Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited



Similar documents
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

74% 96 Action Items. Compliance

12. Firewalls Content

INTRODUCTION TO FIREWALL SECURITY

Firewall Environments. Name

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

8. Firewall Design & Implementation

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewall and Router Policy

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Polycom. RealPresence Ready Firewall Traversal Tips

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

March

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

INTRUSION DETECTION SYSTEMS and Network Security

Security Technology: Firewalls and VPNs

The Bomgar Appliance in the Network

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Overview. Firewall Security. Perimeter Security Devices. Routers

Chapter 9 Firewalls and Intrusion Prevention Systems

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Lesson 5: Network perimeter security


Network Security Guidelines. e-governance

Chapter 15. Firewalls, IDS and IPS

SonicWALL PCI 1.1 Implementation Guide

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Did you know your security solution can help with PCI compliance too?

Firewalls (IPTABLES)

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Serial Deployment Quick Start Guide

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

PCI Compliance Report

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

U06 IT Infrastructure Policy

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

F-Secure Messaging Security Gateway. Deployment Guide

Access control policy: Role-based access

Network Security Administrator

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

Achieving PCI-Compliance through Cyberoam

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Using IPsec VPN to provide communication between offices

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY


Focus on Security. Keeping the bad guys out

What is the Barracuda SSL VPN Server Agent?

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

ICANWK602A Plan, configure and test advanced server based security

A Rackspace White Paper Spring 2010

Figure 41-1 IP Filter Rules

LifeSize Transit Deployment Guide June 2011

Internet Security Good Practice Guide. August 2009

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

ICANWK406A Install, configure and test network security

GroupWise SMTP Infrastructure Design:

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Chapter 1 The Principles of Auditing 1

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Automate PCI Compliance Monitoring, Investigation & Reporting

Firewalls. Chapter 3

allow all such packets? While outgoing communications request information from a

Network Defense Tools

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Best Practices for PCI DSS V3.0 Network Security Compliance

What would you like to protect?

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

NETASQ MIGRATING FROM V8 TO V9

How To Protect Your Network From Attack From Outside From Inside And Outside

CS Computer and Network Security: Firewalls

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

1 You will need the following items to get started:

Recommended IP Telephony Architecture

Internet infrastructure. Prof. dr. ir. André Mariën

OpenText Secure MFT Network and Firewall Requirements

Chapter 4: Security of the architecture, and lower layer security (network security) 1

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network Security Topologies. Chapter 11

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Network Infrastructure Security Good Practice Guide. August 2009

CS Computer and Network Security: Firewalls

FIREWALL POLICY DOCUMENT

Internet Security Firewalls

MANAGED SECURITY SERVICES

ADM:49 DPS POLICY MANUAL Page 1 of 5

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

IP Telephony Management

Securing Networks with PIX and ASA

How to Painlessly Audit Your Firewalls

Transcription:

Firewall Audit Techniques K.S.Narayanan HCL Technologies Limited

Firewall Management Technology Network Security Architecture Firewall Placement Firewall Appliance Rule base compliance with security policy Application Layer Controls Port Restrictions Anti-Spoofing / Topology controls Remote Access / VPN Firewall Availability Penetration Testing Process Risk Assessment Change Management Configuration Management Access control / Privileges ID Management Backup Monitoring Review Process Audit 2

Agenda Understanding the Firewall architecture / Zone classification Organization s Network Security Policy Basic concepts of a Firewall Rule base Mapping rule base to security policy Firewall Management Process Best practices Audit checklist 3

Sample Firewall Diagram Internet Border Router LAN 4

Sample Firewall Diagram OWA Mail Relay ContentDMZ Filter Proxy NIDS Internet Border Router LAN 5

Sample Firewall Diagram OWA ContentDMZ Filter Corp Network-A Mail Relay Proxy NIDS LAN-Insurance NIDS Internet Border Router NIDS Proxy Mail File/Print Intranet NIDS LAN- Retail CSN-DMZ Retail Network 6

Firewall Zones Zones establish the security borders of the network. A zone defines a boundary where traffic is subjected to policy restrictions as it crosses to another region of the network. 7

Sample Firewall Diagram OWA ContentDMZ Filter Corp Network-A Mail Relay Proxy NIDS LAN-Insurance NIDS Internet Border Router NIDS Proxy Mail File/Print Intranet NIDS LAN- Retail CSN-DMZ Retail Network 8

Zone Policy - Example DMZ- INBOUND Action Source Destination Port Protocol Controls Further options Allow Any DMZ-OWA 443 TCP HIDS Hardening Allow Any DMZ-SMTP Relay 25 TCP HIDS Virus Control SPAM Control Anti-Relay Allow CSN-Proxy DMZ-Proxy 3128 TCP URL Control ActiveX,Java Script Control Virus Control NAT Authentica tion NAT Comment Allow HTTPS Webmail access Allow SMTP relay access Allow Internet resource access DMZ- OUTBOUND Action Source Destination Port Protocol Controls Further options Comment Allow SMTP Relay Any 25 TCP HIDS Virus Control SPAM Control Anti-Relay NAT (Should not allow traffic to other zones except External) Allow E-mail out Allow DMZ-Proxy Any 80/443 TCP URL Control ActiveX,Java Script Control Virus Control NAT (Should not allow traffic to other zones except External) Allow Internet resource access 9

Firewall Rules - Example Source Destination Port Action Log Comment 10.5.0.0/24 192.168.10.11 443 Allow Log Htttps access to cropweb. CR-FW-00201 Updated by Ramesh 10/Jan/2005 Any 202.192.12.21 25 Allow None Allow SMTP relay access CR-FW-00005 Rule implemented by Madhu 23/03/2004 any@us-sales 192.168.10.2 192.168.10.3 192.168.10.24 443,80,21 Auth-Encrypt Log Allow US Sales to access Sales Report Web/ftp CR-FW-00123 10

Mandatory Firewall Rules Mandatory Rules Action Source Destination Port Protocol Controls Further options Comment Drop Any Firewall Any Any LOG Stealth Rule Drop Any Any Any Any LOG Cleanup Rule 11

Firewall Rule Base order (FW-1) User Authentication Rules VPN Access Rules Stealth Rule Zone ACL Rules Cleanup Rule 12

Principles Firewall Policies to be configured for minimum requirement. Need to Know Access to firewall devices is to be in strict accordance with the principle of least privilege. Access based on business requirements only 13

Change Management Documented and verifiable change management Change Request Form Detailed Conversation Map ( Source / Destination / Port / Protocol ) Purpose of the change Expiry Date Business Approval Exception Process Process to approve rules which violates Network Security Policy Coverage Rule creation / Modification / deletion NAT rule changes Routing changes Firewall Appliance configuration changes 14

Operating Procedures Backup Configuration and Policies Best practices recommended by the vendor should be followed ID Management Firewall Administrator ID VPN users Firewall Users Access Control Access to firewall device 15

Operating Procedures Monitoring & Logging Policy on Firewall Logging Compliance Requirements Retention Period Log Monitoring Roles and Responsibilities Review Firewall rule review process Audit Internal Audit Penetration Test 16

Best Practices Defined Firewall Zone ( Green, Red, Blue zone etc.,) Network Security Policy What is allowed? What is denied? Policy on dangerous protocols like remote desktop, Tunneling protocols etc., Change Management Process Explicit exception process Firewall Rule Review process No Single point of failure architecture NIDS integration Periodic Penetration testing 17

Recommended Approach Where to start? Understand the Firewall/ Security Zones Understand the protection objective What to verify? Firewall rules in compliance with the protection objective Excessive permissions Change control Firewall rule reviews VPN Users Remote Management Backup / Patch management 18

Audit Checklist 1. Develop background information about the firewall zones 2. Determine the objectives and protection requirements Security Policy 3. Is firewall rule base match the organization security policy? 4. Look for excessive permissions 5. Is firewall configured for minimum requirements? 6. Check the Change control process 7. Who all have access to firewall box? 8. Is there a Firewall rule review process? 9. Approval process for VPN / Remote access users 10. Is there a Remote Management of firewall? Is controls adequate? 11. Verify Backup / Patch management 12. Physical Security of the firewall device 13. What is the recovery strategy? Is there a test to confirm? 14. Log review and monitoring 15. Review latest Penetration testing report 19

Reference NIST Guidelines on Firewalls and Firewall Policy http://csrc.nist.gov/publications/nistpubs/800-41/sp800-41.pdf ISACA IS AUDITING PROCEDURE - FIREWALLS - DOCUMENT P6 http://www.isaca.org/contentmanagement/contentdisplay.cfm?contentid=18748 20

Thank You K.S.Narayanan ksnmails@yahoo.co.in