Network Firewalls Security
|
|
Objective
In accordance with the Information Security and Acceptable Use Policy, all systems
owned or managed by the Oakland Community College must be adequately protected to
ensure confidentiality, integrity, availability, and accountability of such systems.
Firewalls may be used to establish a perimeter between
the College network and the public Internet, or within the College to maintain segmentation
between networks.
Physical Location
Network perimeter firewalls should be installed on enterprise hardware in locked rooms
that meet the applicable minimum standards defined in the Procedure for Server Rooms.
Use of workstation-class hardware to deliver the services of a network perimeter firewall
is not approved.
Support Requirements
All firewalls must have a valid support contract.
Patching
Security patches for all firewalls must be installed within 30 days, in a timely manner,
depending on the likelihood and impact of vulnerability exploitation. Base code must
be a supported version and at least N1.
Rules
Network firewalls must be configured to deny all traffic by default, with specific
rules permitting the minimum traffic required for College operations. Global allow
rules should not be enabled because they provide unnecessarily broad access. Rules
are generally processed in order from the top downward, thus
“deny all” rules should be placed below the explicit allows.
Rules must be appropriately documented with business justifications and reference to support ticket number, where applicable.
Rulesets must be reviewed at least annually to ensure efficiency and ongoing justification for each rule.
Logging
Activity must be logged and retained for a minimum of 90 days to facilitate troubleshooting
and investigations. The following types of activities must be logged:
Incident Management
System owners are required to report any suspicious activity to IT for investigation.
Backup / Recovery
Backup and recovery procedures must be established to ensure that firewalls can be
rebuilt in the event of a disruptive event. Further, configuration backups should
be captured before significant configuration changes to ensure a method of failing
back after an unexpected disruption. Backup media should be encrypted if transported
or stored outside of an OCCfacility.
Exemptions
In the event that compliance with this procedure cannot be met, please contact itsecurity@oaklandcc.eduto submit an exemption request which will be approved or denied by IT. Denied exemption
requests may be appealed to the CIO for final decision
Change Log