The network security zones in ITSG-22 covered in this guideline are: Services can be physically implemented in many ways, for example, a single process on server, multiple processes on a virtual machine, or distributed processes among pool of servers.Ĭoncepts used in this document are based on the Baseline Security Requirements for Network Security Zones in the Government of Canada (ITSG-22), which describes the concepts of network security zones and specifies baseline security requirements for zone. These functional requirements can be simple such as providing resolution of domain names, or complex such as processing and transmitting email. This guideline is intended to assist network architects and security practitioners with the appropriate placement of services (for example, domain name service, email service, and web proxy service) into network security zones.Ī service is a logical construct that represent a set of functional requirements in an information technology architecture. Figure 12: Internet Services Network Architecture.Figure 11: Departmental Network Communications Flows.Figure 10: Internet Services Network Zone Architecture.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |