[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: survey of isp security practices



Thanks for putting this together, some comments inline.

Bora

On 11/9/04 4:03 AM, "Merike Kaeo" <kaeo@merike.com> wrote:

> I  missed the cut-off for submitting a 00-draft for the survey of
> current isp security practices document but would like to at least send
> out the proposed outline so that people interested in contributing can
> comment to the list.  Anything that is glaringly missing?
> 
> - merike
> 
> 
> Table of Contents
> 
>     1.  Introduction
>     2.  Problem Statement
>     3.  Device Access Security
>       3.1   Threat Description
>       3.2   Best Current Practice
>         3.2.1   Logical access
What is logical access (ssh?)

>         3.2.2   Console Access
>         3.2.3   HTTP
>         3.2.4   SNMP

Would like to add API based access to the management interfaces.

>     4.  Authentication / Authorization
>       4.1   Threat Description
>       4.2   Best Current Practice
>         4.2.1   Device Access
>         4.2.2   Routing
>         4.2.3   MAC Address

I think (2) and (3) above are good but their suitability to be classified
under Authentication/Authorization highly depends on what the threat is.

>     5.  Filtering
>       5.1   Threat Description
>       5.2   Best Current Practice
>         5.2.1   General Inbound Traffic Filters
>         5.2.2   General Outbound Traffic Filters
>         5.2.3   Device Access Filters
>         5.2.4   Route Filters
>         5.2.5   MAC Address Filters
>         5.2.6   DoS Mitigation Filtering
>         5.2.7   SinkHole / Blackhole
>         5.2.8   uRPF
>     6.  Logging (accounting)
>       6.1   Threat Description
>       6.2   Best Current Practice
>         6.2.1   What traffic is logged
>         6.2.2   What fields are logged
>         6.2.3   How long are logs kept
>         6.2.4   Local buffer vs syslog (for backup info)
>         6.2.5   Authentication from peer to peer of log files?
>         6.2.6   Integrity check of log files?
>         6.2.7   NTP source considerations
>     7.  Device Integrity
>       7.1   Threat Description
>       7.2   Best Current Practice
>         7.2.1   Device Image Upgrade
>         7.2.2   Device Configuration
>         7.2.3   Management/Logging Information

I don't know it fits under (3) above, but I would like to see a few words
somewhere about core dumps from network devices.


>     8.  Specific Protocol/Service Concerns
>       8.1   Threat Description
>       8.2   Best Current Practice
>         8.2.1   ICMP
>         8.2.2   Generally Unused Services

There is a whole lot more here, SSH, HTTP, SCP, ......
I am wondering if we want to avoid listing specific services here since they
will need to be updated as people come up with new services.

>     9.  Policy/Procedural Considerations
>       9.1   Threat Description
>       9.2   Best Current Practice
>         9.2.1   Equipment Software Update
>         9.2.2   Equipment Configuration Change

(2) Can we add Change and Versioning.