文档介绍:A Firewall & Security Policy Checklist
SCOPE:
Whether anization has firewalls and a security policy or not, it’s prudent to
regularly evaluate your security approach. Review and answer the following
questions before implementing any further firewall technology and/or security
policy additions or changes.
Identify which resources must absolutely be secure and in which order
of priority:
• Mission critical
• Redundant back-up system(s)
• Secondary
• Base systems
Identify minimum security needs for the following WAN connections:
• Employee remote dial-up
• Office-to-office VPN
• Employee and vendor broadband (DSL, cable modem, etc.)
• Vendor access
• Business-to-business access
Does your security team have quick access to work
documentation?
• Network diagrams
• Trending data
• Protocol utilization
• Data points
• Access points
• Major vendors’ point of contact information (ISP, telco, firewall vendor)
Does your security team know the order in which systems must be
restored?
• The security response team must have a full understanding of which systems need to be restored to
full operation and in what order.
• Does this order meet your business objectives and priorities?
Does your information disclosure policy address the following in
relationship to a security issue?
• What information is shared with