📜 ⬆️ ⬇️

FSTEC: firewall requirements

So, a long-awaited event occurred and the FSTEC of the Russian Federation in addition to the previously released Anti-virus Protection Profiles released (or more precisely posted on the site ) the requirements for firewalls. Including software for installation on workstations. Unfortunately, not all documents are laid out - Profiles of the fourth, fifth and sixth class of protection are traditionally laid out. The rest of the protection classes are described in documents marked with chipboard and are not available to the general public.

What should be able to firewalls according FSTEK?

According to the Information Message “On Approval of Methodological Documents Containing Firewall Protection Profiles” dated September 12, 2016 N 240/24/4278, the following types of protection profiles have been developed:


For types A, B and C there are requirements for firewalls from the first to the sixth class of protection, for types D and D - only from the sixth to the fourth

First of all, about the levels of security. According to the Informational Message “On Approving Firewall Requirements” dated April 28, 2016 No 240/24/1986.
Firewalls corresponding to class 6 protection are used in state information systems of classes 3 and 4 of protection *, in automated systems for managing production and technological processes of class 3 of protection **, in information systems of personal data if necessary to ensure 3 and 4 levels of protection of personal data * **

Firewalls that correspond to protection class 5 are used in state information systems of protection class 2 *, in automated production and process control systems of protection class 2 ***, in personal data information systems if necessary to provide 2 levels of personal data protection **

Firewalls corresponding to class 4 protection are used in state information systems of protection class 1 *, in automated control systems for production and technological processes of class 1 protection **, in information systems of personal data if necessary to ensure level 1 of personal data security ***, in public information systems of class II ****.

Firewalls corresponding to classes 3, 2 and 1 of protection are used in information systems in which information containing information constituting state secrets is processed.

* Installed in accordance with the Requirements for the Protection of Information, not constituting a state secret contained in state information systems, approved by order of the Federal Service for Technical and Export Energy of Russia dated February 11, 2013 No17.

** Installed in accordance with the Requirements for ensuring the protection of information in automated systems for managing production and technological processes at critical facilities, potentially hazardous facilities, as well as facilities representing an increased danger to life and health of people and the environment, approved by order of the Federal Technical Commission for Russia dated March 14, 2014 No 31.

*** Established in accordance with the Requirements for the protection of personal data when they are processed in personal data information systems, approved by the Government of the Russian Federation on November 1, 2012, No 1119.

**** It is installed in accordance with the Requirements for the Protection of Information Contained in Public Information Systems, approved by order of the Federal Security Service of Russia and the Federal Service for Technical and Export Energy Cooperation of Russia dated August 31, 2010 No 416/489.

It can be predicted that, as in the case of antivirus software, there will be no certified products for protection classes below the fourth. Therefore, we consider the Protection Profile for the fourth class of protection. It must be said that the requirements for all types are quite similar, so for an example of the requirements we take the Type B profile (if there is interest, we can add differences for other types). This profile is available here.

What is a firewall according to the profile?
software that implements the functions of control and filtering in accordance with the given rules of information flows passing through it.

According to the Profile, the DOE should counteract the following information security threat:


Including the following safety functions must be implemented in the FW:


Expand these requirements in more detail:


Well, that's all. The requirements for functionality end on page 28 and until the end of the document (78 pages in size) are repeated earlier written and requirements for software release, documentation and support procedures.

The profile indicates that the functional safety requirements for the ME are based on the requirements of GOST R ISO / IEC 15408-2-2013 “Information Technology. Methods and means of security. Criteria for assessing the security of information technology. Part 2. Functional components of security "and quite closely resemble the requirements of anti-virus protection profiles.

Unfortunately, there were no diagrams in the open part indicating where the certified ME of Type B should be located. But even from the list of functionality, it can be seen that the protection of home users, mobile users, as well as the protection of mobile devices by FSTEC is not currently considered.

Due to the fact that MEs designed to protect workstations and fall under type B often have an intrusion protection functionality, it is interesting to have requirements for this functionality. In the reviewed Profiles there are no such requirements, but they are in the Methodological document of the FSTEC “Measures to protect information in state information systems”. According to this document ME:


It is stated that the means of protection against intrusions should be able to analyze traffic, update the rules and centralized management. Rules must be editable.

Total, what do we have? At first glance, the basic functionality of a personal firewall is described. But:


According to the requirements of FSTEC, from December 1, 2016, firewalls being developed, manufactured and supplied should comply with the requirements described in the Profiles. Firewalls installed before December 1, 2016 can be operated without re-certification for compliance.

And here consumers expect an ambush. Prior to the release of Profiles, it was possible to use a certified antivirus for protecting workstations, which included a firewall - as a component of the antivirus, also certified. Now it is impossible. It turns out that either the antivirus vendors pay another certification cost (and beat it off of course) - and then it is possible another for IDS or users to buy three separate products - and thus require management to increase the budget. Opportunities for antivirus vendors to extend the certificate are not provided, which means there are not so many options:


Pyachal in any variants.

Until December 1, there are few, wondering who will have time to carry out certification

Source: https://habr.com/ru/post/311188/


All Articles