S 2.70 Developing a concept for security gateways

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: IT Security Officer

The connection of a local network to a global network such as the Internet leads to a new supply of information. Networking the computer systems locally ensures that every workstation computer is able to access the variety of information available.

However, connecting these networks also poses new threats because, in principle, data does not only flow from the outside into the network requiring protection, but can also flow in the other direction. Furthermore, the ability to execute commands on computers in the local network from a remote computer (e.g. from the Internet) directly threatens the integrity and availability of the local computers, and therefore indirectly threatens the confidentiality of the local data as well.

A subnetwork requiring protection should therefore only be connected to an untrustworthy network when this is absolutely necessary. This applies especially to connections to the Internet, which is one of the least trustworthy networks existing due to the high number of users. It is also necessary to check the extent to which the network to be protected should be divided into subnetworks, because certain computers or areas of the network to be protected are not permitted to connect to the Internet or are only permitted to do so under certain conditions, and whether a stand-alone system will suffice for connection to the Internet (see S 5.46 Installing stand-alone-systems for Internet use and module S 3.8 Internet PCs).

To guarantee the security of the network to be protected, it is necessary to use a suitable security gateway. However, the following general conditions must be fulfilled by the security gateway in order for it to provide effective protection:

The security gateway must

Connections to untrustworthy networks must only be allowed after it has been verified that it is possible to manage all risks involved with the selected security gateway concept and considering the personnel and organisational conditions.

There are various ways available to implement a security gateway. In order to determine which concept is most suitable for the intended use, it must first be clarified which security objectives are to be fulfilled by the security gateway.

Examples of security objectives include:

Based on the security objectives, a security policy must be created that specifies the tasks of the security gateway and the requirements placed on it. This security policy must be embedded in the security strategy of the particular organisation and therefore needs to be co-ordinated with Security Management.

The decisions made when developing the security policy for the security gateway should be documented in an understandable manner together with the reasons for making these decisions.

The security policy is implemented on the security gateway by implementing the security gateway itself, by selecting suitable hardware components, packet filters, and Application Level Gateways, and by carefully specifying and configuring filter rules.

The terms "packet filter" and "Application Level Gateway" are important in the following sections and will therefore be explained briefly at this point to avoid misunderstandings:

In order for a security gateway to provide a network with effective protection against attacks from outside, several basic prerequisites must be fulfilled:

A security gateway can protect the internal network against many of the risks involved when connecting to the Internet, but not all of them. When designing a security gateway and creating a security policy, it is necessary to keep the limits of a security gateway in mind at all times:

Review questions: