Firewall and Router Policy



Similar documents
SonicWALL PCI 1.1 Implementation Guide

PCI Compliance Report

Using Skybox Solutions to Achieve PCI Compliance

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Best Practices for PCI DSS V3.0 Network Security Compliance

Achieving PCI-Compliance through Cyberoam

Unified Security Anywhere PCI COMPLIANCE PCI COMPLIANCE WE CAN HELP MAKE IT HAPPEN

March

PCI Compliance We Can Help Make it Happen

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

74% 96 Action Items. Compliance

8. Firewall Design & Implementation

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

University of Sunderland Business Assurance PCI Security Policy

IT Security Standard: Network Device Configuration and Management

TABLE OF CONTENTS. Compensating Controls Worksheet ReymannGroup, Inc. PCI DSS SAQ Tool Version 2009 Page 1 of 51

A Model Design of Network Security for Private and Public Data Transmission

Executive Summary and Purpose

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.0 November 2013

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Achieving PCI DSS Compliance with Cinxi

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Technology Innovation Programme

PCI Implementation Guide

Payment Card Industry (PCI) Data Security Standard

Retail Stores Networks and PCI compliance

Polycom. RealPresence Ready Firewall Traversal Tips

Network Security Topologies. Chapter 11

- Introduction to Firewalls -

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.1 April 2015

Payment Card Industry (PCI) Data Security Standard Report on Compliance. Template for Report on Compliance for use with PCI DSS v3.0. Version 1.

The Bomgar Appliance in the Network

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

Using Skybox Solutions to Ensure PCI Compliance. Achieve efficient and effective PCI compliance by automating many required controls and processes

U06 IT Infrastructure Policy

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

PCI DSS Requirements - Security Controls and Processes

Consensus Policy Resource Community. Lab Security Policy

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

Automate PCI Compliance Monitoring, Investigation & Reporting

Security Technology: Firewalls and VPNs

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD FIREBOX

A Rackspace White Paper Spring 2010

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Lab Configuring Access Policies and DMZ Settings

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Cisco SR 520-T1 Secure Router

Using the AppGate Network Segmentation Server TO ACHIEVE PCI COMPLIANCE

Chapter 11 Cloud Application Development

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Securing Networks with PIX and ASA

PCI DSS Compliance. with the Barracuda NG Firewall. White Paper

Implementation Guide

Next Generation Network Firewall

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

CTS2134 Introduction to Networking. Module Network Security

Payment Card Industry Data Security Standard

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

PCI Requirements Coverage Summary Table

Internet Security Firewalls

Payment Card Industry (PCI) Data Security Standard

PCI DSS Compliance and the Digi TransPort Router

General Standards for Payment Card Environments at Miami University

FIREWALLS & CBAC. philip.heimer@hh.se

Overview. Firewall Security. Perimeter Security Devices. Routers

Firewall Architecture

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK. PCI SAQ TYPE A-EP Level 4. Virtual Terminals

Firewall Design Principles

Packet filtering and other firewall functions

Network Infrastructure Security Good Practice Guide. August 2009

How To Protect A Web Application From Attack From A Trusted Environment

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewall Environments. Name

Security Awareness. Wireless Network Security

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

DMZ Gateways: Secret Weapons for Data Security

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Cornerstones of Security

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Owner of the content within this article is Written by Marc Grote

Payment Card Industry (PCI) Data Security Standard. Version 1.1

Transcription:

Firewall and Router Policy Approved By: \S\ James Palmer CSC Loss Prevention Director PCI Policy # 1600 Version # 1.1 Effective Date: 12/31/2011 Revision Date: 12/31/2014 December 31, 2011 Date 1.0 Purpose: The purpose is to describe required minimum firewall and router configurations to protect all Coast Guard Morale, Well-Being and Recreation Program (MWR) systems from unauthorized access from the Internet. 2.0 Compliance: PCI DSS Requirement 1 3.0 Scope: This policy applies to all firewall and routers connected to MWR PROGRAM S network. 4.0 Policy: Procedures for managing firewalls will be documented, implemented and known to all affected parties. Network Diagram A current network diagram will be maintained which displays all connections to cardholder data, including wireless networks. Diagram must show credit card databases segregated from the DMZ. The network diagram must show the flow of cardholder data. Physical Security Only members of the Administrators to Network Devices (Form 1604) or their designee may install, uninstall, move, perform maintenance upon, or change the physical configuration of a firewall or router. Page 1 of 5

Any additions to the administrators group will require the Change Control Form Add Administrators to Network Devices (Form 1601) to be completed and approved by the MWR Director/Officer. Only the Administrators to Network Devices or their designee may make physical connections to a network device including direct access ports, console ports, etc. In the event a firewall or router suffers physical damage or there is evidence of tampering, it will be fully evaluated by hardware diagnostics and the physical configuration checked with existing documentation. Configuration Requirements Only members of the Administrators to Network Devices or their designee may do the following: Log in directly to a network device s console port or other direct access port Assume administrative privileges on a network device Log in to the network device remotely Any configuration changes will be approved and implemented in accordance with the MWR PROGRAM Change Management Policy, found in Policy 1500 System Application Development and Maintenance Policy. The Network Device Implementation Checklist and Approval Form, (Form 1605), must be completed for all implemented network devices. Network device password policies shall be the same as the MWR PROGRAM password policies. Network devices shall limit administrative access to MWR PROGRAM networks that are firewalled from any untrusted source. A demilitarized zone (DMZ) will be used to filter and screen all traffic and to prohibit direct routes for inbound and outbound Internet traffic. Firewall and/or router configurations will restrict outbound traffic from payment card applications to IP addresses within the DMZ. Page 2 of 5

IP masquerading will be used to prevent internal addresses from being translated and revealed on the Internet such as port address translation (PAT) or network address translation (NAT). Firewalls are to be placed at each Internet connection and between any demilitarized zone (DMZ) and the internal network zone. Firewalls will restrict inbound Internet traffic to internal protocol (IP) addresses within the DMZ. Firewalls will not allow internal addresses to pass from the Internet into the DMZ. Firewalls will perform stateful inspection. Anti-spoofing measures will be implemented to detect and block forged source IP addresses from entering the network. Perimeter firewalls will be installed between any wireless networks and the cardholder data environment to permit only authorized traffic. These firewalls will be configured to deny any traffic from the wireless environment or from controlling any traffic. Personal firewall software will be installed on any mobile and employeeowned computers with direct connectivity to the Internet which are used to access MWR PROGRAM s network. The personal firewall software will be configured so that it is unalterable by the user. No local user accounts will be configured on the router except one emergency account. Routers will use TACACS+ for all user authentication and only members of the Administrators to Network Devices will have administrative access to these devices. The enable password on the router must be kept in a secure encrypted form. The router must have the enable password set to the current production router password from the router s support organization. Routers must deny all inbound and outbound traffic not specifically allowed. Page 3 of 5

Router access rules are to be added as business needs arise. Router configuration files (Form 1606) will be secure from unauthorized access and synchronized. Each router will have the following statement in clear view: ATTENTION!!! You have accessed a Coast Guard Morale, Well-Being and Recreation restricted device. The actual or attempted unauthorized access, use or modification of this system is strictly prohibited. Unauthorized users are subject to disciplinary proceedings and/or criminal and civil penalties under state, federal or other applicable domestic and foreign laws. The use of this system may be monitored and recorded for administrative and security reasons. Anyone accessing this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity we may provide the evidence of such activity to law enforcement. A documented list of services and ports that are necessary for business will be identified on the Firewall Application Traffic Ruleset (Form 1602) and Ruleset for Boundary Router (Form 1603). Documentation will include justification for protocols besides hypertext transfer protocol (HTTP) and secure sockets layer (SSL), secure shell (SHH), and virtual private network (VPN). Justification includes business reason for use of protocol and security features implemented. Monitoring All firewalls and router rulesets will be reviewed on a quarterly basis. The List of Approved Network Device Administrators (Form 1604) will be reviewed on a quarterly basis. 5.0 Responsibility: The MWR Director/Officer is responsible for leading compliance activities that bring THE COAST GUARD MWR into compliance with the PCI Data Page 4 of 5

Security Standards and other applicable regulations and maintaining the documentation of the quarterly reviews. 6.0 Form(s): Form 1601 Change Control Form to Add Administrators to Network Devices Form 1602 Firewall Application Traffic Ruleset Form 1603 Ruleset for Boundary Router Form 1604 List of Approved Network Device Administrators Form 1605 Network Device Implementation Checklist and Approval Form 1606 Router Template/Checklists 7.0 Definition(s): Definitions for technical terms can be found in Appendix A of your MWR PCI Compliance Workbook. 8.0 Policy History: Initial effective date: 7/01/1999 First revision date: 12/31/2011 Revisions for PCI DSS Version 2.0 Second revision date: 12/31/2014 Revisions for PCI DSS Version 3.0 Page 5 of 5