Page 447 - StudyBook.pdf
P. 447

Topologies and IDS • Chapter 7  431

                 make great choices for creating a “defense in depth” strategy, but remember that
                 the more work the firewall is doing to support these other functions, the more
                 chance there is that these additional tools may impact the throughput of the fire-
                 wall device.

                 Figure 7.3 A Sample Firewall Rule Set
















                   Using a Defense-in-Depth Strategy
                   The defense-in-depth strategy specifies the use of multiple layers of net-
               Head of the Class…  measure deployed on your network. In other words, to eliminate the
                   work security. In this way, you avoid depending on one single protective

                   false feeling of security because you implemented a firewall on your
                   Internet connection, you should implement other security measures such
                   as an IDS, auditing, and biometrics for access control. You need many
                   levels of security (hence, defense in depth) to be able to feel safe from
                   potential threats. A possible defense-in-depth matrix with auditing
                   included could look like the graphic in Figure 7.4.

                 Figure 7.4 A Graphical Representation of Defense in Depth


                                                   Security Policy

                                               Auditing and Access Control

                                                     Firewall
                                                    IDS System













                                                                              www.syngress.com
   442   443   444   445   446   447   448   449   450   451   452