Steps in Creating a Service Access Policy



next up previous contents
Next: Flexibility in Policy Up: Firewall Policy Previous: Firewall Policy

Steps in Creating a Service Access Policy

A firewall is a direct implementation of the network service access and design policies, as discussed in section gif. There are a number of service access policies that may be implemented, such as no inbound access and full outbound access or restricted inbound access and restricted outbound access. The firewall design policy determines to a large degree the service access policy: the more robust the firewall design policy, the more stringent the service access policy. Thus, the firewall design policy needs to be decided upon first.

As explained in section gif, the firewall design policy is generally to deny all services except those that are explicitly permitted or to permit all services except those that are explicitly denied. The former is more secure and is therefore preferred, but it is also more stringent and causes fewer services to be permitted by the service access policy.

Chapter 3 provided several firewall examples, and showed that certain firewalls can implement either design policy whereas one, the dual-homed gateway, is inherently a ``deny all'' firewall. However, the examples also showed that systems needing certain services that shouldn't be passed through the firewalls could be located on screened subnets separate from other site systems. The point here is that depending on security and flexibility requirements, certain types of firewalls are more appropriate than others. This shows also the importance of choosing a policy first before implementing the firewall; doing the opposite could result in a clumsy fit.

To arrive at a firewall design policy and then ultimately a firewall system that implements the policy, NIST recommends that the firewall design policy start with the most secure, i.e., deny all services except those that are explicitly permitted. The policy designer then should understand and document the following:

The creation of these items is straightforward, however at the same time highly iterative. For example, a site may wish to use NFS across two remote sites, however the ``deny all'' design policy may not permit NFS (as explained in sec. gif). If the risks associated with NFS are acceptable to the organization, it may require changing the design policy to the less secure approach of permitting all services except those specifically denied and passing NFS through the firewall to site systems. Or, it may require obtaining a firewall that can locate the systems that require NFS on a screened subnet, thus preserving the ``deny all'' design policy for the rest of the site systems. Or, the risks of using NFS may prove too great; NFS would have to be dropped from the list of services to use remotely. The aim of this exercise, then, is to arrive at a service access policy and the firewall design policy.

To assist in this process, the following sections present some common issues that need to be addressed in the policies associated with firewall use.



next up previous contents
Next: Flexibility in Policy Up: Firewall Policy Previous: Firewall Policy



John Wack
Thu Feb 9 18:17:09 EST 1995