08-28-2014 01:14 PM - edited 03-11-2019 09:41 PM
This question is about best practices regarding firewalling personal identifiable information such as health records (please see attached image). This scenario assumes the use of Cisco ASA 5500 firewalls.
If the majority of cyber attacks happen from within an organization is it more important to give the "internal" interface a higher security level (higher level of trust) than the DMZ interface that connects to customer information or should the internal interface have a lower security level? I have included a visual depiction of this scenario in my attached document. I would like to know what others are doing to firewall critical information. Would an organization be remiss in not assigning the data servers the highest level of security while assuming that the internal network should be the most secure? Any insight into this question would be appreciated. Thanks!
08-28-2014 11:36 PM
Hi Mike,
Security-level will not play a crucial role, when you have other filtering mechanisms in place..... if you have ACL allowed for certain access in the respective interfaces.... asa will allow by looking at the acl,nat, inspection..... So security-level is not a big challenge.... more over inside interface requires more sec-level than anything...... that is for protecting the outside hackers to get in to internal system.....
But that makes nothing when you have other security configurations in place to filter for permit/deny access.....
Regards
Karthik
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide