IT Security
Preventative Detective Responsive
Creating a Security Policy
Guidelines
The implementation of any firewall technology should follow these basic rules:
The firewall should allow for filtering munication protocols based plex rule sets.
The firewall should provide extensive logging of traffic passed and blocked.
The firewall should be the only entry and exit point to the public from panyX LAN.
The firewall operating system should be sufficiently hardened to resist attack both internal and external.
The firewall should fail closed.
The firewall should not disclose the internal nature, names, or addressing of panyX LAN.
The firewall should only provide firewall services. No other service or application should be running on the firewall.
Standards
The implementation of any firewall must follow these basic rules:
It is the policy that only the identified firewall administrator is allowed to make changes to the configuration of the firewall.
It is the policy that all firewalls must follow the default rule:That whih is not expressly permitted is denied.
In addition, the following standards for works are as follows:
The deployment of public services and resources shall be positioned behind the firewall in a protected .
The firewall shall be configured to disallow traffic that originates in the to the general LAN.
Any application work resource residing out
checkpoint学习笔记 来自淘豆网m.daumloan.com转载请标明出处.