Check Point NG[s]AI

To write an entire Information Security Policy can take months of work with involvement from the Legal and Human Resources departments, as well as various business units. In order to implement Check Point NG AI, you need at a minimum an Executive Security Policy and a Perimeter Network Security Policy. Typically, the Executive Security Policy is a high-level document of about three to five pages that points to relevant standards, procedures, and guidelines. Because the highest levels of management or the board of directors must adopt the Executive Security Policy, it should be written without details about technologies, people, or methods . This will ensure that as technology changes or as people change, the document will not become obsolete. Think of the Executive Policy as a declaration of the importance of security to your organization. However, choose your words carefully because it is a legal document in many respects.

The Executive Security Policy is important because without an executive endorsement of your security policy, enforcement may become difficult. In order to write an effective Executive Security Policy you must identify early on the departments with an interest in maintaining information assets, such as R&D, Finance, and IT. Approach the managers and request their involvement in drafting an executive-level security document. In addition, you will want to include the Legal department and an executive sponsor.

Note  

Executive support and approval is critical to the success of your Information Security Policy. When the CEO has to follow the same rules as everyone else, it makes policy enforcement much simpler.

The final document should have language such as: Because of the nature of our business, customer non-public information is frequently transmitted or stored on our information systems. As a result, we will employ appropriate controls and safeguards including encryption to ensure that non-public information is adequately protected against unauthorized disclosure while in storage or transit. At this point, that the policy seems rather vague and legal. However, resist the impulse to say, We must use Triple DES encryption on all private data that is stored or transmitted. This is important because technology changes and this document will eventually be presented to management for approval. Management does not want to see you once a month asking for changes to the security policy. As a guiding principle, the Executive Security Policy should address why security is important and delegate the further implementation of appropriate standards, guidelines, and procedures to the appropriate individuals or groups.

Designing & Planning Get Trained

Use the Information Security Policy to help you do your job better and to get the things you need. For example, use the policy to ensure that you get security training. Include a statement in the policy that says, To ensure that we are adequately controlling and anticipating current and new threats, the security manager and his or her team must attend security training on a semi-annual basis in the form of conferences, seminars , symposiums, and workshops. As you can see, the Security Policy can be your friend.

 

Drafting the second part of your overall Information Security Policy, the Perimeter Network Security Policy, is somewhat different. The Perimeter Network Security Policy is a document that includes specific standards, procedures, and guidelines for implementing and maintaining perimeter network security. The first step in drafting a Perimeter Security Policy is to obtain a network map. The network map will help you to better identify resources that need protecting and how to architect your security solution. Depending on the size of your organization, you may elect to do this yourself or to obtain the assistance of individuals with specific knowledge regarding their environment. Although there are a number of software tools to assist you in automatically mapping the network, it will still be necessary to manually validate.

After mapping the network, determine once again the departments or business units with a specific interest in network perimeter security, and assemble the representatives for a meeting. The best approach in this meeting is to identify what is needed and then, by default, disallow everything else. It is at this point that successful security managers recognize the purpose of security to meet business needs. Although it would be great from a security perspective to disconnect the business from the Internet, to stay in business the connection must be maintained . In this meeting, you need to specifically ask the representatives what would need to be changed and configured to allow the business to continue, if you were to put up a firewall today and block everything,. This step is called defining requirements. For example, some of the requirements that might be voiced include the following:

In addition, you will also want to identify any wishes the representatives have. Examples of wishes are as follows :

You may find that most needs are simple and can use further refinement. For example, the requirement to send and receive e-mail begs the questions, From where do you need to send e-mail? Do remote users need to send and receive e-mail? Should there be any additional restrictions on e-mail? In addition, you should ask questions about what types of communication to log and how long these logs are kept.

Often you will be faced with end users that ask for more access than they actually need. This is typically rooted in the fact that they do not know, or are not sure, of what access is actually necessary. This can prove to be a trying situation, but it is best to work with these users to investigate what is required and explain why it is important to only allow the minimum access required.

The next stage in the drafting of the Perimeter Security Policy is risk assessment. Every requirement and wish has a risk attached to it. As a security professional, you must be able to identify those risks and communicate them to the involved parties so they can be weighed against the benefits.

Designing & Planning Community Involvement

Make sure that everyone who has an interest in the implementation and maintenance of a security policy is involved in its creation. This may involve representatives from Human Resources or even the custodial staff. Involvement from these departments will ease acceptance of the new policy and make the actual implementation much smoother. Sometimes, however, this involvement is legally mandatory if your company falls under HIPAA or other government regulations.

 

Security Design

After identifying the requirements and risks you are willing to accept, you must design security solutions. Having knowledge of the features and abilities of FW-1 NG AI will help you to determine what you can and cannot do. In addition, be aware of the other types of controls that can be used to maintain perimeter network security. There are three main categories of controls: technical, physical, and administrative. Each category of controls has three functions including preventative, detective, and responsive , as shown in Table 4.1. The firewall is primarily a technical control of a preventative and detective nature. That is to say, the firewall prevents unauthorized access and can be used to detect unauthorized access. However, do not dismiss addressing physical and administrative controls in your Perimeter Network Security Policy.

Table 4.1: Categories of Security Controls
 

Technical

Physical

Administrative

Preventative

Check Point NG AI VPN-1

Locked data centers Identification badges

User ID/password policy Change management

Detective

Check Point NG AI

CCTV

Log and report review Rule base audits

Responsive

Check Point NG AI

High availability

Incident response procedures

Other policies that FW-1 NG can help enforce are:

Firewall Architecture

Before writing the policy, one thing you need to explore is whether you will need to have different policies for different locations or if you will have only one. If you have one security policy, Check Point can enforce the same policy on all firewall modules from a central management station. Otherwise, you will have to maintain a different policy for different locations. Although for business reasons this might be necessary, it can add a level of complexity to your environment that could decrease your overall effective security. If it is necessary, make sure that it is thoroughly documented.

Writing the Policy

Now that you know what is necessary, you can write your Perimeter Network Security Policy. As you can see in Figure 4.1, writing a security policy is a logical progression of steps.

Figure 4.1: Steps to Writing a Security Policy

Briefly, the structure of the policy should include the following:

Following is a sample Perimeter Network Security Policy:

Introduction

Due to Company X s required connection and access to the public Internet, it is essential that a strong perimeter firewall exist that sufficiently separates the internal private LAN of Company X and the public Internet. The firewall should provide preventative and detective technical controls for access between the two networks.

Guidelines

The implementation of any firewall technology should follow these basic rules:

Standards

The implementation of any firewall must follow these basic rules:

In addition, the following standards for perimeter networks are as follows:

Procedures

The firewall will be configured to allow traffic as defined below.

Deployment

The security administrator will define the rule base and configure the firewall as defined above, in addition to other industry standard properties (as appropriate).

Enforcement

Traffic patterns will be enforced by the firewall s technical controls as defined by the firewall administrator. Periodically, an external vulnerability assessment will be performed to assure the proper configuration of the firewall. Additionally, an independent third party will annually audit the configured firewall.

Modifications or Exceptions

Requests for modification to the firewall configuration must be submitted via e-mail to the security manager and firewall administrator, accompanied by justification and the duration of the requested change. The security administrator is allowed to make modifications outside the company s change control process in cases where they deem it necessary to prevent or contain disastrous events.

Категории