Firewall Auditing Sean K. Lowder CISSP / MCSE / CCNA

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Security Controls – What Works
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Network Security Testing Techniques Presented By:- Sachin Vador.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Lesson 19: Configuring Windows Firewall
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Department Of Computer Engineering
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Audit – Proof Information System Security Controls Wednesday, August 18, 2010 John R. Robles Tel:
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Intranet, Extranet, Firewall. Intranet and Extranet.
COEN 252 Computer Forensics
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Introduction to Telecommunications by Gokhale CHAPTER 9 NETWORK MANAGEMENT.
COEN 252 Computer Forensics Collecting Network-based Evidence.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
Windows 7 Firewall.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Chapter 2 Securing Network Server and User Workstations.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Information Security tools for records managers Frank Rankin.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Computer Data Security & Privacy
Click to edit Master subtitle style
Firewalls Routers, Switches, Hubs VPNs
IS4680 Security Auditing for Compliance
Keeping Member Data Safe
Cengage Learning: Computer Networking from LANs to WANs
FIREWALL.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Firewall Auditing Sean K. Lowder CISSP / MCSE / CCNA

Sean K. Lowder CISSP ©20072 Bio Currently employed at Blue Cross Blue Shield of Louisiana as the Information Security Manager. I’ve been in the computer industry for 17 years, and has specialized in information security for the last 10 years. I have various industry certifications, including Certified Information Systems Security Professional (CISSP), Certified Novell Engineer (CNE), Microsoft Certified Systems Engineer (MCSE), and Cisco Certified Network Associate (CCNA). I received my BS in Information Technology from University of Phoenix. Previously I’ve directed various projects in the Information Security arena including financial institution penetration testing, Firewall and Virtual Private Network (VPN) configuration, design and deployment. I have extensive experience in preparing for SAS70, HIPAA and financial auditing for all information security areas.

Sean K. Lowder CISSP ©20073 What is a firewall? A firewall is a device or collection of components placed between two networks that collectively have the following properties: All traffic from inside to outside, and vice-versa, must pass through the firewall. Only authorized traffic, as defined by the local security policy, will be allowed to pass.

Sean K. Lowder CISSP ©20074 Firewall Types First Generation Packet Filtering Firewalls Second Generation Stateful Inspection Firewalls Third Generation Application (Proxy) Firewalls Forth Generation Kernel Proxy technology “Deep packet” inspection IDS / IPS capabilities

Sean K. Lowder CISSP ©20075 Defining Audit Scope Firewall Documentation Approval Procedures and Process Firewall Rule Base VPN Layer Seven Switching Internal Testing External Testing

Sean K. Lowder CISSP ©20076 Firewall Auditing Methodology Phases I. Gather Documentation II. The Firewall III. The Rule Base IV. Testing and Scanning V. Maintenance and Monitoring

Sean K. Lowder CISSP ©20077 Phase I - Gather Documentation Security Policy Change Control Procedures Administrative Controls Network Diagrams IP Address Scheme Firewall Locations IPS Capable?

Sean K. Lowder CISSP ©20078 Phase I - Gather Documentation Firewall Vendor Software Version and Patch Level Hardware Platform Operating System Version and Patch Level Administrator training and knowledge

Sean K. Lowder CISSP ©20079 Phase II – The Firewall Three “A’s” Authentication Local / Remote Access Logical / Physical Auditing (logs) Local / Remote OS Hardening

Sean K. Lowder CISSP © Phase III – The Rule Base Based on the Organization’s Security Policy Review each rule Business reason Owner Host devices Service Ports Simplicity is the key Most restrictive and least access

Sean K. Lowder CISSP © Phase III – The Rule Base Rule order (first out) Administration Rule ICMP Rule Stealth Rule Cleanup Rule Egress Rules Logging

Sean K. Lowder CISSP © Phase IV – Testing & Scanning Determine & Set Expectations Scan the firewall Nmap Firewalk Scan host behind the firewall Nessus ISS Ensure results match expectations

Sean K. Lowder CISSP © Phase V – Maintenance & Monitoring Change Management and Approval Is the process documented? Is the process being followed? Is there evidence of process? Disaster Recovery Plan Formal? Backup and Recovery Procedures Firewall Logs Reviews Storage and archival

Sean K. Lowder CISSP © Demo

Sean K. Lowder CISSP © Questions???

Sean K. Lowder CISSP © References and Additional Resources The CISSP Prep Guide Ronald L. Krutz & Russell Dean Vines Wiley Publishers ISBN Firewalls and Internet Security William R. Cheswick and Steven M. Bellovin Addison-Wesley Publishing Company ISBN Lance Spitzner White Paper - Auditing your Firewall Setup White Paper - Building your Firewall Rule base VicomSoft White Paper – Firewall