📜 ⬆️ ⬇️

FSTEC: firewall requirements - 2

Last time we reviewed the requirements of the FSTEC of the Russian Federation for personal firewalls — firewalls at the node level (type “B”) installed on the workstations of the protected network. We continue the conversation and consider the requirements for solutions to protect web servers.

Recall that a web server-level firewall (type “G”) can be used on the server serving the sites, web services and web applications, or on the physical boundary of the segment of such server servers). Firewalls of type “G” can have software or software and technical execution and should provide control and filtering of information flows using the hypertext transfer protocol transmitted to the web server and from the web server.

Already there is a question. Apparently, this ME is considered to be ME for a specific application (such as a Web application firewall) and the network should be the main ME. It is assumed that this main ME is not able to parse HTTP. But for the work and the web server need other protocols. At least due to the need to upload files there is FTP / SFTP / SCP (SSH), many servers have mail distribution functions and other functionality. It is assumed that the main ME does not know how to parse HTTP, but it can parse other protocols? But for type A, only the type of protocol is spelled out:

the ability to filter based on the following types of information security attributes: a network protocol that is used for interaction; attributes indicating packet fragmentation; the transport protocol that is used for communication, the source and destination ports within the session (s); allowed (prohibited) commands, allowed (prohibited) mobile code ...

Requirements for type G firewalls are posted here . Since, for type G, as already mentioned, class 4 is maximal, we consider it exactly.
')
The DOE should ensure the neutralization of the following information security threats:


The truth in the definition of a ME ego task is narrowed - according to the ME Profile "is a software or software-technical tool that implements the functions of control and filtering in accordance with the specified rules of information flows passing through it, and is used to ensure protection (non-cryptographic methods) of restricted access information ". But for type A, only knowledge of the type of protocol is spelled out:

the ability to filter based on the following types of information security attributes: a network protocol that is used for interaction;
attributes indicating packet fragmentation; the transport protocol that is used for communication, the source and destination ports within the session (s); allowed (prohibited) commands, allowed (prohibited) mobile code ...

The following safety functions must be implemented in the DOE:


Among other things, the DOE should operate in an environment that ensures the safe operation of the DOE.

Type 4 MEs must provide:


Well, that's all. The list of requirements is less than a quarter of the document.

It is interesting to compare the difference in requirements between the fourth and sixth classes:


Interestingly, the list of what should be implemented as part of the security features does not match the requirements described. So, in the first list there is testing of security functions - and then according to the document with regard to the product this requirement is absent (this is by the way about the dangers of total secrecy. The DSP version clearly shows what should be from the functional). There are other similar discrepancies.

Also, the requirements for the DOE are present in the Methodological document of the FSTEC "Measures to protect information in state information systems." Recall that according to this document, the ME should apply anti-virus protection, anti-spam protection and an intrusion detection (prevention) system. DOE must support clustering. In turn, the means of protection against intrusions should be able to analyze traffic, update the rules and centralized management. Rules must be editable.

Let's sum up:

  1. The document is very high level. There is no description of possible types and variants of filtering. In fact, the only indication is the requirement to have a system for monitoring and analyzing requests and responses over HTTP of certain versions, as well as the requirement to check for the presence of mobile code in requests. The absence of clear requirements gives both the possibility of submitting only formally qualifying products for certification and refusal of certification for purely formal reasons;
  2. A trusted channel is required for HTTPS analysis using encryption allowed in Russia;
  3. There is no list of controlled protocols. Only one is mentioned - HTTP;
  4. Although this type of DOE should be used as part of an information system, there are no requirements for centralized management. It is only required to provide a trusted control channel as part of the operational environment;
  5. There are no requirements for network attack protection functionality;
  6. Despite the requirement for updating procedures, there are no requirements for the availability of update functions in the functional;
  7. Completely incomprehensible requirement for interaction with other means of protection. There is no single protocol for protection — although the manufacturers of the very same SIEM would not have refused it. Perhaps this requirement for a specific product?

According to the requirements of FSTEC, from December 1, 2016, firewalls being developed, manufactured and supplied should comply with the requirements described in the Profiles. Firewalls installed before December 1, 2016 can be operated without re-certification for compliance.

I thank all users (especially imbasoft ) who made valuable comments on the previous article.

Source: https://habr.com/ru/post/312176/


All Articles