evaluation and certification under CESG s Commercial Product Assurance (CPA) scheme. A. Product Aims 2. IP filtering firewall products are intended to protect network boundaries or specific areas of networks by permitting only traffic from certain hosts to reach certain destinations and vice versa. 3. IP Filtering Firewall as referred to in this security characteristic refers to a physical device that acts as a packet filtering device (with multiple network interfaces) and the software running within it, whether that is completely custom-built or based on a commercial / open source operating system. 4. Any packets that do not conform to the firewall ruleset are dropped by default. B. Typical Use Case(s) 5. Firewalls are used as part of many network architectures to provide control over which network devices or hosts may connect to which destinations and vice versa at the IP level (Layer 3). The firewall may also provide functionality at higher layers, which is out of the scope of this characteristic. Routed Mode (Layer 3 mode) 6. A firewall may be deployed as an extra hop in a network and act as a basic router to protect systems and hosts behind it. Transparent Mode (Layer 2 mode) 7. A firewall may be deployed as a bump in the wire essentially operating at layer 2 and will not appear as an extra hop in a traffic path. C. Expected Operating Environment 8. Firewalls are crucial components in a large proportion of network designs and architectural patterns. Due to the availability of firewalls with various different feature sets to support different speeds and types of network, they may be found in many different environments, ranging from ISP-level networks through corporate, to SMEs and home users, where logically separating areas of a network or protecting certain hosts is deemed necessary. For more information, consult Good Practice Guide No. 35 [c]. Page 2

6 D. Compatibility 9. An IP filtering firewall must support the widely deployed Internet Protocol. Compatibility with various types of physical network implementations (e.g. fibrebased, copper-based and various line speeds) will depend on manufacturer support. Firewalls are typically available in various levels of complexity and size (e.g. support for high-bandwidth connections and number of interfaces) to accommodate different market segments. E. Interoperability 10. A firewall solely concerned with Layer 3 operation should interoperate with all protocols that sit above it in higher layers. F. High Level Functional Components Physical Boundary Management Rules Configuration Device Configuration Packet Engine Logging Network Interfaces 11. Rules Configuration: The rules which are set or configured by the administrator to protect the red network from attack. 12. Device Configuration: The settings which allow the device to successfully interact on the network, such as network interface settings. 13. Packet Engine: The element which allows the IP Filtering Firewall to inspect packets and apply rules. 14. Logging: Recording security related events and the review of logs. 15. Network Interface: The network interfaces which allow the device to connect to the red network, the black network, and the management network. Page 3

7 G. Evaluation Notes 16. The evaluation team must observe the guidance contained within Appendix A of this document when examining the Verification Mitigations. H. Future Enhancements 17. CESG welcomes feedback and suggestions on possible enhancements to this security characteristic 18. Likely future enhancements to this Security Characteristic are: Layer 4 Firewalls Page 4

8 II. SECURITY CHARACTERISTIC FORMAT 19. All CPA Security Characteristics contain a list of mitigations which are split into three categories: development, verification and deployment. Within each of these sets the mitigations can be grouped based on areas of the product (as illustrated in the High Level Functional Component Diagram above), such as bulk encryption or authentication, or they may be overarching requirements which apply to the whole product. Reference [a] describes how evaluation teams should interpret Security Characteristics. 20. The three types of mitigations are denominated as follows: DEV Development mitigations are included by the developer during the design or implementation of the product. These are validated via a review of the product s design or implementation during a CPA evaluation. VER Verification mitigations are specific items that the evaluator must test during the evaluation of the product. DEP Deployment mitigations are points that must be considered by users or administrators during the deployment of the product. These mitigations are incorporated into the Security Procedures which are published by CESG for the product. 21. Each mitigation includes: Informational text in italics, describing the threat to be mitigated. One or more specific mitigations, which describe what must be done. Optional additional explanatory text which expands upon the requirement. 22. In the mitigations listed below, the following terminology is used: Must, Mandatory and Required are used to express a mitigation that is essential. All mitigations and detailed mitigations are mandatory unless there is an explicit caveat, such as if supported by the product. Should and Strongly Recommended are used whenever a requirement is highly desirable, but is not essential. These are likely to become mandatory in future iterations of the Security Characteristic. Could and Recommended are used to express a non-mandatory requirement that may enhance security or functionality. 23. For example: DEV.M1: [A mitigation] This mitigation is required to counter [a threat] At Foundation the product must [do something]. This can be achieved by [explanatory comment]. Page 5

9 III. REQUIREMENTS A. Design Mitigations DEV.M22: Update signing This mitigation is required to counter installing compromised software using the update process At Foundation Grade the product is required to use cryptographically signed updates and verify their signatures before installation, if an update mechanism is present. Updates to the product must be verified using a hardcoded manufacturer's public key built-in to the product. The digital signature algorithm must be ECDSA-256 or DSA-1536/192 or higher, the hash algorithm must be SHA DEV.M41: Crash reporting At Foundation Grade the product is required to ensure crashes are logged Where it is possible that sensitive data may end up in the crash data, this must be handled as red data and must only be available to an administrator. Crash data from both the product and the underlying operating system must be considered. DEV.M42: Heap hardening At Foundation Grade the product is required to use the memory management provided by the operating system, products should not implement their own heap DEV.M43: Stack protection At Foundation Grade the product is required to be compiled with support for stack protection in all libraries, where the tool chain supports it If more recent versions of the toolchain support it for the target platform then they should be used in preference to a legacy toolchain. DEV.M46: User least privilege This mitigation is required to counter taking advantage of existing user privilege At Foundation Grade the product is required to operate correctly from a standard account without elevated privileges DEV.M159: Update product This mitigation is required to counter exploitation of a software logic At Foundation Grade the product should support the use of software updates DEV.M321: Data Execution Protection At Foundation Grade the product is required to support Data Execution Protection (DEP) when enabled on its hosting platform and must not opt out of DEP Page 6

10 If the product is to be specifically deployed on a platform that does not support either Software DEP or Hardware-enforced DEP, there is no requirement for DEP compatibility. DEV.M340: Address Space Layout Randomisation At Foundation Grade the product is required to be compiled with full support for ASLR, including all libraries used ASLR may be disabled for specific aspects of the product, provided there is justification of why this is required. DEV.M353: Store manufacturer's public key securely This mitigation is required to counter modification of the manufacturer's public key on device At Foundation Grade the product is required to ensure there are no methods to gain unauthorised access to keys on the device DEV.M357: Retain data on power loss This mitigation is required to counter exploitation of incorrect operations of firewall At Foundation Grade the product is required to ensure that operationally important data is not lost from power loss This includes important data such as: Firewall configuration Logging / auditing data Firewall rulesets DEV.1 - Design >> Rules Configuration DEV.1.M350: Configuration only by Administrators This mitigation is required to counter modification of rules without valid admin credentials This mitigation is required to counter inserting a firewall rule to continue compromise At Foundation Grade the product is required to ensure that only an authenticated administrator can change device configuration settings DEV.2 - Design >> Packet Engine DEV.2.M41: Crash reporting At Foundation Grade the product is required to ensure crashes are logged Where it is possible that sensitive data may end up in the crash data, this must be handled as red data and must only be available to an administrator. Crash data from both the product and the underlying operating system must be considered. DEV.2.M42: Heap hardening At Foundation Grade the product is required to use the memory management provided by the operating system, products should not implement their own heap Page 7

11 DEV.2.M43: Stack protection At Foundation Grade the product is required to be compiled with support for stack protection in all libraries, where the tool chain supports it If more recent versions of the toolchain support it for the target platform then they should be used in preference to a legacy toolchain. DEV.2.M159: Update product This mitigation is required to counter exploitation of a software logic At Foundation Grade the product should support the use of software updates DEV.2.M321: Data Execution Protection At Foundation Grade the product is required to support Data Execution Protection (DEP) when enabled on its hosting platform and must not opt out of DEP If the product is to be specifically deployed on a platform that does not support either Software DEP or Hardware-enforced DEP, there is no requirement for DEP compatibility. DEV.2.M340: Address Space Layout Randomisation At Foundation Grade the product is required to be compiled with full support for ASLR, including all libraries used ASLR may be disabled for specific aspects of the product, provided there is justification of why this is required. DEV.2.M360: Drop packets that do not conform to ruleset This mitigation is required to counter exploitation of incorrect operations of firewall At Foundation Grade the product is required to only allow packets which adhere to firewall rules to traverse the device DEV.2.M361: Ensure firewall denies traffic on start up This mitigation is required to counter exploitation of incorrect operations of firewall At Foundation Grade the product is required to only allow packets to traverse the firewall when the device is fully operational The device may take time to load rules and configuration data at start up, therefore the firewall shouldn't process traffic until these are loaded. This also applies to re-starting/rebooting of device. DEV.2.M362: Raise alerts This mitigation is required to counter use of malformed/unusual traffic At Foundation Grade the product is required to raise alerts on unusual events Unusual events could be high traffic volumes, audit logs reaching maximum capacity amongst others. Alerts could also be raised when an event exceeds an administrator defined threshold. Page 8

12 DEV.2.M364: Log unusual traffic This mitigation is required to counter use of malformed/unusual traffic This mitigation is required to counter high valid traffic volumes At Foundation Grade the product is required to record unusual traffic to a log Malformed traffic is traffic which the firewall is not capable of dealing with correctly. High valid traffic volumes are volumes of traffic, at which the firewall will be unable to operate correctly. DEV.2.M365: Drop erroneous or excess packets This mitigation is required to counter high valid traffic volumes This mitigation is required to counter use of malformed/unusual traffic At Foundation Grade the product is required to discard packets if the functionality of the device is at risk If the firewall cannot process any more packets, the packets must be discarded. For example, dropping excess incoming packets until the firewall is able to handle further incoming packets. Malformed packets must be dropped and not be processed further. DEV.2.M366: Ensure product fails securely This mitigation is required to counter high valid traffic volumes This mitigation is required to counter use of malformed/unusual traffic At Foundation Grade the product is required to handle any failures in a secure manner The firewall must not allow packets to traverse the firewall if the device has failed. DEV.2.M367: Control allowed sources of dynamic updates This mitigation is required to counter injecting spoofed routing information At Foundation Grade the product is required to ensure that untrusted source IPs cannot influence the routing table DEV.3 - Design >> Logging DEV.3.M369: Protect access to logs This mitigation is required to counter sanitisation of illegitimate access from logs This mitigation is required to counter modification of logging generation At Foundation Grade the product is required to ensure that only an authenticated administrator can manage logs At Foundation Grade the product is required to ensure that all logs are time stamped Timestamps must be accurate and the deployment must take measures to ensure this. Such measures could be NTP synchronisation or a manual process. At Foundation Grade the product is required to provide ability to automatically push logs to external device At Foundation Grade the product is required to not overwrite logs without alerting the administrator Page 9

13 DEV.4 - Design >> Device Configuration DEV.4.M13: Passphrase length and complexity enforcement This mitigation is required to counter dictionary and exhaustion attacks This mitigation is required to counter exploitation of poor passphrase complexity At Foundation Grade the product is required to support administrator configurable passphrase complexity and length settings A product must support passphrases with a length of at least 6 characters. A password length of 5 characters or less will not be suitable for network authentication purposes. Refer to the Network Authentication Passphrase and Password Security Characteristic for further information regarding passphrase length and complexity requirements. Use of machine generated passwords is recommended. DEV.4.M266: Ensure product configuration can only be altered by an authenticated system administrator This mitigation is required to counter unauthorised alteration of product's configuration At Foundation Grade the product is required to ensure that a change of product settings requires an authenticated administrator or privileged user on the operating system The only security enforcing setting a user should be able to change is their passphrase. DEV.4.M267: Provide an automated configuration tool to enforce required settings This mitigation is required to counter exploitation of an accidental misconfiguration At Foundation Grade the product is required to be provided with a configuration tool, or other method, for an administrator to initially set it up into a suitable configuration If the product requires more than 12 options to be changed or set by an administrator to comply with these Security Characteristics, the developer must supply a tool or policy template which helps the administrator to achieve this in fewer steps DEV.4.M278: Approved passphrase hashing algorithm This mitigation is required to counter capture of passphrase stored in the clear At Foundation Grade the product is required to use at least 1 round of SHA- 256 as the passphrase hashing algorithm DEV.4.M279: Disable old passphrase as soon as a new passphrase is enabled This mitigation is required to counter use of a user's old passphrase At Foundation Grade the product is required to ensure old passphrases do not authenticate the user DEV.4.M282: Initial passphrase is changed on first use This mitigation is required to counter use of system default passphrases At Foundation Grade the product is required to ensure passphrase is changed on first logon The system must force users to use an initial passphrase once only, i.e. forces the passphrase to change on first logon. It is strongly recommended that initial passphrases have a limited lifetime between generation and first use that is as short as is practicable. Page 10

14 DEV.4.M289: Approved passphrase salting mechanism This mitigation is required to counter dictionary and exhaustion attacks At Foundation Grade the product should allow the use of passphrase salting It is strongly recommended that passphrases are salted, but this is not mandatory. DEV.4.M294: Account lock-out This mitigation is required to counter dictionary and exhaustion attacks At Foundation Grade the product is required to lock the account after five or fewer consecutive failed authentication attempts The number of attempts that may be made before the user account is locked should be configurable by the administrator. DEV.4.M295: Inform user of account activity This mitigation is required to counter dictionary and exhaustion attacks This mitigation is required to counter exploitation of poor passphrase complexity At Foundation Grade the product should display recent authentication history It is recommended that on login the user be notified of the date and time of the last successful login and any failed login attempts since the last successful login. If recent authentication history is displayed, it is strongly recommended that users are told what to do, preferably on the screen, if the history is not what is expected. DEV.4.M298: Enforce regular changes of the passphrase This mitigation is required to counter dictionary and exhaustion attacks At Foundation Grade the product is required to enforce change of the passphrase every three months The system must enforce changes to passphrases after an administrator configured duration. It is recommended that the system warns users that their passphrase is about to expire. DEV.4.M342: Passphrases are not displayed on screen in the clear while being entered This mitigation is required to counter shoulder surfing At Foundation Grade the product is required to ensure the passphrase is never visible in the clear on the screen DEV.4.M344: Effective user account revocation This mitigation is required to counter use of a previous user's credentials At Foundation Grade the product is required to provide the ability to revoke user accounts The product must ensure that once a user account has been revoked it does not continue to function. DEV.4.M345: Replaying network traffic will not allow access This mitigation is required to counter replay attack At Foundation Grade the product is required to ensure that replaying authentication sequences does not grant access DEV.4.M347: Lock an account if the account is not used for a pre-defined period This mitigation is required to counter use of a dormant account At Foundation Grade the product is required to lock user accounts DEV.4.M349: Lock an account if the passphrase is not changed by the expiry date This mitigation is required to counter use of a user's old passphrase At Foundation Grade the product is required to lock user accounts Page 11

15 B. Verification Mitigations VER.M80: Protocol robustness testing This mitigation is required to counter discovery of a vulnerability in the implementation of the protocol At Foundation Grade the evaluator will perform testing using commercial fuzzing tools Fuzz testing is described in more detail in the Process for Performing Foundation Grade Evaluations. VER.M358: Ensure data is not lost on power loss This mitigation is required to counter exploitation of incorrect operations of firewall At Foundation Grade the evaluator will ensure that operationally important data is not lost from power loss This includes important data such as: Firewall configuration Logging / auditing data Firewall rulesets VER.1 - Verify >> Device Configuration VER.1.M343: Evaluation/Cryptocheck of the passphrase hashing algorithm This mitigation is required to counter capture of passphrase stored in the clear At Foundation Grade the evaluator will ensure all cryptographic algorithms employed for security functionality have been validated as per the "Cryptographic Validation" section in the CPA Foundation Process document VER.2 - Verify >> Packet Engine VER.2.M359: Verify correct operation of ruleset This mitigation is required to counter exploitation of incorrect operations of firewall At Foundation Grade the evaluator will perform testing to ensure packets are processed correctly for a given ruleset. Packets which do not conform should be dropped. Verification can be achieved by creating a sample ruleset and then testing against that ruleset. The device will conform to this mitigation if the expected outcomes are observed during testing. VER.2.M361: Ensure firewall denies traffic on start up This mitigation is required to counter exploitation of incorrect operations of firewall At Foundation Grade the evaluator will ensure that no packets traverse the firewall until the device is fully operational The device may take time to load rules and configuration data at start up, therefore the firewall shouldn't process traffic until these are loaded. This also applies to re-starting/rebooting of device. VER.3 - Verify >> Rules Configuration VER.3.M356: Product allows Deny-All default This mitigation is required to counter exploitation of omission/ in rule configuration At Foundation Grade the evaluator will ensure that the product provides the ability to enforce "Default Deny" on rulesets Page 12

16 C. Deployment Mitigations DEP.M26: Physical tamper evidence This mitigation is required to counter installation of hardware-level malware At Foundation Grade the deployment is required to educate users to regularly check that tamper labels are intact At Foundation Grade the deployment is required to provide administrators with advice on the tamper threat Advice should include looking for possible damage to tamper evident seals. In the event of tampering, the event should be reported as soon as possible and the product must be removed from use immediately. Any product that shows evidence of tampering must not be returned to service. At Foundation Grade the deployment is required to place tamper evident seals over access points on product Use tamper evidence (e.g. stickers) to make entry to system internals detectable by physical inspection. Tamper stickers should be uniquely identifiable to prevent an attacker successfully replacing it with a new, undamaged sticker. DEP.M39: Audit log review This mitigation is required to counter exploitation of a software logic At Foundation Grade the deployment is required to regularly review audit logs for unexpected entries DEP.M46: User least privilege This mitigation is required to counter taking advantage of existing user privilege At Foundation Grade the deployment is required to ensure all user accounts have the fewest privileges required to enable business functionality DEP.M159: Update product This mitigation is required to counter exploitation of a software logic At Foundation Grade the deployment is required to update to the latest version where possible DEP.M340: Address Space Layout Randomisation At Foundation Grade the deployment is required to enable ASLR in the host Operating System where available DEP.M351: Physical security controls This mitigation is required to counter modification of the manufacturer's public key on device This mitigation is required to counter physically destroying device This mitigation is required to counter compromising physical security surrounding device At Foundation Grade the deployment is required to store the device in an appropriately secured area This applies to both operational and non-operational storage. Page 13

17 DEP.1 - Deploy >> Device Configuration DEP.1.M12: Passphrase is set to suitable size and complexity This mitigation is required to counter exploitation of poor passphrase complexity At Foundation Grade the deployment is required to configure passphrase complexity and length settings The passphrase length is determined by the deployment of the passphrase system. Longer passphrase lengths may be required based on the deployment of the passphrase system, or the character set used. Refer to the Network Authentication Passphrase and Password Security Characteristic for further information regarding passphrase length and complexity requirements. IA Standard No.7 also provides some guidance regarding password complexity DEP.1.M38: Use automated configuration tool This mitigation is required to counter exploitation of an accidental misconfiguration At Foundation Grade the deployment is required to be configured using automated tools if provided DEP.1.M277: User guidance on social engineering This mitigation is required to counter a social engineering attack on the user At Foundation Grade the deployment should educate users about social engineering methods used by attackers DEP.1.M280: Distribute initial credentials out of band This mitigation is required to counter interception of initial passphrase during distribution At Foundation Grade the deployment is required to ensure that credentials are sent separately to the product that they will be protecting DEP.1.M281: Only administrators can modify passphrase settings This mitigation is required to counter modification of passphrase settings At Foundation Grade the deployment is required to ensure only system administrators have access to passphrase settings DEP.1.M283: User guidance on passphrase management This mitigation is required to counter exploitation of poor management of passphrases by the user At Foundation Grade the deployment is required to provide user training on passphrase management Users should be provided with guidance regarding the secure handling of passphrases which allow access to sensitive systems. Users must be taught never to disclose passphrases, even to their superiors. Users must also be made aware of the risks of using protectively marked devices in public or untrusted areas. Passphrases should not be entered in areas where others could see them being entered. DEP.1.M285: Secure storage of user passphrases This mitigation is required to counter poor passphrase storage At Foundation Grade the deployment is required to ensure any hardcopies of passphrases are stored securely Page 14

18 DEP.1.M293: Use of passphrases in scripts/batch files in security related areas is carefully considered This mitigation is required to counter passphrase captured in clear At Foundation Grade the deployment should ensure that the risk of using passphrases for this purpose has been accepted It is recommended that passphrases are not held in a macro or batch file. However this may be acceptable for authentication with low impact systems. If in doubt then please contact CESG for advice. DEP.1.M341: User guidance on passphrase selection This mitigation is required to counter dictionary and exhaustion attacks This mitigation is required to counter obtaining and using a user passphrase from a different system At Foundation Grade the deployment is required to provide user training on passphrase selection Users must be provided with guidance regarding the selection of passphrases which allow access to sensitive systems. Passphrases must be unique per device to prevent compromise of multiple systems. DEP.1.M346: Lock an account if the account remains unused for a pre-defined period This mitigation is required to counter use of a dormant account At Foundation Grade the deployment is required to lock user accounts after a pre-defined period The locking of account will be determined by the deployment's account policy. DEP.1.M348: Lock an account if the passphrase is not changed by the expiry date This mitigation is required to counter use of a user's old passphrase At Foundation Grade the deployment is required to lock user accounts after a pre-defined period The locking of account will be determined by the deployment's account policy. DEP.1.M352: Control access to device management This mitigation is required to counter attacking management protocol At Foundation Grade the deployment is required to restrict which network interfaces can be used for device management If a local console port or dedicated management interface is available, it must be possible to configure the other network interfaces to not have management services accessible on them. Similarly, it must also be possible to restrict which network interfaces have management services enabled on them. DEP.2 - Deploy >> Packet Engine DEP.2.M39: Audit log review This mitigation is required to counter exploitation of a software logic At Foundation Grade the deployment is required to regularly review audit logs for unexpected entries Page 15

19 DEP.2.M159: Update product This mitigation is required to counter exploitation of a software logic At Foundation Grade the deployment is required to update to the latest version where possible DEP.2.M340: Address Space Layout Randomisation At Foundation Grade the deployment is required to enable ASLR in the host Operating System where available DEP.2.M363: Take action on receiving alerts This mitigation is required to counter use of malformed/unusual traffic This mitigation is required to counter high valid traffic volumes At Foundation Grade the deployment is required to assess impact of alerts and follow organisational procedures for incident resolution DEP.3 - Deploy >> Rules Configuration DEP.3.M354: Administrators Guidance on ruleset management This mitigation is required to counter exploitation of omission/ in rule configuration At Foundation Grade the deployment is required to ensure administrators are educated on how to configure the ruleset DEP.3.M355: Adopt Deny-All default rule set This mitigation is required to counter exploitation of omission/ in rule configuration At Foundation Grade the deployment is required to automatically enforce "Default Deny" rule at the end of every ruleset DEP.4 - Deploy >> Logging DEP.4.M368: Log all relevant actions This mitigation is required to counter modification of logging generation At Foundation Grade the deployment is required to configure the product to log capture all actions deemed of interest Ensure that log data is detailed enough to allow forensic investigation during any incident management. At Foundation Grade the deployment is required to automatically export logs to management/red side device Page 16

20 IV. GLOSSARY 24. The following definitions are used in this document: Term ASLR Black side (of network) CA CPA DSA ECDSA HTTPS IP ISP JTAG Red side (of network) Ruleset Security Characteristic SHA Meaning Address Space Layout Randomisation The less trustworthy network Certificate Authority Commercial Product Assurance Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm Hypertext Transport Protocol Secure Internet Protocol Internet Service Provider Joint Test Action Group The network which is more trustworthy The set of rules that determine how a packet is handled by the firewall A standard which describes necessary mitigations which must be present in a completed product, its evaluation or usage, particular to a type of security product Secure Hash Algorithm SNMPv3 Simple Network Management Protocol version 3 SME SSH Small-Medium Enterprise Secure Shell Page 17

21 V. APPENDIX A - GUIDANCE FOR THE TESTING OF VERIFY MITIGATIONS The following guidance ensures that VERIFY mitigations within this Security Characteristic are sufficiently tested: The evaluator is required to implement a test network, including a firewall configured with a lab-generated standard ruleset. The test environment should be a network with at least 12 machines connected between two simulated RED and BLACK networks. The test ruleset must have the minimum complexity settings of: 1. Rules which explicitly block certain source addresses from accessing destination addresses from either side of the firewall. 2. Rules which explicitly allow certain source addresses to access destination addresses on both sides of the firewall. 3. No explicit block/allow rules between specific source addresses and specific destination addresses from either side of the firewall. Test traffic traversing the firewall must use different combinations of source/destination IP addresses to exercise the ruleset. The expected outcomes of each of these types of test are as follows: 1. Explicit blocking The firewall must drop packets that should not traverse the firewall. 2. Explicit Allowing The firewall must allow packets authorised to traverse the firewall to reach the intended recipient. 3. No Explicit Allow/Block The firewall must implement a default deny and block packets that do not conform to any explicit rule within the ruleset. Page 18

22 THIS PAGE IS INTENTIONALLY LEFT BLANK Page 19

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved 18570909 CPA SECURITY CHARACTERISTIC REMOTE DESKTOP Version 1.0 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for CPA Security Characteristic Remote Desktop 1.0 Document History

More information

UNCLASSIFIED CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS. Version 1.3. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS. Version 1.3. Crown Copyright 2011 All Rights Reserved 18397081 CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS Version 1.3 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for Web Application Firewalls Document History [Publish

More information

CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE

CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE 12040940 CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE Version 0.3 Crown Copyright 2012 All Rights Reserved CPA Security Characteristics for Data Sanitisation - Flash Based Storage

More information

CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION

CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION UNCLASSIFIED 24426399 CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 UNCLASSIFIED Enterprise Management

More information

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT 26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment

More information

CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY

CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY 3166116 CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 MIKEY-SAKKE Secure VoIP gateway About this document This document

More information

CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT

CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT 29175671 CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the

More information

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved 11590282 CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for software full disk encryption Document History [Publish

More information

CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY

CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY Version 2.5 Crown Copyright 2016 All Rights Reserved 48770392 Page 1 of 25 About this document This document describes the features, testing and deployment

More information

UNCLASSIFIED 11936884

UNCLASSIFIED 11936884 11936884 CPA SECURITY CHARACTERISTIC GATEWAY EMAIL ENCRYPTION Version 1.0 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for Gateway Email Encryption 1 st March 2012 Document History

More information

CPA SECURITY CHARACTERISTIC GATEWAY EMAIL ENCRYPTION

CPA SECURITY CHARACTERISTIC GATEWAY EMAIL ENCRYPTION 11936884 CPA SECURITY CHARACTERISTIC GATEWAY EMAIL ENCRYPTION Version 1.0 Crown Copyright 2016 All Rights Reserved Document History Version Date Description CPA Security Characteristics for Gateway Email

More information

CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT

CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT 24419250 CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 2.1 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the

More information

UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.

UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved. CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION Version 1.0 Crown Copyright 2012 All Rights Reserved Page 1 Document History Version Date Description 0.1 June 2012 Initial Draft Version 1.0 July

More information

CPA SECURITY CHARACTERISTIC CPA-SC DESKTOP EMAIL ENCRYPTION 1.0.DOC

CPA SECURITY CHARACTERISTIC CPA-SC DESKTOP EMAIL ENCRYPTION 1.0.DOC 13644643 CPA SECURITY CHARACTERISTIC CPA-SC DESKTOP EMAIL ENCRYPTION 1.0.DOC Version 1.0 Crown Copyright 2016 All Rights Reserved CPA Security Characteristics for CPA-SC Desktop Email Encryption 1.0.doc

More information

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SERVER VIRTUALISATION. Version 1.21. Crown Copyright 2012 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SERVER VIRTUALISATION. Version 1.21. Crown Copyright 2012 All Rights Reserved ID18939561 CPA SECURITY CHARACTERISTIC SERVER VIRTUALISATION Version 1.21 Crown Copyright 2012 All Rights Reserved CPA Security Characteristics for Server Virtualisation 18/05/2012 Document History Version

More information

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS Issue 1.1 Crown Copyright 2015 All Rights Reserved 1 of 9 Document History Version Date Description 0.1 November 2012 Initial Draft Version

More information

October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V

October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V October 2015 Issue No: 1.1 Security Procedures Windows Server 2012 Hyper-V Security Procedures Windows Server 2012 Hyper-V Issue No: 1.1 October 2015 This document describes the manner in which this product

More information

CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION

CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION 27289237 CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION Version 1.23 Crown Copyright 2016 All Rights Reserved Page 1 About this document This document describes the features, testing and deployment

More information

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Intrusion Prevention and Detection No: Effective: OSC-12 5/21/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES

CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES Version 1.1 Crown Copyright 2016 All Rights Reserved 44335885 Page 1 of 6 About this document This document describes the features,

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1. Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Payment Card Industry (PCI) Terminal Software Security. Best Practices

Payment Card Industry (PCI) Terminal Software Security. Best Practices Payment Card Industry (PCI) Terminal Software Security Best Version 1.0 December 2014 Document Changes Date Version Description June 2014 Draft Initial July 23, 2014 Core Redesign for core and other August

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud) SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

PowerChute TM Network Shutdown Security Features & Deployment

PowerChute TM Network Shutdown Security Features & Deployment PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC)

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) Version 1.0 Crown Copyright 2016 All Rights Reserved Page 1 Document History Version Date Description 1.0 October 2013 Initial issue Soft copy

More information

New Systems and Services Security Guidance

New Systems and Services Security Guidance New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

Information and Communication Technology. Firewall Policy

Information and Communication Technology. Firewall Policy BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

How To Protect Information At De Montfort University

How To Protect Information At De Montfort University Network Security Policy De Montfort University January 2006 Page 1 of 18 Contents 1 INTRODUCTION 1.1 Background... 1.2 Purpose and Scope... 1.3 Validity... 1.4 Assumptions... 1.5 Definitions... 1.6 References..

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64

Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64 122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Potential Targets - Field Devices

Potential Targets - Field Devices Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to

More information

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY Firewall Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator: Recommended by Director

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Acano solution. Security Considerations. August 2015 76-1026-01-E

Acano solution. Security Considerations. August 2015 76-1026-01-E Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration

More information

90% of data breaches are caused by software vulnerabilities.

90% of data breaches are caused by software vulnerabilities. 90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Security Implications Associated with Mass Notification Systems

Security Implications Associated with Mass Notification Systems Security Implications Associated with Mass Notification Systems Overview Cyber infrastructure: Includes electronic information and communications systems and services and the information contained in these

More information

Guidance End User Devices Security Guidance: Apple ios 7

Guidance End User Devices Security Guidance: Apple ios 7 GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER

More information

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

How To Manage Web Content Management System (Wcm)

How To Manage Web Content Management System (Wcm) WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

LogRhythm and PCI Compliance

LogRhythm and PCI Compliance LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent

More information