11 Network Security

11 Network Security

11-1 Policy

11-1.1 Generic Information Security Architectural Standards Network Architecture

11-1.1.1 Internally Facing Environment

11-1.1.2 Externally Facing Environment

11-1.1.3 Enclaves, Tiers, and Zones

11-1.1.4 Externally Facing Websites

11-1.2 Network Infrastructure

11-1.3 Wireless Network Security

11-2 Network Architecture

11-2.1 Network Addresses

11-2.2 Network Services and Protocols

11-2.3 Network Perimeters

11-2.4 Network Integrity Controls

11-2.5 Time Synchronization

11-3 Protecting the Network Infrastructure

11-3.1 Ensuring Physical Security

11-3.2 Maintaining Network Asset Control

11-3.3 Protecting Network Configuration Information

11-3.4 Implementing Identification and Authentication

11-3.5 Implementing Authorization

11-3.6 Implementing Hardening Standards

11-3.7 Determining When a Secure Enclave Is Required

11-3.8 Establishing Secure Enclaves

11-3.9 Isolating Postal Service Networks

11-3.10 Conducting Vulnerability Scans, Intrusion Detection, Penetration Tests

11-3.10.1 Vulnerability Scans

11-3.10.2 Intrusion Detection

11-3.10.3 Penetration Testing

11-4 Internet Technologies

11-4.1 Internet

11-4.2 Intranet

11-4.3 Extranet

11-5 Protecting the Network/Internet Perimeter

11-5.1 Implementing Internet Security Requirements

11-5.2 Implementing Firewalls

11-5.2.1 Firewall Configurations

11-5.2.2 Firewall Administrators

11-5.2.3 Firewall Administration

11-5.2.4 Firewall System Integrity

11-5.2.5 Firewall Backup

11-5.3 Implementing Routers

11-5.3.1 Router Configurations

11-5.3.2 Router Administration

11-5.4 Establishing Demilitarized Zones

11-5.5 Monitoring Network Traffic

11-6 Network Connections

11-6.1 Establishing Network Connections

11-6.2 Requesting Connections

11-6.3 Approving Connections

11-6.4 Physical Protection of Network Connections

11-7 Business Partner Connectivity Requirements

11-8 Limiting Third-Party Network Services

11-9 Remote Access Requirements

11-9.1 Authentication

11-9.2 Virtual Private Network

11-9.3 Modem Access

11-9.4 Dial-in Access

11-9.5 Telecommuting

11-9.6 Remote Management and Maintenance

11-10 Network Audit Log Requirements

11-11 Wireless Networking Requirements

11-11.1 Wireless Baseline Requirements

11-11.2 Wireless Solutions

11-11.3 Standard Wireless Solution

11-11.3.1 General Requirements

11-11.3.2 Architecture Requirements

11-11.3.3 How to Request Standard Wireless Services

11-11.4 Process for Requesting Nonstandard Wireless Solutions

11-11.5 Bluetooth and Personal Area Network Applications

11-11.6 Wireless LAN Device Management

11-11.7 Purchasing Requirements

11-11.8 Deployment Requirements

11-11.8.1 Administrative Security Requirements

11-11.8.2 Physical Security Requirements

11-11.8.3 Technical Security Requirements

11-11.8.4 Maintenance Security Requirements

11-11.8.5 Security Requirements for Using a Public Hot Spot

11-11.9 Compliance and Monitoring Requirements




Powered By OneLink