(1) All (2) The (3) Securing the network infrastructure is a crucial element in providing a reliable operational environment for the (4) The intent of this procedure is to establish appropriate network security controls to protect (5) This procedure applies to: (6) The following security configurations are to be followed and implemented across the (7) Exceptions will need to be authorised at an Associate Director level, or assessed by the Architectural Advisory Group (AAG). (8) Any user access to (9) Where systems allow, before a user gains access to (10) All (11) All (12) All access through the (13) Inbound internet traffic shall be limited to only system component and services within the respective security containers protected by intelligent firewalling systems and to other authorised ICT services and systems. (14) For any change to be enabled in the (15) All remote access (16) Secure remote access must be controlled with encryption and strong passwords or pass-phrases (dependent on the capability of the underlying systems supporting Authentication, Authorisation and Accounting (‘AAA’)). For further information see the Password Requirements section of the (17) The VPN shall be configured in such a way that the users would not be able to access any other network simultaneously while connected to (18) (19) All remote access to any administrative interface for (20) All systems providing VPN termination must be configured with an idle time-out. The time-out shall be configured to end all sessions after an idle period of 30 mins. (21) Wireless access points shall be enabled with minimum IEEE 802.11i settings to implement strong encryption for authentication and transmission. The use of WEP as a security standard to access (22) Network-based IPS must be implemented for all critical data centre networks, networks hosting critical research systems & internet hosted applications, to monitor and prevent attacks. (23) Management traffic should be separated from user traffic. (24) VLAN’s shall be set up to restrict network traffic between production environment and non-production environment inside the Data Centre infrastructure. (25) Security containers / network segmentation shall be created to host all internet facing applications and services in a segregated network from the internal network. (26) System components that store research data should be hosted in a separate security container and where appropriate, segregated from untrusted networks. (27) Network configurations managing access to research containers shall be configured to restrict all external untrusted inbound traffic to that which is necessary for the research environment and specifically deny all other traffic, i.e. ‘Deny All – Allow Specific’. (28) User authenticated unmanaged systems and devices connecting to (29) (30) All network device passwords should be created and managed in accordance with the Administrative User Password Requirements section of the Information Security Access Control Manual. (31) Before installing a device on the network the default account settings and configurations must be changed and devices must be hardened. (Hardening must include, but no limited: Disabling or blocking of non-essential services; Restrict access to management interfaces (Console / SSH, Web Admin, FTP, SNMP etc) to nominated managed networks or nominated management / monitoring devices / systems; Disable all guest or world read access; Change the name of and/or remove default administrator user accounts). (32) Patches and updates should be applied to network devices as per Information Security Patch Management Manual. (33) Plain-text protocols should not be used in network management. (34) Network Device management interfaces should be on a management network. (35) Any console port used for device management should be secured by a username / password and follow complexity features required as per Password section of the Information Security User Access Management Procedure. (36) Network management services should be configured with SNMPv3 with encryption enabled (or other option that does not use plaintext community strings). (37) The following protocols are prohibited for use: FTP, telnet, RDP without NLA, SSHv1, SSLv1, SSLv, SSLv3 and LDAP. (38) The configuration of all network equipment should be backed up regularly. (39) The configurations should be subject to managed revision control. (40) Logs generated from the security devices should be stored and backed up. Refer to Information Security Operations Management Manual for log retention guidelines. (41) Where technically feasible all communication devices and systems shall be enabled with encryption solutions and must comply with applicable (42) Any changes required to the Firewall must be requested initiating a request for change request per the change request process along with completing a Change Request form (See associated information). Refer Information Security Operations Management Manual for change management process and guidelines. (43) Requested changes must be assessed and approved by a senior member of the Networks & Communications Team and by the Networks Team Leader. This assessment will evaluate such areas as the potential impact upon other network devices and network services. (44) The change application must then be referred to the IT Security Team. (45) The IT Security team will perform a Quarterly vulnerability assessment on the network devices to check compliance to the configurations listed. (46) Any intrusion attempts or malicious activity on the network should be monitored on periodic basis. Incidents should be responded to as per the (47) SIEM solutions shall be implemented to perform log correlation and periodically review and monitor for anomalous events. (48) Firewalls protecting enterprise systems must be reviewed annually and the documentation of the firewall rule sets are to be retained. (49) Exceptions to this procedure may be requested in writing or via email to the relevant IT Associate Director. Exceptions will be assessed based on the business impact, the security (50) All users performing roles of system or application administrators managing (51) The (52) The IT Security Team is responsible for routinely performing compliance checks with this procedure.Information Security Network Security Procedure
Section 1 - Procedure
Audience
Purpose
Scope
Top of PageSection 2 - Network Security Requirements
Authentication
Firewall
Remote Access
Wireless Access
Network Design & Segregation
Network Design for Research Systems
Network Posture Assessment
Network Management
Cryptography
Minimum acceptable encryption algorithms:
Change Management
Review and Monitoring
Exceptions
Enforcement
Roles and Responsibilities
View Current
This is not a current document. It has been repealed and is no longer in force.