Preview

Case Study Media Configuration Review Firewall

Good Essays
Open Document
Open Document
839 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study Media Configuration Review Firewall
Case Study: Industry Sector:

Configuration Review – Firewalls & Routers Media and Telecommunications

Firewalls aim to provide organisations with reliable security at the network perimeter; however each firewall must be properly configured in order to allow and disallow network traffic accordingly, in a manner sensitive to business needs. Poorly configured firewalls can be overwhelmingly damaging to the security of an organisation – lax ingress rules may provide multiple vectors to attackers on the Internet, while lax egress rules may provide avenues for unauthorised command and control connections from the Internet and exfiltration of intellectual property and confidential data. Other factors must also be considered as part of a firewall configuration review, i.e. The software/firmware versions need to be identified in order to correlate with any publicly known issues or exploits with the specific device and version The network services available on the firewall also demand investigation and review against documented business requirements, including the number of registered users on the firewall and the password policies governing access to the device. IRM’s firewall configuration review provides an unbiased assessment of an organisation’s firewall deployments and the traffic that is currently permitted and denied through the organisation’s networks. The firewall configuration is validated against best practices in order to identify any misconfiguration that could lead to unauthorised and undesired access.

Case #1 IRM was asked to perform a firewall configuration review against a number of key perimeter firewalls of a global media corporation. The corporation had extended rapidly over a short time across multiple sites, which had led to firewall configurations having in excess of 1000 rules. The client requested a full review to identify any extraneous rules that could be removed to improve the overall security posture of their firewalls and to streamline

You May Also Find These Documents Helpful

  • Powerful Essays

    3. Given that the Ubuntu internal firewall is not installed by default, should you enable this firewall if your organization already has a firewall? Why or why not?…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    3. Given that the Ubuntu internal firewall is not installed by default, should you enable this firewall if your organization already has a firewall? Why or why not?…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    -In reference to previous network plan U1A1 a firewall will be in place in the LAN/WAN Domain & System/Application Domain to protect internal network from potential external threats.…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Task 1: Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside to the internal network. Hardware firewalls can protect computers on a local area network and they can be implemented without much configuration difficulty.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The second vulnerability is the policies that are in place to evaluate the firewalls, routers and the personnel to maintain them. There should always be checks and balances with any system. This means you have two sets of personnel maintaining the system. One set of personnel on site, such as a security officer and an assistant security officer to maintain these controls. And the second set being from an outside vendor that would continuously monitor Aircraft Solution’s Systems regularly. This would deter any internal or external malicious attacks to the…

    • 870 Words
    • 4 Pages
    Better Essays