S 2.71 Determination of a security gateway policy

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, IT Security Officer

The security gateway policy determines the behaviour of the security gateway. It defines what information, services and protocols the security gateway handles in which way and who is allowed to use them. This policy should not be confused with the security policy for the security gateway in which provisions are laid down for the secure operation of the security gateway itself.

Communication requirements

The first step in establishing a policy is to determine which types of communication with the external network are permitted. When defining the communication requirements, the following questions in particular must be answered:

Selection of services

The communication requirements are the basis for determining which services are permitted in the network requiring protection.

A distinction must be made between those services permitted for the users in the network requiring protection and those permitted for external users.

If, for example, e-mail is to be received (which is generally the minimum requirement), the security gateway must allow the SMTP protocol to pass through.

The policy must clearly state which services are permitted for which users and/or computers and for which services confidentiality and/or integrity must be guaranteed. Only services which are absolutely necessary should be permitted. All other services must be forbidden. This must also be the default setting: All services for which there are no explicit rules must be forbidden.

It must be specified for each permitted service which functions of the protocol used may be utilised and which should be forbidden (e.g. the "PORT" command from FTP to prevent active FTP) and which transmitted user data should be filtered

It must be defined on which days of the week and at what times of the day the provided services can be used.

For short-term changes (e.g. for tests) or new services, exceptions to these rules should be provided for.

The filters must fulfil certain requirements: the packet filters using the header information of the services of layers 3 and 4 of the OSI layer model (IP, ICMP, ARP, TCP and UDP) as well as the security proxies using the information of the services of the application layer (e.g. Telnet, FTP, SMTP, DNS, NNTP, HTTP). An overview of aspects to be observed for correct operation of the various individual protocols and services can be found in S 5.39 Secure use of protocols and services. Using this as a basis, filter rules must be drawn up (see S 2.76 Selection and implementation of suitable filter rules).

Organisational regulations

In addition to the establishment and implementation of filter rules, the following organisational regulations are required:

The following questions must be clarified when determining the policy:

The decisions made must be documented in the policy. In addition, it is important that the relevant information and reasons on which the decisions are based are also documented in such a manner that they can be understood at a later point in time (for instance, when revising the policy). This background information does not necessarily have to be included in the policy itself; instead, it is recommended to draw it up in a separate document.

Review questions: