World is Welcome To The World of Linux

Journey into the world of linux

Menu
  • About
  • Welcome
Menu

Desired Security Policy For Firewall Implementation

Posted on June 25, 2010 by Ganesh Sharma

If you're new here, you may want to subscribe to my RSS feed. Thanks for visiting!

For IT security when it comes to implementation of firewall, the planning comes first. The base of planning is the security policy for your organization. The firewall should be capable enough to protect the LAN resources from harms on internet. In a recent article on introduction to firewalls, I discussed about firewall basics. Now I’m going to discuss about the desired security policy for the firewall implementation for your network.

What is Security Policy

The security policy is a set of rules for an organization which state about what can and can not be done on a computer or within a network of organization. The security policy does state all the desirable user actions in detail. This also states the penalties which a user may face when (S)he violates any rules setup according to the security policy or organization.

What Can Be Included In Security Policy

The security policy must include the following points:

  1. Rules for Network connection
  2. Equipments usage rules
  3. Rules for employees

Policy For Network Connection

The security policy should include the rules for installing and configuring equipments which are to be used for network connections. This can include few rules as below:

  1. Installation of Operating System and the features which can be used and what applications can be installed.
  2. What antivirus solution will be used and how to keep that updated. The antivirus solution must be installed and kept upto date.
  3. The IP addresses and subnet masks which can be used. Also it should specify whether to use static IP address or dynamic one using DHCP.
  4. There should be detailed guidelines and procedures about user creation, user rights and the user deactivation.
  5. Whom to contact for permission for installation of new hardware and software. Normally without the permission of network or system administrators no hardware/software should be permitted to be installed.

The list can go on and on depending upon the size of network and organization.

Equipment Usage Rules

The security policy should also include the rules for usage of work place equipments e.g desktop computers, laptops. This also includes the what websites can be opened, what applications can be used.

  1. No applications should be installed without prior approval from the system and network admins. Only those softwares should be installed by designated persons which are approved and supplied by the organization.
  2. The applications should be installed as per the licensing norms of the application vendors.
  3. Emails should be strictly used for official use only and that too with certain guidelines.
  4. No passwords sharing should be allowed.
  5. The equipment should be locked or logged out before leaving work place.
  6. The IT security department should be informed in case of any suspicious activity.
  7. The data which is not related to the respective users should not be accessible to them.

Rules For Employess

The regular on role employees can be given somewhat higher privileges, but the employees on contract and the service providers should be given stricter privileges to keep the possible insecurities to the minimum.

Next we’ll talk about the firewall policies to be used at the time of implementation and the strategies we must follow.

1 thought on “Desired Security Policy For Firewall Implementation”

  1. Pingback: Firewall Security Policy | World of Security!!!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Date Command Tutorial(Video)
  • grep Command Tutorial – 1(Video)
  • Introduction To ls Command(Video)
  • Chapter 3
  • Set Position Of Poll Module Into Joomla

Recent Comments

  • Kansas City Trailer Proz on Physical Volume In AIX – A Primer
  • Create volume group in AIX | myunixsheet on How To Create Volume Group
  • Restore of AIX backup on other Unix system - TecHub on What is mksysb And What Are Its Components
  • Firewall Unleashed - InfoSec Institute on Packet Filtering Firewall: An Introduction
  • Manwendra on Proxy Firewall and Gateway Firewall: Introduction

Archives

  • January 2019
  • June 2010
  • May 2010
  • February 2010
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008

Categories

  • 30 Days To Joomla WebSite Setup
  • A Journey To The World of Linux System Administration
  • Aix
  • Backups
  • Books
  • Firewalls
  • Introduction
  • Joomla
  • Joomla Backup
  • Joomla Web Technology
  • Linux
  • LPAR and Virtualization
  • LVM
  • Pluggable Authentication Modules
  • section navigator pro
  • Security
  • Security Knowledge Base
  • Tips and Tricks
  • Uncategorized
  • World is Welcome Products

Meta

  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org
©2023 World is Welcome To The World of Linux | WordPress Theme by SuperbThemes