<section title="19.3. Firewalls"><subsection title="Objective"><paragraph
    title="19.3.1."


><![CDATA[<p>Agencies operating bi-directional gateways implement firewalls and traffic flow filters to provide a protective layer to their networks in both discrete and virtual environments.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.3.2."


><![CDATA[<p>This section covers information relating to filtering requirements for bi-direction gateways between networks of different security domains.</p>]]></paragraph>
<paragraph
    title="19.3.3."


><![CDATA[<p>When a control specifies a requirement for a diode or filter the appropriate information can be found within <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16715">Section 19.4 –Diodes </a>and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16919">Section 20.3 – Content Filtering</a>.</p>]]></paragraph>
<paragraph
    title="19.3.4."


><![CDATA[<p>Additional information that also applies to topics covered in the section can be found in:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security </a>which provides advice on the selection of evaluated products;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16836">Section 20.1 – Data Transfers</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16876">Section 20.2 – Data Import and Export</a>; and</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Inter-connecting networks within an agency"><paragraph
    title="19.3.5."


><![CDATA[<p>When connecting networks accredited to the same classification and set of endorsements within an agency the requirements of this section may not apply.  When connecting networks accredited with different classifications or endorsements within an agency the information in this section applies.</p>]]></paragraph>
</block>
<block title="Connecting agency networks to the Internet"><paragraph
    title="19.3.6."


><![CDATA[<p>When connecting an agency network to the Internet, the Internet is considered an UNCLASSIFIED and insecure network.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="19.3.7."


><![CDATA[<p>Further information on the Network Device Protection Profile (NDPP) and firewalls can be found at:</p><table class="table-main">
<tbody>
<tr>
<td style="text-align: center;"><strong>Reference&nbsp;</strong></td>
<td style="text-align: center;"><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td style="text-align: center;"><strong>Source</strong></td>
</tr>
<tr>
<td><strong><strong>NDPP</strong></strong></td>
<td><strong>Network Device Protection Profile (NDPP)</strong></td>
<td style="text-align: center;">(US) National Information Assurance Partnership</td>
<td><a rel="noopener noreferrer" href="https://www.niap-ccevs.org/Profile/Info.cfm?PPID=293&amp;id=293" target="_blank">https://www.niap-ccevs.org/Profile/Info.cfm?PPID=293&amp;id=293</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Firewall assurance levels"><paragraph
    title="19.3.8.R.01."

    tags="Technical"


><![CDATA[<p>The higher the required assurance level for a firewall, the greater the assurance that it provides an appropriate level of protection against an attacker.  For example, an EAL2 firewall is certified to provide protection against a basic threat potential, whilst an EAL4 firewall is certified to provide protection against a moderate threat potential. A Protection Profile (PP) is considered to be equivalent to EAL2 under its Common Criteria Recognition Arrangement.</p>]]></paragraph>
<paragraph
    title="19.3.8.R.02."

    tags="Technical"


><![CDATA[<p>If a uni-directional connection between two networks is being implemented only one gateway is necessary with requirements being determined based on the source and destination networks.  However, if a bi-directional connection between two networks is being implemented both gateways will be configured and implemented with requirements being determined based on the source and destination networks.</p>]]></paragraph>
<paragraph
    title="19.3.8.C.01."

    tags="Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3970"
><![CDATA[<p>All gateways MUST contain a firewall in both physical and virtual environments.</p>]]></paragraph>
<paragraph
    title="19.3.8.C.02."

    tags="Software Security"


    classification="All Classifications"
    compliance="Must"
    cid="3973"
><![CDATA[<p>Agencies MUST check the evaluation has examined the security enforcing functions by reviewing the target of evaluation/security target and other testing documentation.</p>]]></paragraph>
<paragraph
    title="19.3.8.C.03."

    tags="Software Security"


    classification="All Classifications"
    compliance="Must"
    cid="3975"
><![CDATA[<p>Agencies MUST use devices as shown in the following table for their gateway when connecting two networks of different classifications or two networks of the same classification but of different security domains.</p><div align="center">
<table class="table-secondary" cellpadding="5">
<tbody>
<tr>
<td colspan="2"><b>Your network</b></td>
<td><b>Their network</b></td>
<td><b>You require</b></td>
<td><b>They require</b></td>
</tr>
<tr>
<td rowspan="5"><b>RESTRICTED and below</b></td>
<td class="table-cell-black" rowspan="5"> </td>
<td><b>UNCLASSIFIED</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>N/A</b></td>
</tr>
<tr>
<td><b>RESTRICTED</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>CONFIDENTIAL</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
<tr>
<td><b>SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
<tr>
<td><b>TOP SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>Consultation with GCSB</b></td>
</tr>
<tr>
<td rowspan="5"><b>CONFIDENTIAL</b></td>
<td class="table-cell-green" rowspan="5"> </td>
<td><b>UNCLASSIFIED</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>N/A</b></td>
</tr>
<tr>
<td><b>RESTRICTED</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>CONFIDENTIAL</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
<tr>
<td><b>TOP SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>Consultation with GCSB</b></td>
</tr>
<tr>
<td rowspan="5"><b>SECRET</b></td>
<td class="table-cell-blue" rowspan="5"> </td>
<td><b>UNCLASSIFIED</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>N/A</b></td>
</tr>
<tr>
<td><b>RESTRICTED</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>CONFIDENTIAL</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>TOP SECRET</b></td>
<td><b>EAL2 or PP firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
<tr>
<td rowspan="5"><b>TOP SECRET</b></td>
<td class="table-cell-red" rowspan="5"> </td>
<td><b>UNCLASSIFIED</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>N/A</b></td>
</tr>
<tr>
<td><b>RESTRICTED</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>CONFIDENTIAL</b></td>
<td><b>Consultation with GCSB</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>SECRET</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL2 or PP firewall</b></td>
</tr>
<tr>
<td><b>TOP SECRET</b></td>
<td><b>EAL4 firewall</b></td>
<td><b>EAL4 firewall</b></td>
</tr>
</tbody>
</table>
</div>]]></paragraph>
<paragraph
    title="19.3.8.C.04."

    tags="Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3996"
><![CDATA[<p>The requirement to implement a firewall as part of gateway architecture MUST be met separately and independently by both parties (gateways) in both physical and virtual environments.</p><p>Shared equipment DOES NOT satisfy the requirements of this control.</p>]]></paragraph>
</block>
<block title="Firewall assurance levels for NZEO networks"><paragraph
    title="19.3.9.R.01."

    tags="Web Applications"


><![CDATA[<p>As NZEO networks are particularly sensitive, additional security measures need to be put in place when connecting them to other networks.</p>]]></paragraph>
<paragraph
    title="19.3.9.C.01."

    tags="Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3999"
><![CDATA[<p>Agencies MUST use a firewall of at least an EAL4 assurance level between an NZEO network and a foreign network in addition to the minimum assurance levels for firewalls between networks of different classifications or security domains.</p>]]></paragraph>
<paragraph
    title="19.3.9.C.02."

    tags="Software Security"


    classification="All Classifications"
    compliance="Must"
    cid="4000"
><![CDATA[<p>In all other circumstances the table at 19.3.8.C.03 MUST apply.</p>]]></paragraph>
<paragraph
    title="19.3.9.C.03."

    tags="Web Applications"


    classification="All Classifications"
    compliance="Should"
    cid="4001"
><![CDATA[<p>Agencies SHOULD use a firewall of at least an EAL2 assurance level or a Protection Profile between an NZEO network and another New Zealand controlled network within a single security domain.</p>]]></paragraph>
</block>
</subsection>
</section>
