Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
February 2005

On the Radar

Internal firewalls that mirror perimeter devices may not be worth the trouble. Most security managers and architects would agree that defense-in-depth architectures are the right approach to enterprise security. How is this done? In part, by layering firewalls. You put a primary set of firewalls on the perimeter, and then place secondary firewalls on interior network segments. This way, you keep out the Internet bad guys while controlling traffic between internal subnets. Now comes the challenge: Should perimeter and internal firewalls have the same rule sets? Before you answer, consider this: Your organization isn't entirely "your" organization. Enterprises are divided along political/ business lines in ways that show very little respect for seamless security. Perhaps you only have say over the perimeter firewalls, but the internal firewalls are controlled by divisional network managers with their own ideas of how things should be done. Does it make sense to have a loose rule set on the perimeter firewall that allows more ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Security: Measuring Up

    by  Pete Lindstrom

    Metrics are the key to measuring security. Learn how to gather data and calculate the answers you need.

  • On the Job

    12 lessons they don't teach you in security school about being a CISO.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close