
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 185
AuditReport
AuditoftheGIACnetworksecurityarchitecturewasperformedfrom4
th
Aprilto8
th
April,2002.Duringthisaudit,thefollowingareaswereassessedandreviewed:
à Existingsecuritypoliciesandprocedures
à Logicalandphysicalsecuritymeasures
à Securitydevicesconfigurations
à Rulebaseimplementationsandpoliciescompliance
à Administrativeandchangecontrolprocedures
WeconcludethattheGIACsecurityarchitectureissuccessfulinsecuringthe
network:
n Thefirewallsystemsareworkingasexpectedwithoutmajorproblems.Ontopof
this,thelayereddefensearchitecturemakesitpossibletomitigateanyserious
threat.
n Documentation,changecontrolandotheradministrativeproceduresareinplace
andareproperly followed.
n Duringthetechnicalassessmentphrases,mostvulnerabilitiesfoundareminor
andarerelatedtothenonfirewalldevices,includingtheWindows2000based
borderrouter,theVPNserverandtheRASserver.
n Intermsofperformance,faulttoleranceandremoteaccesssecurity,roomfor
furtherimprovementdoesexist.
Belowisalistofrecommendations:
Recommendatio nOne
AlthoughtherearetwoseparatelinksforusebyGIAC,theB2Bstreamissharing
bandwidthwiththeINETstreamwithoutanybandwidthcoordinationmechanismin
place.AQoSsolutionsuchastheCheckPointFloodGate1softwareshouldbe
consideredatRouter_Eiconcard:
“FloodGate1®isa policybased,QualityofService(QoS)solutionforVPNs,private
WANsandInternetlinks.Itoptimizesnetworkperformancebyassigningpriorityto
Kommentare zu diesen Handbüchern