Secure Network Zones
Large networks, which are often distributed over physically separate locations, require a coherent security approach. This paper introduces the concept of secure network zones, arranged in “onion-like” layers, providing increasing security levels towards the inner, more secure zones.
Increased security is provided by both protective layers around sensitive networks and additional (cumulative) security measures, ranging from basic measures such as hardening and firewalls to more sophisticated techniques such as intrusion detection and encryption of transmitted and stored data.
The implementation of secure network zones is described, including classification of data, assignment of applica-tions to zones, and data flow. A path for the migration of existing environments is discussed and recommendations for special use cases are provided.
KeywordsIntrusion Detection System Access Control Mechanism Access Control List Secure Zone Mitre Corporation
Unable to display preview. Download preview PDF.
- Bell, David Elliott and La Padula, Leonard J.: Secure Computer Systems: Mathematical Foundations. MITRE Corporation, 1973.Google Scholar
- Bell, David Elliott and La Padula, Leonard J.: Secure Computer System: Unified Exposition and Mul-tics Interpretation. MITRE Corporation, 1976.Google Scholar
- Zeltser, Lenny: Firewalls, Perimeter Protection, and VPNs. GCFW Practical Assignment, SANS, December 2000, p. 13-35.Google Scholar
- Zeltser, Lenny: Firewall Deployment for Multitier Applications. http://www.informit.com/articles/arti-cle.aspx?p=26254, informIT, April 5, 2002.
- Buecker, Axel; Carreno, Ana Veronica; Field, Norman; Hockings, Christopher; Kawer, Daniel; Mo-hanty, Sujit; Monteiro, Guilherme: Enterprise Security Architecture. IBM Redbook, IBM International Technical Support Organization, August 2007, p. 29-39.Google Scholar