Firewall audit

15
Firewall Auditing

Transcript of Firewall audit

Page 1: Firewall audit

Firewall Auditing

Page 2: Firewall audit

2

What is a firewall? A firewall is a device or collection

of components placed between two networks that collectively have the following properties: All traffic from inside to outside,

and vice-versa, must pass through the firewall.

Only authorized traffic, as defined by the local security policy, will be allowed to pass.

Page 3: Firewall audit

3

Firewall Types First Generation

Packet Filtering Firewalls Second Generation

Stateful Inspection Firewalls Third Generation

Application (Proxy) Firewalls Forth Generation

Kernel Proxy technology “Deep packet” inspection IDS / IPS capabilities

Page 4: Firewall audit

4

Defining Audit Scope Firewall Documentation Approval Procedures and

Process Firewall Rule Base VPN Layer Seven Switching Internal Testing External Testing

Page 5: Firewall audit

5

Firewall Auditing Methodology

PhasesI. Gather DocumentationII. The FirewallIII. The Rule BaseIV. Testing and ScanningV. Maintenance and

Monitoring

Page 6: Firewall audit

6

Phase I - Gather Documentation Security Policy Change Control Procedures Administrative Controls Network Diagrams IP Address Scheme Firewall Locations IPS Capable?

Page 7: Firewall audit

7

Phase I - Gather Documentation Firewall Vendor Software Version and Patch Level Hardware Platform Operating System Version and

Patch Level Administrator training and

knowledge

Page 8: Firewall audit

8

Phase II – The Firewall Three “A’s”

Authentication Local / Remote

Access Logical / Physical

Auditing (logs) Local / Remote

OS Hardening

Page 9: Firewall audit

9

Phase III – The Rule Base Based on the Organization’s

Security Policy Review each rule

Business reason Owner Host devices Service Ports

Simplicity is the key Most restrictive and least access

Page 10: Firewall audit

10

Phase III – The Rule Base Rule order (first out)

Administration Rule ICMP Rule Stealth Rule Cleanup Rule Egress Rules

Logging

Page 11: Firewall audit

11

Phase IV – Testing & Scanning Determine & Set Expectations Scan the firewall

Nmap Firewalk

Scan host behind the firewall Nessus ISS

Ensure results match expectations

Page 12: Firewall audit

12

Phase V – Maintenance & Monitoring Change Management and

Approval Is the process documented? Is the process being followed? Is there evidence of process?

Disaster Recovery Plan Formal? Backup and Recovery Procedures

Firewall Logs Reviews Storage and archival

Page 13: Firewall audit

13

Demo

Page 14: Firewall audit

14

Questions???

Page 15: Firewall audit

15

References and Additional Resources

The CISSP Prep Guide Ronald L. Krutz & Russell Dean Vines Wiley Publishers ISBN 0-471-41356-9

Firewalls and Internet Security William R. Cheswick and Steven M. Bellovin Addison-Wesley Publishing Company ISBN 0-201-63357-4

Lance Spitzner www.spitzner.net White Paper - Auditing your Firewall Setup White Paper - Building your Firewall Rule base

VicomSoft www.firewall-software.com White Paper – Firewall