0% found this document useful (0 votes)
150 views6 pages

Firewall Security Standard-Sample

This document establishes a uniform firewall security standard for ABC Ltd. It defines the minimum configuration requirements, including only allowing necessary ports and protocols, restricting administrative access, implementing spoofing and noise drop filters, enforcing logging and patching, and denying all incoming and outgoing traffic by default with exceptions. The standard is reviewed in accordance with ABC's security policy and the incident response team can take emergency actions as outlined in the incident response procedure.

Uploaded by

Saeed Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
150 views6 pages

Firewall Security Standard-Sample

This document establishes a uniform firewall security standard for ABC Ltd. It defines the minimum configuration requirements, including only allowing necessary ports and protocols, restricting administrative access, implementing spoofing and noise drop filters, enforcing logging and patching, and denying all incoming and outgoing traffic by default with exceptions. The standard is reviewed in accordance with ABC's security policy and the incident response team can take emergency actions as outlined in the incident response procedure.

Uploaded by

Saeed Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

Firewall Security Standard

Developed by

This information contained in this document is the prop


confidential and shall not be copied, published or made available to third p
whole or in part without the written permission of ABC Ltd.

Classification: Confidential
Distribution Controls
This distribution of this document is controlled to authorized control leaders only.

Updates and replacement of this document is managed by the Systems & Information Security
Manager. Plan recipients who cease to responsible for the scope
surrender all copies of the document to the Systems & Information Security Manager.

Document History

Version Date Update Details Author Censorsh Approbation

ip

1.0 Establish IT Security Policy Document

This version supersedes all previous versions issued prior to the date indicated above
Contents
1. Purpose..................................................................................................................................... 4
2. Scope........................................................................................................................................ 4
3. Standard....................................................................................................................................4
4. Review.......................................................................................................................................6
5. Emergencies..............................................................................................................................6
1. Purpose

To e s t a b l i s h a u n i f o r m s e t o f s t a n d a r d s f o r i m p l e m e n t i n g a n d
firewall standard, including but not limited to type and nature of traffi
a l l o w e d o r d e n i e d a c c e s s t o A B C LT D n e t w o r k . A l s o , t o m a i n t a i n t h e s t
network and increase the security for identified resources.

2. Scope

This standard covers the minimum security configuration requirements for firewall.

3. Standard

All opened ports must have accompanying documented justification.


Unnecessary ports must be blocked to avoid any kind of misuse.
Access to ABC LTD network firewalls allowed only to certain network and information
security personnel as per their Roles and Responsibilities.
All administrative access to ABC LTD network firewalls will be governed by the
following rules:
o All administrative users must authenticate via ___________.
o A backup administrator account shall be used only for console access.
o All administrative access shall be encrypted, at a minimum, via the
following methods:
 Method-1: _______________
 Method-2:________________
o All administrative access shall be restricted to networks and hosts
o Each network firewall will present the login banner when a user logs in to
the device:
Anti-spoofing filters (blocked private addresses, internal addresses appearing from
the outside) must be enabled.
Noise drops (e.g. discard OSPF and HSRP chatter) should be enabled
Alert must be generated to system administrator about traffic that is suspicious
Logging should be enabled and that the logs are reviewed to identify any potential
patterns that could indicate an attack.
Latest patches and updates related to firewall product should be tested and installed
as per firewall management procedure.
Firewall rule-set must comply with ABC LTD IT Security Policy
State tables should be reviewed to ensure that appropriate rules are set up in terms
of source and destination IP’s, source and destination ports and timeouts.
Timeouts should be appropriate so as not to give the hacker too much time to launch
a successful attack.
Hot standby firewall should be available in case of primary firewall failure.
Default user name and passwords should be reset.
The firewall should be appropriately configured to know which hosts are on which
interface.
Firewall access control lists should be reviewed to ensure that the appropriate traffic
is routed to the appropriate segments.
There should be deny rule for traffic destined to critical internal addresses from
external sources
The rule should be set specifying that only traffic originating from IP’s within the
internal network be allowed. Traffic with IP’s other than from the internal network is to
be dropped.
The traffic originating from IP’s other than from the internal network are logged.
The readdressing option should be enabled such that internal IP addresses are not
displayed to the external untrusted networks.
The rule should be set to block ICMP echo requests and replies.
The rule should be set to block outgoing time exceeded and unreachable
messages.
Loose source routing and strict source routing (lsrsr & ssrr) are blocked and logged
by the firewall.
 The following spoofed and illegal addresses are blocked:
o Standard unroutables
 255.255.255.255
 127.0.0.0
o Reserved addresses
 240.0.0.0
o Illegal addresses
 0.0.0.0
o UDP echo
o ICMP broadcast
 The traffic from the above addresses is not transmitted by the interface.
 Running and startup configurations must be synchronized.
To deny all outgoing traffic and will have exceptions based upon the specific
business requirements of ABC LTD
To deny all incoming traffic and will have exceptions based upon the specific
business requirements of the ABC LTD

4. Review

This standard will be maintained in accordance with the Security Policy [ITS-ABC LTD-
02].

5. Emergencies

In emergency situation, actions may be taken by the Incident Response Team in


accordance with the procedures in the Incident Response Procedure.

You might also like