Security Standard Network Security Design (SS-018)
Security Standard Network Security Design (SS-018)
Security Standard
Network Security Design
(SS-018)
1. Revision History
Version Author Description Date
0.0a First Draft 08/05/17
Amended to include early review
0.0b
feedback, added additional controls 09/06/17
Amended to include feedback from
0.0c 29/06/17
Standard & Pattern Team
Amended to include feedback from
0.0d 26/07/17
SME review
0.0e Pre-approval draft 14/08/17
1.0 First published version 18/09/17
Document updated to include
sections on Risk Management and
Network Security Architecture.
1.1 Authority Control References 14/01/19
included. A small number of
duplicate requirements have been
removed.
Incorporated comments from Security
1.2 30/01/19
Architecture Team review.
Following external review by Security
1.3 04/03/19
Policy, Risk and Digital
1.4 Version for external publication 30/03/20
2. Distribution
Version Role/Area Role Date
3. Approval History
Version Approver Title Role Date
1.0 Chief Security Officer 18/09/17
1.3 Chief Security Officer 04/03/19
1.4 Chief Security Officer 30/03/20
This document will be reviewed for continued completeness, relevancy and accuracy
within 1 year of being granted “final” status, and at yearly intervals thereafter.
Contents
1. Revision History ...................................................................................... 2
2. Distribution .............................................................................................. 2
3. Approval History ..................................................................................... 2
4. Introduction ............................................................................................. 5
5. Purpose .................................................................................................... 5
6. Exceptions ............................................................................................... 5
7. Audience .................................................................................................. 5
8. Scope ....................................................................................................... 6
9. Security Controls Assurance ................................................................. 6
10. Technical Security Control Requirements ............................................ 6
11. Generic Network Security Requirements .............................................. 7
11.1. Policy ............................................................................................. 7
11.2 Risk Management .......................................................................... 7
11.3 Network Security Architecture ........................................................ 8
11.4 Network Perimeter Requirements .................................................... 10
11.5 Protecting data ................................................................................ 12
11.6 Protecting the enterprise network .................................................... 12
11.7 Segmentation .................................................................................. 13
11.8 Securing Network Services and Devices ......................................... 14
11.9 Maintaining Network Security .......................................................... 14
11.10 Access Control ............................................................................. 15
11.11 Patching & Testing ....................................................................... 16
11.12 Redundancy ................................................................................. 16
11.13 Administration & Management ..................................................... 16
11.14 Protective Monitoring ................................................................... 18
11.15 Users Instructions and Training ................................................... 19
11.16 Roles and Responsibilities ........................................................... 19
11.17 Incident management................................................................... 19
11.18 Physical Security .......................................................................... 19
12 Office Local Area Network (LAN) ......................................................... 20
12.6 Additional LAN Requirements.......................................................... 20
12.7 Wireless Networking ........................................................................ 20
13 Wide Area Network (WAN) .................................................................... 20
13.6 Core WAN Requirements ................................................................ 20
13.7 Internet Access ................................................................................ 21
13.8 Routing Security .............................................................................. 21
13.9 Service Resilience ........................................................................... 21
14 Datacentre.............................................................................................. 22
14.6 General Requirements..................................................................... 22
14.7 Network and Boundary Controls ...................................................... 22
14.8 Network Storage Devices ................................................................ 23
14.9 Physical Security ............................................................................. 24
15 Virtual Private Networks (VPNs) .......................................................... 24
15.6 VPN Core Requirements ................................................................. 24
15.7 VPN Gateway .................................................................................. 25
15.8 VPN Endpoint Devices .................................................................... 25
16 Compliance ............................................................................................ 25
17 Accessibility .......................................................................................... 26
4. Introduction
4.1. This Network Security Design Standard provides the list of controls that are
required to secure networks to an Authority approved level of security. This
standard provides a list of security controls to protect citizen and operational
data. It is to minimise the risk from known threats both physical and logical to
an acceptable level for operations.
4.2. Furthermore, the security controls presented in this standard are taken from
the international best practice for network security and have been tailored for
Authority suitability.
5. Purpose
5.1. The purpose of this document is to enable Suppliers to work to a defined set
of security requirements which enable solutions to be developed, deployed
and managed to Authority security standards, which are based upon
international best practice for network deployments.
6. Exceptions
6.1. In this document the term MUST in upper case is used to indicate an absolute
requirement. Failure to meet these requirements will require a formal
exemption as detailed below.
6.2. Any exceptions to the application of this standard or where controls cannot be
adhered to MUST be presented to the Authority where appropriate. This
MUST be carried out prior to deployment and managed through the design
caveats or exception process.
6.3. Such exception requests may invoke the Risk Management process in order
to clarify the potential impact of any deviation to the configuration detailed in
this standard.
7. Audience
7.1. This standard is intended for Security and Technical Architects, Suppliers,
Database Administrators, Security Operations, Network Designers and
Administrators, Developers, Security Groups and also IT staff such as
8. Scope
8.1. This standard relates to the network infrastructure and components that
provide connectivity for internal users of the Authority information systems
within the OFFICIAL tier of the Government Security Classification Policy
(GSCP). This standard covers office LAN infrastructure supporting desktops
and mobile devices that have a wired connection to the Authority network.
This includes services that support the office LAN but are located within
Authority datacenters. This standard also covers wide area infrastructure
which provides connectivity between these office locations and business
applications hosted within or externally to the Authority Hosted infrastructure.
The requirements will be applied to new and existing installations.
8.2. The security control requirements laid out in this standard are product
agnostic and applicable for all network systems that are provisioned for
departmental use.
8.3. In the event of uncertainty on the controls laid out in this standard please
contact the Authority for guidance and support on items which require
clarification.
9. Security Controls Assurance
9.1. Controls presented in this standard or referred to via this standard may be the
subject of a formalised IT Health Check or Penetration Test to provide
evidence of adequacy and effectiveness.
In this document the term MUST in upper case is used to indicate an absolute
requirement. Failure to meet these requirements will require a formal exemption (see
section [6. Exceptions] above).
Any reference to sensitive data in the security requirements refers to data that has
been classified at the OFFICIAL or OFFICIAL-SENSITIVE tier or otherwise data that
could be useful for malicious actors intending to attack the network.
11.1. Policy
Reference Security Control Requirement
11.1.1. There MUST be an information security policy that considers
network connections/network security (it MUST cover connection to
all Authority network services and system operating procedures for
admins).
11.1.2. The Authority will use ISO27033 as its framework for Network
Security Design.
11.2.6 The network security design MUST take account of the following
types of risks;
Loss of-
- Confidentiality of information and code
- Integrity of information and code
- Availability of information and network services
- Non-repudiation of network transactions
- Accountability of network transactions
- Authenticity of information, users and administrator
11.3.4 Security protection MUST be provided for all three security layers
as defined in X.805: the infrastructure layer, the services layer and
the application layer.
11.3.5 It MUST be possible to separate the security concerns associated
with each of the planes as defined in X.805: the planes are
management, control and end-user. For example, if there is a flood
of packets related to the end-user plane these MUST not interfere
with the ability of the network administrator to correct the problem in
the management plane. Take account of the security objectives for
each plane as they are documented in X.805.
11.3.6 Network Security Design MUST include the following inputs:
- The Authority’s documented service requirements
- Documentation of any planned architecture, design and
implementation
- Current network security policy (or relevant parts of the
information security policy) preferably based on a risk
assessment combined with a management review
- Definition of the assets that should be protected
- Current and planned performance requirements
11.7 Segmentation
Boundaries between the security zones should conform to the requirements within
the SS-006 Security Boundaries Security Standard.
11.12 Redundancy
Reference Security Control Requirement
11.12.1 The network MUST meet availability requirements (in accordance
with the SLA requirement for that part of the network). Ideally, it
should have no single point of failure.
11.14.4 There MUST be visibility and awareness into what is occurring on the
network at any given time. This should include traffic statistics, system
utilisation/status information, Syslog, SNMP, ACL logging, accounting,
archive configuration change logger, packet capture, device access
information etc.
11.14.5 Audit logs MUST be maintained that include the following types of
event:
a record of who accessed network infrastructure components,
what occurred, and when,
Logging of all critical/non-critical transactions by users,
remote failed log-on attempts with dates and times,
failed re-authentication (or token usage) events,
security gateway traffic breaches,
remote attempts to access audit logs,
system management alerts/alarms with security implications
(e.g. IP address duplication, bearer circuit disruptions),
configuration control changes including altering permissions for
management interfaces and altering routing tables.
11.14.7 There MUST be the use of analysis tools to help to identify when
network systems are behaving in an unexpected way or providing
indications that systems are under attack or have been.
11.14.8 There MUST be audit of the use of import and export services. Users
can be provided with the means to ‘self-audit’ their use of import and
export services.
For Office LAN, all relevant requirements specified in Section 11 – Generic Network
Security apply in addition to all the requirements below
For Wide Area Network, all relevant requirements specified in Section 11 – Generic
Network Security and Section 12 – Office LAN apply in addition to all the
requirements below
13.8.3 Neighbour status changes that may indicate network connectivity and
stability issues (due to an attack or general operations problems)
MUST be detected and logged.
13.8.4 Appropriate filters MUST be deployed at WAN edges where invalid
routing information may be introduced.
13.8.5 There MUST be IP spoofing protection that includes source address
validation
14 Datacentre
14.7.4 The datacentre MUST provide the ability for applications and data to
be hosted in separate hosting segments to provide segregation of
data and to control interactions between them
14.7.5 Segregated network, compute and storage facilities MUST be
provided to manage and monitor the datacentre infrastructure.
14.7.6 Consideration MUST be given to determine which components of the
datacentre infrastructure MUST be built using dedicated infrastructure
components physically discrete from the overall shared network for
added security.
14.7.7 Consideration MUST be given to inform the extent and need for
(traffic) filtering/ separation for each of the layers 2, 3, 4 and 7 (of the
OSI model) and the need for IPS/IDS either on the host and/or
between segments.
14.7.8 Infrastructure and application “Call Home” data flows (i.e. for updating)
MUST be subject to risk assessment for protocol break and inspection
in transit across boundaries with untrusted networks.
15.6.7 The VPN solution MUST maintain appropriate audit logs for the
analysis of all actions at that endpoint.
15.6.8 Technical vulnerability management MUST be present for all VPN
devices. This means that the device MUST be kept in a hardened
configuration and management arrangements MUST be in place to
manage vulnerabilities.
15.6.9 There MUST be hardening of VLANs against hopping and other
attacks. This could be mitigated by applying best industry and
manufacturer practices
16 Compliance
17 Accessibility
No user interfaces are included in this standard and accessibility is not applicable as
part of this standard. However, it is deemed that Suppliers implementing this
standard are obliged to incorporate accessibility functions where necessary.
18 Reference Documents
Centre for the Protection of National Infrastructure: Protection of Data Centres, April
2010
CESG Good Practice Guide 35 – Protecting an Internal ICT Network, Issue 2.0,
August 2011
19 Definition of Terms
20 Glossary
AAA Authentication, Authorization and Accounting
ACL Access Control List
AES Advanced Encryption Standard – defined in FIPS 197. Different
modes of operation are covered in different documents.
ARP Address Resolution Protocol
DAM Database Activity Monitoring
DHCP Domain Host Configuration Protocol
DLP Data Loss Protection
DMZ Demilitarised Zone
DNS Domain Name Service
DA Design Authority (DA)
DoS Denial of Service
Authority The Authority is the Department for Work and Pensions (DWP)