文件名称:Audit Technical Guide - Firewalls
文件大小:3.32MB
文件格式:PDF
更新时间:2021-02-13 05:47:59
Audit, UNIX, Firewall-1, Gauntlet
Introduction Firewall Background Firewalls within Planning/Audit Prerequisites Control Questionnaire/Check list Firewall Configuration Detailed Test Guide 1 Firewall & Network Configuration Policy 2 There is a documented incident response procedure 3 Firewalls are protected by screening routers 4 Screening Routers are correctly configured 5 There are good logical access controls over Screening routers 6 The Firewall has been physically secured 7 The firewall platform has been hardened and is secured against unauthorised access 8 The firewall has not been equivalenced to any other host 9 No protocols other than IP protocols are run through the firewall 10 Both firewalls and management workstations are physically secured and restricted in number 11 Firewall administration is segregated from server administration 12 Latest patches have been applied 13 The firewall is started automatically 14 Failover arrangements have been made for the Firewall 15 The firewall has been tested and penetration tested 16 A trusted copy of the firewall has been backed up 17 System files are subjected to a regular integrity check 18 Firewall administration tasks are well 19 The firewall can defend against SYN 20 The firewall is configured to 'fail safe' 21 Proxy Services and other properties are securely set 22 The premise of the Rule Base is 'Deny All' 23 The Rule Base is configured 24 Traffic passed and blocked by the firewall is logged and reviewed 25 Critical Events sound an alert 26 All incoming file and attachments are virus scanned 27 Encryption is correctly configured 28 Services have been correctly configured 29 Essential services are proxied 30 Review of external connections