I've seen/read the CISCO security guides on NSA... I've seen
misconfigured appliance firewalls. There's a lot of complexity out
there even in these dedicated devices.
I'm not convinced 'the vast majority of that complexity doesn't exist'
is a valid statement anymore in what we have going through our
firewalls these days and what we have installed.
I'm a SBSer so throw me out the best practices window anyway as I break
all of 'em ... but take a box [a], stick a secure.inf template on it or
run the Secure Configuration Wizard, I'm just not convinced that unless
you have folks that understand that firewall you can make such blanket
statements these days.
Cisco Router Security Recommendation Guides // National Security Agency //:
http://nsa2.www.conxion.com/cisco/
[a] and when I say ..take a box... that means Windows 2003 only, 2000
even with .inf's applied just isn't the same beast.
Abe Getchell wrote:
Susan,
ISA is a very flexible piece of software, as mentioned previously in
this conversation. In technology, flexibility usually implies
complexity. In this case, that implication is very true, as both ISA
and Windows are extremely complex pieces of software. Complexity is
not something you want in a firewall, under any circumstances, but
especially not on the perimeter (given a "buffer" which usually exists
in regards to an internal firewall). Complexity means more moving
parts, more things to break, more things to misconfigure, more things
to manage... With an appliance (or appliance-like) solution, the vast
majority of that complexity doesn't exist. This theory is a simple
"best practice" which many organizations follow, or should, if they
don't.
Another problem I have, personally, with ISA is the fact that it's
(usually) tied into the same directory which an organization uses to
manage the rest of their business systems. This functionality should
be completely separate in theory (in accordance with "best practices"
as well as what Microsoft has stated in numerous whitepapers), but in
practice, it usually is not. Managing your perimeter firewall via the
same directory you use to manage the print server which is on your
internal network is NOT a good idea, for any number of reasons.
Abe
--
Letting your vendors set your risk analysis these days?
http://www.threatcode.com
---------------------------------------------------------------------------
---------------------------------------------------------------------------