Lets roll back to the fundamental purpose of a network firewall, which is to control network traffic between trusted and untrusted networks, only allowing specific required and trusted network communication between an untrusted and trusted network segment. The obvious example is the Internet (untrusted) and the office LAN (trusted). However the textbook Internet facing firewall is not typically where the issues are in a complex internal network infrastructure, where often there are countless individual networks making up a WAN.
It is important to define what we mean by an ‘untrusted’ network in the context of the ‘trusted’ network we seek to protect. I would define it as such, an untrusted network is any network you do not have the ability to control or manage. So (typically) an external client network is untrusted, a third party service provider network is untrusted, but as for networks within the enterprise WAN, well that all depends on whether they are controlled and managed, in other words are they secured to same degree as the trusted network you seek to protect.
In the context of a WAN, we should not overlook internal network security is a part of a layered security approach, and that data transit through the networks are also are controlled logically at the application layer (access control) and perhaps even encryption. However this multi-layered security approach may not suit the needs and risk for internal network interconnectivity. To understand where firewalls are required it must start with assessing which networks are considered as untrusted and which ones are consider trusted.
Some network environments won't be as simple as the duplex of an untrusted and trust network, however they can still be logically defined in a levelled trust relationship model, allow zones of trust within the network infrastructure, a bit complicated to explain fully in this post but for example:
- Network A: Network B & C are trusted (untrusted zone)
- Network B: Network A is untrusted, Network C is trusted (trusted zone level 1)
- Network C: Network A & B are untrusted (trusted zone level 2)
Finally, firewall deployments and the network layer security needs to be tested and assured. I recommend regular firewall ruleset reviews, however the most effective way is test the security like a hacker or malware would, by performing regular network discovery and vulnerability scanning, which help ensure firewalls continue to secure communications between trusted and untrusted networks as designed. Internal network discovery and vulnerability scans can even be a fully automated process by using tools such as Outpost24's Hacker In A Box (HIAB)
its valuable post...thank you for nice sharing!
ReplyDelete4K Youtube to Mp3 Portable
9 times out of 10 endpoints will be cleaner if a good firewall has been setup and used, but this really all "depends"
ReplyDeleteMy favourite I've seen was a rulebase of 60,000 rules in one organisation. 3 FTEs working full time for a year got it down to 20,000.
ReplyDeleteAs a result, I tend not to have a great deal of sympathy when someone complains about their 300-rule ruleset being 'unmanageable'!
I think firewalls can be a very real candidate for one of those things that 'so long as it works, no one will look at it' So consequently, there's no cleanup for years and you end up with a sprawl.
I've gotta say, most of this article went way over my head, but it's so well-rounded. There are so many pieces and parts to firewalls, and it's honestly never even occurred to me that I may be using one just because, and not really understanding the efficacy of it. Brilliant work Dave!
ReplyDelete