Network Security, Firewalls and VPNs by Stewart
Author:Stewart
Language: eng
Format: epub
Publisher: Jones & Bartlett Learning LLC
Published: 2013-03-10T16:00:00+00:00
CHAPTER
8 Firewall Deployment Considerations
FIREWALLS CAN BE COMPLEX security solutions. You should plan the deployment of a firewall carefully, whether it’s for a small home office or a large corporation. Evaluate as many firewall deployment considerations as possible before ramping up.
Make a clear determination as to what types of traffic you will allow to cross the network border and which types you want to block. Evaluate common security strategies. They include security through obscurity, principle of least privilege, simplicity, defense in depth, defense diversity, chokepoint, weakest link, fail-safe, and forced universal participation. Determine which strategies you want to use and integrate them into the organization’s security policy and its firewall deployment.
Evaluate the purpose and content of the firewall policy. Clearly define the software and hardware firewall options you will use when adopting the firewall policy. Determine whether features such as reverse proxy and port forwarding are necessary to the infrastructure’s network communications. Weigh the benefits of bastion host OSs before using new firewalls. Make sure to order firewall rules properly and use the least number of rules possible to enforce security goals.
Every organization is different and must evaluate its own business and security needs. Determine which tasks are essential, which are optional, which are personal, and which are malicious. Use firewalls and other controls to support what’s necessary and block everything else. Security administrators are responsible for evaluating needs and solutions and for preparing a response when security and business interfere with each other.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7649)
Grails in Action by Glen Smith Peter Ledbrook(7562)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(5762)
Azure Containers Explained by Wesley Haakman & Richard Hooper(5705)
Running Windows Containers on AWS by Marcio Morales(5228)
Kotlin in Action by Dmitry Jemerov(4918)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4456)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4323)
Combating Crime on the Dark Web by Nearchos Nearchou(4020)
The Age of Surveillance Capitalism by Shoshana Zuboff(3771)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3678)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3483)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3401)
Python for Security and Networking - Third Edition by José Manuel Ortega(3260)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3219)
Mastering Python for Networking and Security by José Manuel Ortega(3218)
Blockchain Basics by Daniel Drescher(3179)
The Ultimate Docker Container Book by Schenker Gabriel N.;(2937)
TCP IP by Todd Lammle(2863)
