Abstract
Large networks, which are often distributed over physically separate locations, require a coherent security approach. This paper introduces the concept of secure network zones, arranged in “onion-like” layers, providing increasing security levels towards the inner, more secure zones.
Increased security is provided by both protective layers around sensitive networks and additional (cumulative) security measures, ranging from basic measures such as hardening and firewalls to more sophisticated techniques such as intrusion detection and encryption of transmitted and stored data.
The implementation of secure network zones is described, including classification of data, assignment of applica-tions to zones, and data flow. A path for the migration of existing environments is discussed and recommendations for special use cases are provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bell, David Elliott and La Padula, Leonard J.: Secure Computer Systems: Mathematical Foundations. MITRE Corporation, 1973.
Bell, David Elliott and La Padula, Leonard J.: Secure Computer System: Unified Exposition and Mul-tics Interpretation. MITRE Corporation, 1976.
Landwehr, C.E., C.L. Heitmeyer, and J. McLean, “A Security Model for Military Message Systems,” ACM Trans. on Computer Systems Vol. 9, No. 3 (Aug. 1984), pp. 198-222.
Zeltser, Lenny: Firewalls, Perimeter Protection, and VPNs. GCFW Practical Assignment, SANS, December 2000, p. 13-35.
Zeltser, Lenny: Firewall Deployment for Multitier Applications. http://www.informit.com/articles/arti-cle.aspx?p=26254, informIT, April 5, 2002.
Buecker, Axel; Carreno, Ana Veronica; Field, Norman; Hockings, Christopher; Kawer, Daniel; Mo-hanty, Sujit; Monteiro, Guilherme: Enterprise Security Architecture. IBM Redbook, IBM International Technical Support Organization, August 2007, p. 29-39.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2010 Vieweg+Teubner | GWV Fachverlage GmbH
About this chapter
Cite this chapter
Wimmer, P. (2010). Secure Network Zones. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9363-5_23
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0958-2
Online ISBN: 978-3-8348-9363-5
eBook Packages: Computer ScienceComputer Science (R0)