Page 640 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 640

classification or sensitivity are grouped together and isolated from
               other groups with different levels. This isolation can be absolute or

               one-directional. For example, a lower level may not be able to initiate
               communication with a higher level, but a higher level may initiate with
               a lower level. Isolation can also be logical or physical. Logical isolation
               requires the use of classification labels on data and packets, which
               must be respected and enforced by network management, OSs, and
               applications. Physical isolation requires implementing network
               segmentation or air gaps between networks of different security levels.



               Application Firewalls

               An application firewall is a device, server add-on, virtual service, or
               system filter that defines a strict set of communication rules for a
               service and all users. It’s intended to be an application-specific server-
               side firewall to prevent application-specific protocol and payload
               attacks.

               A network firewall is a hardware device, typically called an appliance,

               designed for general network filtering. A network firewall is designed
               to provide broad protection for an entire network.

               Both of these types of firewalls are important and may be relevant in
               many situations. Every network needs a network firewall. Many
               application servers need an application firewall. However, the use of
               an application firewall generally doesn’t negate the need for a network
               firewall. You should use both firewalls in a series to complement each

               other, rather than seeing them as competitive solutions.


               Manual Updates

               Manual updates should be used in static environments to ensure that
               only tested and authorized changes are implemented. Using an
               automated update system would allow for untested updates to
               introduce unknown security reductions.


               Firmware Version Control

               Similar to manual software updates, strict control over firmware in a
               static environment is important. Firmware updates should be
   635   636   637   638   639   640   641   642   643   644   645