Tip

Integrating firewalls into your financial enterprise systems

To better protect your financial enterprise system, you have firewalls in many areas of a network topology, mostly found guarding the perimeters of your networks. The reality is that is not enough.

Today's firewall technologies are getting more complex and harder to configure and administer. Technologies, such as virtual private networks (VPNs) and wireless networking, make maintaining this perimeter more difficult.

For this reason, the firewall technologies might operate in an unexpected way that could cause unplanned network downtimes and ultimately a system crash. To get the firewalls to work at an optimum, you need to integrate a firewall management policy into your system.

When implementing the firewall management policy, the ultimate goal is to quickly bolster security, support a larger IT policy as well as provide detailed guidance for the people managing the firewalls. To achieve this, financial services firm should do the following steps.

  • Conduct an economic feasibility study of installing and integrating firewall and perimeters technologies into the financial enterprise system. The study should include system challenges such as security, logistical, scalability, operation, IT, program management and education and training.
  • Conduct a site analysis to ensure firewall and perimeter management can be integrated with the system and your existing architecture of hosts, users, servers and other elements of
    • Requires Free Membership to View

    • the network. The analysis should include the capacity, expandability, scalability and management of firewalls and perimeters.
    • Review your firewall management policies to ensure they are keeping pace with new threats (e.g., via firewalls logs) and does not conflict with established security and business policies. Review firewall configurations in response to changes to compliance regulations.
    • Review your compliance policies to ensure the compliance regulations have been met and the data required for compliance has not been blocked by the firewalls and the storage of data has been retained for a specified period of time. Review your backup policies and test periodically the restoration of backup media. Run backup tapes at off-production times to ensure they are in good condition.
    • Conduct a pilot study on integrating firewall management policy into a sample portion of the enterprise. This will help the integrators solve any potential problems before integrating the firewalls on a large scale, as well as determine what education and training the systems administrators will need to solve unusual anomalies. Without proper training and education, the firewalls can be difficult to configure and administrator.
    • As part of the study, test stateful multi-level (SML) firewalls to see if they deploy the best features of the other three firewall types: network, circuit and application levels. They filter packets at the network level and they recognize and process application-level data. They don't employ proxies, but they deliver reasonably good performance in spite of the deep packet analysis.
    • Test firewall monitoring for real-time alerting and consider using an add-on product to combat emerging threats. Periodically test new technologies against the firewall to determine that the system is performing as designed. Review firewall logs.
    • Implementing the firewall management policy can be a challenge for a financial services firm. Proper implementation techniques can make the job easier.

      About the author:
      Judith M. Myerson is a systems architect and engineer. Her areas of interest include middleware technologies, enterprise-wide system, database technologies, application development, network management, computer security, information assurance, financial, RFID technologies and project management.


      This was first published in September 2008

    There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.