DWP ss018 Security Standard Network Security Design PDF
DWP ss018 Security Standard Network Security Design PDF
DWP Security Policies and Standards apply to DWP suppliers and contractors
where explicitly stated in the Security Schedule of the contract. DWP Standards are not a
cross government requirement.
Updating policy
This Standard will be reviewed for continued completeness, relevancy and accuracy within 1
year of being granted “final” status, and at yearly intervals thereafter.
The version control table will show the published update date and provide a thumbnail of the
major change. CAUTION: the thumbnail is not intended to summarise the change and not a
substitute for reading the full text.
Contents
1. Introduction ............................................................................................................... 4
2. Purpose .................................................................................................................... 4
3. Exceptions ................................................................................................................ 4
4. Audience .................................................................................................................. 5
5. Scope ....................................................................................................................... 5
6. Security Controls Assurance .................................................................................... 5
7. Technical Security Control Requirements ................................................................ 5
8. Generic Network Security Requirements ................................................................. 5
Policy................................................................................................................................. 6
Risk Management ............................................................................................................. 6
Network Security Architecture........................................................................................... 7
Network Perimeter Requirements ................................................................................... 10
Protecting data ................................................................................................................ 12
Protecting the enterprise network ................................................................................... 13
Segmentation .................................................................................................................. 14
Securing Network Services and Devices ........................................................................ 15
Maintaining Network Security ......................................................................................... 16
Access Control ................................................................................................................ 17
Patching & Testing .......................................................................................................... 18
Redundancy .................................................................................................................... 19
Administration & Management ........................................................................................ 19
Protective Monitoring ...................................................................................................... 20
Users Instructions and Training ...................................................................................... 22
Roles and Responsibilities .............................................................................................. 22
Incident management ..................................................................................................... 23
Physical Security............................................................................................................. 23
9. Office Local Area Network (LAN) ........................................................................... 23
Additional LAN Requirements ......................................................................................... 23
Wireless Networking ....................................................................................................... 24
10. Wide Area Network (WAN) .................................................................................... 24
Core WAN Requirements ............................................................................................... 24
Internet Access ............................................................................................................... 25
Routing Security .............................................................................................................. 25
Service Resilience .......................................................................................................... 25
11. Datacentre .............................................................................................................. 26
General Requirements .................................................................................................... 26
Network and Boundary Controls ..................................................................................... 27
Network Storage Devices ............................................................................................... 28
Physical Security............................................................................................................. 28
12. Virtual Private Networks (VPNs) ............................................................................ 29
VPN Core Requirements ................................................................................................ 29
VPN Gateway ................................................................................................................. 30
VPN Endpoint Devices .................................................................................................... 31
13. Compliance ............................................................................................................ 31
14. Accessibility ............................................................................................................ 31
15. Security Standards Reference List ......................................................................... 32
16. Reference Documents ........................................................................................... 32
17. Definition of Terms ................................................................................................. 33
18. Glossary ................................................................................................................. 34
1. Introduction
1.1. This Network Design Security Standard provides the list of controls that are
required to secure networks to a Department for Work and Pensions (DWP)
approved level of security. This standard provides a list of security controls to
protect citizen and operational data. It is to minimise the risk from known
threats both physical and logical to an acceptable level for operations.
1.2. For further clarity and relevance, this standard is aligned to the DWP Digital
Blueprint, which defines the direction for all departmental technology.
1.3. Furthermore, the security controls presented in this standard are taken from
the international best practice for network security and have been tailored for
Departmental suitability.
2. Purpose
2.1. The purpose of this document is to enable teams to work to a defined set of
security requirements which enable solutions to be developed, deployed and
managed to Departmental security standards, which are based upon
international best practice for network deployments.
3. Exceptions
3.1. In this document the term MUST in upper case is used to indicate an absolute
requirement. Failure to meet these requirements will require a formal
exemption as detailed below.
3.2. Any exceptions to the application of this standard or where controls cannot be
adhered to MUST be presented to an assigned Security Architect and
considered for submission to the DWP Design Authority (DA) advisory or
governance board, where appropriate. This MUST be carried out prior to
deployment and managed through the design caveats or exception process.
3.3. Such exception requests may invoke the Risk Management process in order
to clarify the potential impact of any deviation to the configuration detailed in
this standard.
4. Audience
4.1. This standard is intended for Security and Technical Architects, Suppliers,
Database Administrators, Security Operations, Network Designers and
Administrators, Developers, Security Groups and also IT staff such as
Security Compliance Teams involved in securing environments for DWP
systems and applications.
5. Scope
5.1. This standard relates to the network infrastructure and components that
provide connectivity for internal users of the DWP information systems within
the OFFICIAL tier of the Government Security Classification Policy (GSCP).
This standard covers office LAN infrastructure supporting desktops and
mobile devices that have a wired connection to the DWP network. This
includes services that support the office LAN but are located within DWP
datacenters. This standard also covers wide area infrastructure which
provides connectivity between these office locations and business
applications hosted within or externally to the DWP Hosted infrastructure. The
requirements will be applied to new and existing installations.
5.2. The security control requirements laid out in this standard are product
agnostic and applicable for all network systems that are provisioned for
departmental use.
5.3. In the event of uncertainty on the controls laid out in this standard please
contact the Security Front Door for guidance and support on items which
require clarification.
Any reference to sensitive data in the security requirements refers to data that has
been classified at the OFFICIAL or OFFICIAL-SENSITIVE tier or otherwise data that
could be useful for malicious actors intending to attack the network.
Policy
Reference Security Control Requirement DWP Control
Reference
8.1.1. There MUST be a DWP information security SC9-1.1
policy that considers network
connections/network security (it MUST cover
use of all DWP network services and system
operating procedures for admins).
8.1.2. DWP will use ISO27033 as its framework for SC9-1.1
Network Security Design.
Risk Management
networks. For further details and requirements, please refer to the Secure
Boundaries standard.
Protecting data
Segmentation
Boundaries between the security zones should conform to the requirements within
the SS-006 Secure Boundaries Security Standard.
Access Control
Redundancy
Protective Monitoring
Incident management
Physical Security
For Office LAN, all relevant requirements specified in Section 11 – Generic Network
Security apply in addition to all the requirements below
Wireless Networking
Reference Security Control Requirement DWP Control
Reference
11.6.69 Wireless Networking MUST be in compliance SC9-1.1
with SS-019 Wireless Networking Security
Standard and SS-016 Remote Access Security
Standard. Wireless networks access points
MUST be treated as untrusted and network
controls MUST be implemented accordingly
For Wide Area Network, all relevant requirements specified in Section 11 – Generic
Network Security and Section 12 – Office LAN apply in addition to all the
requirements below
Internet Access
Reference DWP Control
Reference
11.6.73 All exports to the Internet MUST be authorised SC9-1.1
by a user. Export authorisation should be
traceable to the user who conducted the export.
Validity checks MUST be conducted on users
export authority (e.g. check for any revocation)
and protect the integrity of exports. This could
be achieved using digital signatures.
Routing Security
Reference Security Control Requirement DWP Control
Reference
11.6.74 Routing sessions MUST be restricted to trusted SC9-1.1
peers and the origin and integrity of routing
updates MUST be validated. This should
include authenticating all routing peers and
disabling routing on all unauthorised interfaces
by default.
11.6.75 Only legitimate networks MUST be advertised SC9-1.1
and propagated.
11.6.76 Neighbour status changes that may indicate SC9-1.1
network connectivity and stability issues (due to
an attack or general operations problems)
MUST be detected and logged.
11.6.77 Appropriate filters MUST be deployed at WAN SC9-1.1
edges where invalid routing information may be
introduced.
11.6.78 There MUST be IP spoofing protection that SC9-1.1
includes source address validation
Service Resilience
Reference Security Control Requirement DWP Control
Reference
11.6.79 WAN resources MUST be protected from SC9-1.3
exhaustion attacks
11.6.80 It MUST be ensured any limited resources at a SC9-1.3
remote site, such as a low bandwidth WAN link
or a low performance platform, are not
overwhelmed, and their utilization is optimised.
11. Datacentre
For Datacentre, all relevant requirements specified in Section 11 – Generic Network
Security Section 12 – Office LAN and Section 13 – Wide Area Network apply in
addition to all the requirements below
General Requirements
Reference Security Control Requirement DWP Control
Reference
11.6.82 There MUST be a firewall for datacentre SC9-1.1
ingress and egress traffic. The firewall MUST
be in accordance with SS-013 Firewall Security
Standard and the DWP Firewall Security
Policy.
11.6.83 The use of shared, virtualised network, server SC9-1.1
and storage infrastructure to host applications
and databases containing OFFICIAL classified
data MUST be in compliance with SS-025
Virtualisation Security Standard
11.6.84 Virtualised network, server, storage machines SC9-1.1
and other virtualised network components
MUST provide the same level of security
controls as per their physical counterparts.
11.6.85 A separate services segment is required which SC9-1.4
can offer firewalling, application delivery
scanning/control and additional security
inspection capabilities to the hosting segments
as appropriate
11.6.86 Separate domains MUST be used to manage SC9-1.4
and monitor from a service and security
perspective. There are four possible domains:
1. Management - common management
components for managing the hosting
service.
2. Security - similar to Management
domain, but instead provides access to
the security enforcing components.
Accessed from a secure environment
3. Service Monitoring –Receives and
stores all non-security alerts and
monitoring feeds. Provides a platform for
initial processing of events to provide
Physical Security
Reference Security Control Requirement DWP Control
Reference
11.6.98 The datacentre MUST have resilient diverse SC13-2.1
communications. In the event of a power
VPN Gateway
Reference Security Control Requirement DWP Control
Reference
11.6.115 The VPN gateway, which terminates any SC9-1.1
encryption used to protect the link from the
endpoint, MUST be located in the security
boundary.
11.6.116 The VPN gateway MUST mutually authenticate SC5-2.4
with the device (with prior authentication of
user to device having occurred) before allowing
access.
13. Compliance
Compliance with this standard MUST occur as follows:
14. Accessibility
No user interfaces are included in this standard and accessibility is not applicable as
part of this standard. However, it is deemed that projects implementing this standard
are obliged to incorporate accessibility functions where necessary.
CESG Good Practice Guide 35 – Protecting an Internal ICT Network, Issue 2.0,
August 2011
Virtual Local independent network created from a logical point of view within a
Area Network physical network
VPN Gateway a type of networking device that connects two or more devices
or networks together in a VPN infrastructure. It is designed to
bridge the connection or communication between two or more
remote sites, networks or devices and/or to connect multiple
VPNs together.
18. Glossary
Abbreviation Definition
AAA Authentication, Authorization and Accounting
ACL Access Control List
AES Advanced Encryption Standard – defined in FIPS 197. Different
modes of operation are covered in different documents.
ARP Address Resolution Protocol
DAM Database Activity Monitoring
DHCP Domain Host Configuration Protocol
DLP Data Loss Protection
DMZ Demilitarised Zone
DNS Domain Name Service
DA Design Authority (DA)
DoS Denial of Service
DWP Department for Work and Pensions (DWP)
DMZ De-militarised Zone
FTP File transfer protocol
HIPS/HIDS Host-based Intrusion Protection/Detection System
HTTP/HTTPS Hypertext Transfer Protocol/ Hypertext Transfer Protocol Secure
IPS/IDS Intrusion Protection/Detection System
LAN Local Area Network
MAC Media Access Control
MITM Man-in-the-middle
MPLS Multi-protocol label switching
NAC Network Admission Control
NAT Network Address Translation
NAS Network Attached Storage
NCSC National Cyber Security Centre
NIPS/NIDS Network Intrusion Protection/Detection System
NTP Network Time Protocol
OOB Out of Band
PKI Public Key Infrastructure
PSN Public Sector Network
QoS Quality of Service
SAN Storage Area Network
SNMP Simple Network Management Protocol
SOC Security Operations Centre
SQL Structured Query Language
STP Spanning Tree Protocol