PG For IGS-v1.1 - EN
PG For IGS-v1.1 - EN
INFORMATION SECURITY
Practice Guide
for
Version 1.1
June 2021
Unless otherwise indicated, the copyright in the works contained in this publication is owned
by the Government of the Hong Kong Special Administrative Region. You may generally
copy and distribute these materials in any format or medium provided the following conditions
are met –
(a) the particular item has not been specifically indicated to be excluded and is therefore
not to be copied or distributed;
(b) the copying is not done for the purpose of creating copies for sale;
(c) the materials must be reproduced accurately and must not be used in a misleading
context; and
(d) the copies shall be accompanied by the words "copied/distributed with the permission
of the Government of the Hong Kong Special Administrative Region. All rights
reserved."
If you wish to make copies for purposes other than that permitted above, you should seek
permission by contacting the Office of the Government Chief Information Officer.
AMENDMENT HISTORY
Amendment History
Table of Contents
1. Introduction ........................................................................................................................ 1
1.1 Purpose............................................................................................................................... 1
1.2 Normative References ........................................................................................................ 2
1.3 Terms and Convention ....................................................................................................... 2
1.4 Contact ............................................................................................................................... 3
2. Internet Gateway Overview ............................................................................................... 4
2.1 Interconnection of Networks.............................................................................................. 4
2.2 Recommended Security Protection .................................................................................... 4
2.3 Internet Gateway Architecture Sample .............................................................................. 6
3. Firewalls ........................................................................................................................... 12
3.1 Firewall Configuration ..................................................................................................... 13
3.2 Firewall Administration ................................................................................................... 14
4. Routers ............................................................................................................................. 15
5. Mail Gateway Security .................................................................................................... 16
5.1 Mail Server Design and Configuration ............................................................................ 16
5.2 Email Bombing, Spamming and Spoofing ...................................................................... 16
5.3 Access Control ................................................................................................................. 18
6. Web Security.................................................................................................................... 19
6.1 Web Server Configuration and Administration ............................................................... 19
6.2 Access Control ................................................................................................................. 20
6.3 Web Content Management .............................................................................................. 20
6.4 Common Gateway Interface (CGI) Programs and Application Programming Interface
(API) ................................................................................................................................ 21
6.5 Authentication .................................................................................................................. 22
6.6 Web Browser ................................................................................................................... 22
6.7 Active Content and Cookies ............................................................................................ 22
7. Remote Access ................................................................................................................. 25
7.1 Dial-up access .................................................................................................................. 25
7.2 Virtual Private Network (VPN) ....................................................................................... 26
8. Domain Name System (DNS) Servers ............................................................................. 28
Annex A Sample Protection Checklist For Internet Gateway Security ............................. A-1
1. Introduction
Any B/D that supports Internet facilities shall protect its information systems and
data assets from unauthorised access or public break-ins. All Internet access from
departmental network shall be made through centrally arranged Internet gateways or
B/D's own Internet gateway.
This document provides technical guidelines on Internet gateway for secure Internet
access and services. These guidelines represent what are regarded as best practices
to maintain security risks at an acceptable level under the Internet open platform. It
is intended for staff who are involved in the operational and technical functions of
Internet gateway services.
As the materials included in this document are general in nature and are prepared
irrespective of computer platforms, readers should consider and select those that are
applicable to their own environment.
1.1 Purpose
The following referenced documents are indispensable for the application of this
document.
For the purposes of this document, the terms and convention given in S17, G3, and
the following apply.
NA NA
1.4 Contact
This document is produced and maintained by the Office of the Government Chief
Information Officer (OGCIO). For comments or suggestions, please send to :
Email: [email protected]
Because of the openness of the Internet and the rapid growth of complex network
services and applications, the lack of security protection on the gateway may leave
the internal network vulnerable to attacks. Hence, an Internet gateway should be
properly configured with appropriate security measures to protect it from attacks.
Maintain their own specific security defences on their networks, hosts and
systems.
Maintain their own security policies and guidelines, and these policies and
guidelines should be aligned with those on the Internet gateway.
Set up stringent logical access controls to the Internet gateway.
Establish security incidents handling and reporting procedures for the Internet
access and services.
Advise and train users to observe and follow the related security policy,
guidelines and procedures.
That is why other security functions (such as intrusion detection and prevention, and
malware scanning) should be used together. However, it is observed that the
boundary between firewall and other security measures is becoming blurred as
firewall manufacturers continuously incorporate additional features, e.g. Virtual
Private Network (VPN), encryption, etc. to firewall.
Two packet-filtering routers (one external and one internal) are used to filter and
route the selected traffic to the firewall from either external side or internal network.
In order to connect to the Internet, the external packet-filtering router should be set
up. The internal packet-filtering router is used to separate the DMZ segment (which
will be explained in later sub-section) from the internal network. Unlike firewalls,
these routers are normally considered as network devices with value-added security
features rather than as security products.
The intrusion detection and prevention stated above refers to any means, such as
tools or procedures, that can provide such functions, but may not be necessary a
physical device. However, procedure-based mechanism to detect and monitor
intrusions is a slow and manual way, and is considered not adequate to protect
against rapidly changing intrusion attempts. The use of IDPS tools can help to
automate, speed up and facilitate the intrusion detection and prevention process. As
such, B/Ds are recommended to deploy such tools to detect and stop intrusions.
Apart from that, a set of security policy and procedures should be developed for
controlling and monitoring the Internet gateway. There is a need to perform security
audit regularly, after major changes or prior to implementation to ensure that the
Internet gateway is set up properly in accordance with the security policy. Even if
there is no internal network connection, it would still be better to have the above
recommended security protection.
This architecture can separate the internal network from the external one, and can
hide the information about the internal network. Separate segments may be assigned
within the DMZ for better access control and protection. Network segmentation/
isolation should be adopted. Moreover, cross-network connectivity should be
provided only when necessary.
In fact, Internet gateway architecture for different services may require specific
tailoring depending on many factors such as network infrastructure, services
provided, performance, mode of operations, cost and so on.
Separate web servers should be used to restrict access when providing different
information to internal and external users.
Web servers can be placed inside or outside the internal network. Web servers
used for providing information to internal users shall be placed inside the
internal network and any connection from public or external users is prohibited.
For web servers used for disseminating information to the public or external
users, they shall be placed in the DMZ and protected by the firewall. All
outside web servers need to be connected to the firewall in the DMZ with a
separate network interface.
A dedicated host should be assigned for running a web server, a mail server or
any critical service separately. Individual host should have protective measures
to guard against attack from other compromised hosts. In case of being
compromised, this can reduce the impact to other services.
All host names and addresses stored in an external DNS server are supposed to
be exposed to public. Hence, the external DNS server shall not hold
information about the internal network. If the external DNS server is hosted at
the Internet Service Provider (ISP), resilience should be considered to ensure
system availability.
A separate internal DNS server could be set up and placed in the internal
network if internal domain information is needed, but the information shall not
be disclosed to the Internet.
These tools reside in the networks or hosts to detect any suspicious activities, and
monitor the network traffic or system activities. In general, IDPS should be installed
at critical nodes of network. Critical nodes are referring to strategic connection
points in front of critical IT assets or junctions of different security perimeters, e.g.
mission critical systems, servers with sensitive data, Internet gateway, remote access
gateway, floor of senior staff, etc. Some suggestions are listed as follows:
IDPS should be kept update with latest signatures and recognition patterns for
security threats. Latest patches should also be applied.
IDPS should be placed at critical nodes of network, such as DMZ to detect
external attacks or places in the internal network to detect internal attacks if
required.
The operation of the IDPS should be as stealth as possible. It should be hidden
and protected by the firewall system to protect it from attacks.
Do not solely rely on IDPS to protect the network. IDPS are only real-time
detection tools to alert users on abnormal or suspicious activities. More
importantly, the network should be properly configured with all necessary
security protection mechanisms. The whole network should be closely
monitored and regularly reviewed so that security loopholes or misconfiguration
can be identified promptly.
2.3.4 Firewalls
Depending on the security requirements, the use of two or more firewalls or routers
in serial helps to provide an additional level of defence. For example, two firewalls
in serial (one internally connected with the internal router and one externally
connected with the external router) may be required to provide different protections.
If there is one RAS, such as VPN gateway, connected to the DMZ and placed
between the internal and external firewall, the external firewall may aim at blocking
malicious traffic from the Internet while the internal one may aim at blocking
malicious traffic from the internal network users and the remote access users
connected to the RAS.
If multiple firewalls are used in parallel for load balancing or performance reasons,
the configuration of each firewall should be aligned.
A separate host machine may be set up together with the firewall to check for
malware in all incoming traffic when going through the firewall. This can
centralise the control in updating signatures for malware, and prevent the
malware from entering into the web or mail servers.
Malware detection measure may also be installed in other positions, such as
incorporated with the mail server or the web server to specifically protect
individual servers.
The decision of where to apply malware detection measure depends on many
factors such as network architecture, performance, system or data to be
protected and the required protection level. In most cases, mail server should be
accommodated with malware detection measure as usually malware come in as
email attachments.
Authorised users may like to have a remote access capability, i.e. to access
internal network from remote locations. This capability may introduce
vulnerabilities, and thus it should be implemented and managed properly.
Request for remote access should be authorised with adequate justification.
Authentication mechanism shall be used to control remote or dial-in access.
Figure 2 above shows a proxy server, which serves to control internal users’ access
to the Internet.
Some firewalls can enforce proxy servers for typical services such as TELNET, File
Transfer Protocol (FTP), HyperText Transfer Protocol (HTTP) and SMTP, so that
no communication can go through the firewall without application level mediation.
Firewall and proxy servers can perform some kinds of user authentication functions.
It can also consider the use of a central database, known as "authentication server" to
centrally store all the necessary information for authenticating and authorising users
such as user passwords and access privileges. In addition, these authentication
servers can support stronger authentication schemes such as the use of tokens and
smart cards, which may not be able to be supported by proxies.
For example, Remote Authentication Dial-In User Service (RADIUS) and Terminal
Access Controller Access Control System Plus (TACACS+) are common schemes
used for remote authentication. Referring to Figure 2, an authentication server can
be used to authenticate remote dial-in users before they are granted access rights to
the network.
The communication between user devices and the authentication server should
be encrypted and be protected from security threats, such as eavesdropping and
replay attacks.
3. Firewalls
A firewall should be installed at all network junctions between internal network (e.g.
department's network), external networks (e.g. Internet), and any network points that
the flow of data is required to be examined, restricted, filtered or redirected.
There are different types of firewall available in the market. Upon selection of a
firewall product, the following core criteria should be considered:
Product features.
Performance / throughput.
Interoperability with existing network.
Reliability.
Resilience.
Ease of management.
Vendor support.
Product certification (e.g. GB/T 20281, GB/T 32917, ISO/IEC 15408).
Support to authentication services (e.g. RADIUS).
System capacity and scalability.
Logging.
Price.
Customer reference.
Skill sets availability.
Security requirements.
Firewall should be properly configured to filter traffic, control access and perform
content filtering. Poor or incorrect configuration of a firewall may result in a false
sense of security, which is more dangerous than without a firewall.
All incoming and outgoing Internet traffic should be forced to go through the
firewall, which is the sole means of entry from and exit to the Internet.
Do start with a conservative firewall security policy, i.e. "Deny all services
except those explicitly permitted." It is recommended not to blindly follow the
default settings in the firewall.
All services allowed to go through the firewall should be carefully planned and
evaluated.
The firewall can be configured to use network address translation (NAT) to hide
internal network information such as IP addresses. In an IPv6 environment,
B/Ds may allow end-to-end connectivity to the Internet if there are operational
necessities. In doing so, proper security measures, such as using temporary IP
addresses to inhibit user activities profiling, should be considered.
The firewall should be configured to enable content filtering, and malware
scanning capabilities.
The firewall should be properly configured for IP level filtering.
The firewall should be configured to block unused ports and filter unnecessary
traffic, e.g. unnecessary incoming or outgoing Internet Control Message
Protocol (ICMP) traffic.
The firewall itself should be physically secured.
The firewall policy established should be flexible for future growth and
adaptable to changes on security requirements.
Correctly set and assign file permissions on firewall. Permissions on system
files should be as restrictive as possible.
A firewall should be thoroughly tested, and its configuration should be properly
verified before going production.
A firewall test is necessary after major change or upgrade to the firewall.
All software and OS installed on the firewall should be maintained with proper
version by periodically revisiting the vendor sources and upgrading with patches
and bug fixes.
Real-time alerts should be set up for emergency incidents.
Audit trail function should be enabled such that any configuration modifications
made by administrators or intruders can be traced.
4. Routers
Routers are used to connect two or more networks. They can filter traffic and
restrict access to servers or network components, similar to the application proxies.
The following guidelines should be observed and followed when configuring and
managing routers in the network:
To set up a secure mail gateway, the following guidelines should be observed and
followed.
A mail server should be run behind a firewall system, which helps to restrict the
access to the mail server and provide various security protections.
Properly configure firewalls or routers to block unwanted traffic such as traffic
from particular IP addresses of known spammers, into the mail server or
gateway.
Anti-malware protection should be adopted for filtering inbound and outbound
email including any attachments that contain malware.
The email system should not disclose names or IP addresses of internal network
or systems.
The email system should be properly configured to avoid disclosing internal
systems or configurations information in email headers.
Directories of internal email addresses should not be made publicly accessible.
Mail gateway should be capable for logging all email headers for auditing. It
should provide information such as how, when and where an email is entered or
left.
If there are email bombs or spam emails, identify the source or origin of emails
and configure the router or firewall to block or drop the emails.
Mail relay functions for unauthorised users or IP addresses should be disabled.
Internet mail exchange should enable Sender Policy Framework (SPF) and
should stamp outgoing mails with DomainKeys Identified Mail (DKIM)
signature to facilitate the receiving side to verify such mails as sent by the
Government.
Internet mails shall be protected by Domain-based Message Authentication,
Reporting & Conformance (DMARC) protocol, which is an email
authentication protocol to give email domain owners the ability to protect their
domain from unauthorised use, such as email spoofing.
Email spoofing refers to emails in which the sender or other parts of the email
header are manipulated to appear as from a different user or source with
impersonated identity. Email bombing/spamming may be combined with email
spoofing, making it more difficult to determine who actually sent the email.
If mail servers are not properly configured, they may suffer from these kind of email
attacks. The mail system may crash, overload or even lose internal data because all
available resources are plundered by the spammers. The cost of recovery to normal
service may also be high.
Listed below are some points for protecting from email bombing, spamming and
spoofing:
Set a limit on the maximum file size of an email, or on the maximum number of
email messages that can be transmitted within a certain period of time. This can
avoid flooding to eat up all available network resources or disk space.
Update spammer list regularly.
Set up spam blocking system before mail server to block out unwanted emails.
Such spam blocking system acts as an email gateway to filter out spam emails
before entering the mail server based on various criteria, such as email header,
content, spam blacklist, spam whitelist, reverse DNS lookup, SPF and DKIM
information.
6. Web Security
Since the web server is facing the Internet, strong host and network security
protection should be employed. The security guidelines on web security described
in this section should be observed and followed. For best practices on defending
websites and web applications against cyber threats, please refer to the Practice
Guide for Website and Web Application Security.
Web server software is an application running on a host system, often facing the
Internet, to provide information or web services to users. The below security best
practices are important for deploying and maintaining a secure web server.
All websites and pages should be thoroughly tested and checked before
production or after major changes.
Control should be made such that only delegated and authorised persons could
have rights for posting and updating web pages to the production environment.
If a web server has to be shared among different sections or even departments,
different web content directories or resources should be granted with access
control to restrict the access, execution and storage of these web applications.
No links to internal files, which are stored outside the assigned web directories,
should be set in the web applications.
Adequate access control should be applied to the folders and files to ensure
users cannot access any files that stored in the web server but not intended for
user access.
User access logs such as unauthorised access attempts to system files should be
kept so that any abnormal or suspicious activities can be traced.
No administration privileges on the OS and web server should be granted to
web content developers.
Establish web content management procedures for posting or updating web
pages and applications to the web server.
For web forms or applications that accept user input, all input data should be
properly checked, validated and sanitised before passing to the backend
application. Any unexpected input, e.g. overly long input, incorrect data type,
unexpected negative values or date range, unexpected characters, should be
handled properly and would not become a means for attacking the application.
Unnecessary contents such as platform information in server banners, help
database, online software manuals, and default or sample files should be
removed from production servers to avoid disclosure of internal system
information.
Usually web servers can be extended using Common Gateway Interface (CGI)
programs and Application Programming Interfaces (APIs) to improve their
capabilities. Default CGI programs supplied with web servers may provide
unintentional "back door" access to web content. Such programs may leak internal
information about the host system and may be vulnerable to attacks. Moreover, CGI
programs often accept user input data.
CGI programs and programs built on APIs should be properly designed, tested
and examined to ensure that they only perform the desired function. No default
or custom CGI programs and APIs should be remained on the server unless they
are thoroughly tested and verified.
These programs should be run and stored in a restricted environment such as in
a designated directory, to limit the access and facilitate the maintenance.
These programs should be given executable permissions only, but not readable
or writable permissions. Use of system resources should be limited including
the CPU time, timeout period and disk utilisation. Access to other data files or
information should be properly restricted.
Programs should not be resided in the default directories of program files such
as compilers, interpreters, shells and scripting engines. They should be located
safely in appropriate directories and should be removed completely from the
web server when not required.
User data input to these programs should be properly checked, validated and
sanitised before passing to the server software or the underlying OS to prevent
them from triggering command-line function.
6.5 Authentication
Web browsers should be properly configured. Some suggestions are listed below for
reference.
Active content enables information servers to tailor their presentation script which is
to be executed in the client side browser. Examples are Java applet and ActiveX. It
is important to note that plug-in based technology is migrating to plug-in free
technology, due to the rise of web usage on mobile device browsers which typically
do not support plug-ins. B/Ds should check the end of support date for plug-ins at
the official websites of software vendors and prepare a viable migration plan
beforehand.
Cookies are mechanisms used by the server side to maintain the state information of
a client's browser when using stateless connection protocol such as HTTP.
Java applet is a program that is usually embedded in a web page. Client browsers
may automatically download Java applets for execution. Nevertheless, Java system
restricts its applets to a set of safe actions known as “sandboxing” making them
difficult to damage the file system or the boot sector of a client computer. When
developing Java applets, developers should design and restrict access of Java applets
to designated directories, files and OS properties.
The following areas should also be considered at the client side where Java applets
will be running:
6.7.2 ActiveX
6.7.3 Cookies
Cookies are mechanisms used by server side to store and retrieve information from
client side. They are objects, which provide state information of the client to the
server such as descriptions of accessed URLs, client user's email addresses and
sensitive information. An attacker can masquerade as the server to retrieve cookies
from the client.
System developers should be aware that it is inappropriate for cookies to keep too
much private information. Plaintext user name and passwords should never be kept
in cookies. Apply encryption to the entire cookies if authentication information is
needed to be stored in the cookies. System designers can also include some control
information such as an expiration date and time to restrict the valid period of the
cookies and hence, reduce its potential damage.
7. Remote Access
Remote access refers to the use of network resources from a remote location, which
is not directly attached to the network. There are different ways of remote access,
such as dial-up access and Virtual Private Network.
Dial-up access is one form of remote access over a public telephone network. Only
authorised persons should be allowed with dial-up access. B/Ds should keep an
updated inventory of their dial-up access points and modem lines. Dial-up access is
advised to be safeguarded by user authentication, and dial-up passwords should be
changed regularly. In some cases, two-factor authentication may need to be
implemented.
B/Ds should also consider using call-back security feature. With call-back security,
the answering modem accepts the incoming call and authenticates the user. Once
the user is authenticated, the modem disconnects the call and then places a call-back
to the user using a telephone number in a predefined database. The implementation
assists in preventing unauthorised access or use of stolen credential. Although call-
back improves security, it is susceptible to compromise by call forwarding and
should be used together with other security controls such as two-factor
authentication for dial-up connection to sensitive environment.
Access logs should be kept for every dial-up request. At least the following
information should be recorded: date, time and duration of access, username, and the
connected communication port. The access log should be made available for the
inspection when necessary.
In addition, the following best practices should be followed regarding dial-up access:
Clearly identify users who would be granted with remote access privileges and
what types of services could be provided to them.
Only authorised users should be allowed to gain remote access to the network
with proper authentication and logging.
Properly configure firewall system to restrict remote access.
RAS and modem pool should be physically secured.
A central modem pool is recommended to be used for ease and effectiveness of
management and control.
Connection to RAS should be logged to record the login session initiation and
termination, the connection starting and ending time, the addition, updates or
deletion of user accounts on the RAS and etc.
In addition to traditional layer 2 and layer 3 VPN, SSL-VPN (Secure Sockets Layer
Virtual Private Network) is another VPN technology providing the tunnelling
protection. In SSL-VPN, the tunnel rides on TLS (Transport Layer Security)
communication sessions. SSL-VPN differs from traditional VPN because it can
operate without the need of VPN client software while the traditional VPN usually
requires client software.
A Domain Name System (DNS) server provides support for mapping and translation
between domain names and IP addresses. The DNS server can provide information
such as the IP addresses lists of hosts in a given domain, IP address-to-hostname
mapping, and email address.
To protect the DNS servers, the following guidelines should be observed and
followed:
Designing a signing system – how to integrate the system with the existing DNS
architecture and the changes to the existing procedures of DNS management
have to be considered.
Signing in a testing environment – before releasing the system to the external
world, test the complete system, including all the defined procedures, under a
testing environment.
Checking DNS servers – verify the external authoritative name servers
supporting DNSSEC.
Key generating and management – the procedures to generate, publish and
manage keys, as well as the size and lifespan of the keys should be planned.
Establishing emergency procedure – the procedures to re-generate keys and re-
sign the zone for should be established for case of key compromise.
Content Delivery Network (CDN) service provides faster content delivery such that
the content is replicated and stored in a distributed way. However, CDN may have
limitation in the extent of their DNSSEC support. In such scenario, the domain
name records owned by B/Ds shall be protected by DNSSEC while the lower layers
of the domain name should be protected by DNSSEC as far as practicable if CDN
service is deployed.
If possible, IDPS tools should be installed and used at strategic locations to collect
and examine information continuously for suspicious activity. Both network based
and host based IDPS tools could be used. The former type examines network
packets in the network while the latter one monitors the system configuration and
application activities on a single host system.
Improper configuration and use of these tools may disclose information to attackers
and result in a false sense of security.
IDPS tools should be used to identify suspicious activities on both the network
and the host machines, in particular the web server and the mail server.
Automatic generation of notifications or alerts by electronic messages or mobile
paging should be set up to warn system administrators when symptoms of
attacks are detected.
If applicable, systems or functions capable of reacting to suspicious network
activity should be implemented to disconnect or block these connections in the
first place and record them for subsequent analysis.
These tools should be properly tested and verified before going operation.
The use, administration and management of these tools should be properly
controlled and restricted.
Firewall system should be properly configured to protect and hide such tools as
far as possible.
The attack signature files should be kept up-to-date.
New update of signature file and blocking rules should be tested thoroughly and
verified before putting into production. The new update should be tested to
determine whether its new / modified signature and blocking rules perform as
expected, and whether it conflicts with the original signature and blocking rules.
Proper operating, administrative and monitoring procedures should be
established for using these tools. The procedures should be reviewed
periodically to ensure the network configuration is up-to-date.
The strategic places for IDPS deployment could be on firewall, hosts or any
information assets that are important. A secure Internet gateway could be
introduced in the Internet Gateway infrastructure as a first line of defence deployed
between the Internet and the existing Internet Gateway to fight against threats on the
Internet. The secure Internet gateway could be configured by allowing intrusion
detection and prevention in web filtering, https traffic inspection, bad IP address and
bad domain detection or blocking and monitoring of network traffic, detecting
malware, and preventing information systems from infection.
Apart from the above specific network components, there are also some security
issues that should be concerned. Some related issues are discussed in the following
sections.
10.2 Logging
Enable logging functions wherever applicable in firewall, router, OS, web server
and mail server.
Keep logs such as the error logs, system logs, access logs, web server and mail
server logs with adequate storage capacity available.
Endeavor to log information such as invalid account login attempts, account
misuse in websites, illegal or unauthorised attempts to websites, administrative
and configuration updates, or specific information of requests, including
requestor's IP address, host name, URL and names of files accessed.
Logs should be reviewed regularly and kept for at least a week in a secure place.
Write-once device such as optical disk may be used to record those log files.
Logs showing intrusions and attacks should be kept properly for investigation
and record.
Consideration on privacy should be made when designing the types and details
of information to be logged.
Operating system (OS), where the network application software are running on,
should be carefully selected with respect to the security requirements. The
vulnerabilities or security holes of the OS may affect the security of the application
software.
A secure OS platform should be chosen especially for the firewall and critical
servers. It is preferable to select those OSs which can provide the following
features:
Different OSs have different ways to secure their configuration. Listed below are
some examples for general reference.
As P2P networks facilitate file sharing among peers, malware can exploit this
channel to propagate themselves to other peers.
The P2P application may contain vulnerability that attacker may use for
spreading malware, hacking or launching a denial of service attack.
When a file is downloaded using a P2P software, it is not possible to know who
created the file or whether it is trustworthy. The person downloading the file
might be exposed to criminal and/or civil litigation if any illegal content is
involved.
Use of P2P applications in B/Ds’ networks could generate large amount of
network traffic, monopolising network bandwidth that impacts other important
business applications.
As P2P technology relies on user workstations, it is unmanageable from the
server side aspect and all the security measures implemented at server side has
no effect to such P2P sharing.
The best practices for mitigating the risks of P2P technology are listed below.
Security risk assessment should be performed periodically, after major changes and
prior to implementation. It is required to be performed at least once every two years.
It targets at reviewing the existing security measures and identifying for any
potential security vulnerabilities.
Audit scope and objectives should be clearly defined to ensure that all target
network components are included.
Technical audit review should be performed prior to implementation. Host
based scanning is necessary for each host in the gateway, especially for the
running services and file permissions.
Firewall policy should be thoroughly audited for its rules and allowed services.
Password mechanisms should be checked and assured for effectiveness.
After audit, testing results and data should be removed from the network
components and stored securely.
Access should be controlled to prevent unauthorised persons from accessing the
scanning tools.
Audit recommendations should be followed up as soon as possible.
***ENDS***
Annex A
Firewall Administration
Well document firewall configuration, administration and
operational procedures
Make identical configuration for multiple firewalls when used in
parallel
Perform integrity checking of the configuration files periodically,
e.g. using checksums
Regularly record and review firewall logs
Make regular backups of the system and configuration files
Properly maintain administrative and user accounts, and change
their passwords periodically
Provide ongoing training to firewall administrators
Designate at least 2 firewall administrators
Incorporate firewall administration with security incident
handling
Establish an effective communication channel between LAN and
firewall administrators
Conduct regular security risk assessment and audit
Intrusion Detection
Operational Control
and Prevention
Establish manual procedures for operational control
Regularly review and analyse logs
Monitor and analyse user and system activity
Protection Against
Malware Detection and Prevention
Malware
Enable malware protection to scan all incoming traffic from
Internet. The gateway should be configured to stop traffic with
malicious content, quarantine / drop them, and create audit logs
for future investigation.
Keep malware signature and definition up-to-date
Perform regular malware scanning
Apply comparable security measures and procedures to computer
equipment and software under development or being used for
testing purposes
Perform full system scans before the machines are connected to
the government networks
Request external vendor to perform a malware scan (with the
latest malware signature) after new machine installation, service
maintenance, or installation of software
Security Policy,
Establishment and Enforcement of Security Policies, Guidelines
Guidelines and
and Standards
Standards
Establish own Internet gateway security policy
Establish related operating procedures e.g. change and
configuration management control procedures, backup and
recovery procedures, web content management procedures
Establish and regularly test security incident handling and
reporting procedures
Assign and define roles and responsibilities of staff performing
administration and maintenance
Advise and train users to observe and follow policies
Security Risk
Assessment and Conduct of Security Risk Assessment and Audit
Audit