Premium Content

Access "On the Radar"

Published: 12 Oct 2012

Internal firewalls that mirror perimeter devices may not be worth the trouble. Most security managers and architects would agree that defense-in-depth architectures are the right approach to enterprise security. How is this done? In part, by layering firewalls. You put a primary set of firewalls on the perimeter, and then place secondary firewalls on interior network segments. This way, you keep out the Internet bad guys while controlling traffic between internal subnets. Now comes the challenge: Should perimeter and internal firewalls have the same rule sets? Before you answer, consider this: Your organization isn't entirely "your" organization. Enterprises are divided along political/ business lines in ways that show very little respect for seamless security. Perhaps you only have say over the perimeter firewalls, but the internal firewalls are controlled by divisional network managers with their own ideas of how things should be done. Does it make sense to have a loose rule set on the perimeter firewall that allows more traffic into the network, but then ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free