Firewall Configuration Standard v1.1
Firewall Configuration Standard v1.1
Version 1.1
Revision History:
Approval History:
Table of Contents
1. Scope ................................................................................................................................................... 4
2. General Firewall Requirements ........................................................................................................ 4
2.1 Firewall Deployment ................................................................................................................... 4
2.2. Traffic Mediation ......................................................................................................................... 4
2.3. Firewall Configuration ................................................................................................................ 4
2.4. Firewall Integrity......................................................................................................................... 5
2.5. Firewall Properties...................................................................................................................... 5
2.6. Firewall Change Control (ISO / IEC 27001: 2013 A.12.1.2)..................................................... 5
2.7. Firewall Configuration Management ......................................................................................... 5
2.8. Authentication ............................................................................................................................. 6
2.9. Network Information .................................................................................................................. 6
2.10. Filtering...................................................................................................................................... 6
2.10.1 SMTP Rules .............................................................................................................................. 6
2.10.2 Reject and Drop Rules ............................................................................................................ 6
2.11. Port Restrictions ....................................................................................................................... 7
2.12. Port / services allowed (ISO / IEC 27001:2013 A.13.1.1) ..................................................... 7
2.13. Insecure services in use (ISO / IEC 27001:2013 A.13.1.1) .................................................... 7
3. Firewall Installation ........................................................................................................................... 7
3.1. Installation ................................................................................................................................... 7
3.2. Operating System Configuration ................................................................................................ 8
3.3. Authorized Administration......................................................................................................... 8
3.4 Testing the firewall ...................................................................................................................... 8
4. Firewall Logging and Alerting ........................................................................................................... 8
4.1. Connection Accounting ............................................................................................................... 9
4.2. Active Connections ...................................................................................................................... 9
4.3. Terminating a Session ................................................................................................................. 9
1. Scope
This standard was developed to provide the primary building blocks for
implementation of a uniform standard for firewalls for all Voxai Solutions locations.
The requirements specified in this standard must be strictly followed to ensure
successful secure configuration of the firewall system.
The deployment of firewalls must comply with and satisfy the requirements of
standards implemented by the Voxai Solutions Information Security Policy.
2.2. Traffic Mediation
All traffic coming from or going to addresses associated with networks interfaced to
the firewall must be mediated by the firewall. Only authorized traffic must be allowed
to pass through the firewall. All the rules pertaining to the traffic flow must be
configured on a business need-to-know basis.
2.3. Firewall Configuration
For a list of trusted users, the administrator can separately allow secure shell (SSH)
access to firewall CLI, and HTTPS or SSL access to the firewall browser-based
interface. Remote access features can be used for collecting system information and
performing additional configuration, but not to manage or install firewall policies.
The firewall must employ an automatic mechanism to detect alteration of any files
used for firewall configuration.
The firewall’s rule base structure must support a “Deny all services except those
specifically permitted” design policy.
- Testing all network connections and changes to the firewall’s configuration (This
is to prevent security problems caused by misconfiguration of the network or
firewall without formal approval and testing of changes)
➢ Network Administrator/Firewall Administrator must test every change to the
firewall configuration/network connection to ensure it functions as per
business requirements and is securely configured to prevent any security
problem. All the results for testing network connections and changes to the
firewall configuration must be documented formally.
Backup of all the running configurations must be maintained and should be updated
after every change according to the change process.
2.8. Authentication
The firewall must contain advanced authentication measures, e.g., use of biometrics
devices or smart cards, or be capable of supporting advanced Dual Authentication. All
remote users must be authenticated via a secure method at the firewall before being
granted access to internal network resources.
The firewall system must not permit any internal network information to be exposed
through queries from external devices, i.e., DNS servers.
2.10. Filtering
The firewall must be capable of employing filtering techniques used to permit or deny
services, applications, and protocols to specified network addresses as needed. The
firewall shall provide a graphical user interface for the configuration of filtering based
on relevant attributes, such as, source and destination IP address, protocol type,
source, and destination TCP/UDP port, and inbound or outbound interfaces.
When supporting SMTP, the SMTP relay must not be used as a relay for
“external only” messages.
Every six months a firewall port review is provided by ControlCase. Those results are
reviewed and documented in the Control Case portal.
2.12. Port / services allowed (ISO / IEC 27001:2013 A.13.1.1)
Every six months a firewall port review is provided by ControlCase. Those results are
reviewed and documented in the Control Case portal.
If any insecure service is used in environment and/or scope network due to some valid
reasons and proper approval, then please document the security features implemented for
each for the insecure service to address the associated risk. Implemented Security features
should be documented in this section and, if not applicable, this section can be removed.
3. Firewall Installation
3.1. Installation
offline for at least 365 days (one year). Event logs must be managed and maintained in a
manner compliant with the Voxai Solutions implemented audit and relevant standards for
Information Security. All the event logs must be monitored by the IT Operations Team and
trigger alerts if any.
Detailed log information shall be captured on every connection through the firewall.
This information must include a minimum but not limited to service type, time of
connection and termination of the connection, source port, destination port, source
IP address, destination IP address, packet type, and action taken. Logs must be
retained for at least 30 calendar days.
The installed firewalls or the related management server shall provide facilities to
view in real time all connections currently active through the gateway if there is a
need.
The firewall must provide automatic facilities to terminate single or multiple active
connections upon detection of intrusion. The firewall must also provide manual
facilities to terminate single or multiple active connections by any authorized
administrator.
Unauthorized access attempts from the external network must be reported via a real-
time alert.
5. Firewall Administration
5.1. Assigned Administrators
The installed firewall shall have the ability to define security rules using time
parameters.
8. LDAP-related Communications
All communications between the LDAP server and the firewall or VPN Gateway must be SSL
protected for maximum security.
9. Time Synchronization
Firewall must be synchronized against a common NTP Service. This is to make sure events
in the logs can be correlated accurately.
Proper and adequate training must be provided to all system and security
administrators to insure appropriate maintenance and administration of the firewall.
Firewall administrators must maintain the firewall configuration and rule bases
continuously in accordance with Voxai Solutions’ business requirements and
current policies. Change management must be performed in a manner compliant with
the requirements of the Voxai Solutions Change Management Policy.
if they are associated with a previously established session, or they are connection
establishment requests.
c. Router configuration files must be secure and synchronized [for example, running
configuration files (used for normal running of the routers) and start-up
configuration files (used when machines are re-booted), must have the same,
secure configurations].
d. Mobile and/or employee-owned computers with direct connectivity to the
Internet (for example, laptops used by employees), which are used to access the
organization’s network, will have personal firewall software installed and active
which must be configured by the organization to specific standards and not
alterable by the employee.
e. NAT or other technology using RFC 1918 address space must be used by firewalls/
routers to restrict broadcast of IP addresses from the internal network to the
Internet (IP masquerading). This is to prevent any disclosure of private IP
addresses and routing information to unauthorized parties/internet (ISO / IEC
27001 :2013 A.13.1.1; A 13.1.2)
The Information Security Steering Committee is the owner of this document and is
responsible for ensuring that this policy document is reviewed in line with the review
requirements stated above.