Professional Documents
Culture Documents
OBJECTIVES:
1. Identify and obtain the current architecture of the LTE Network
2. Identify and review Policies and Procedures in place for Firewall Security.
3. Identify and review General Controls in place for Firewall Security.
4. Review the filters and conditional filter handling on the Firewalls.
2 Identify and review Policies a. Obtain and review the security policy in
and Procedures in place for place.
Firewall Security. b. What software and procedures are in place to
address detection and remediation of Viruses,
Worms, Spoofers, and Sniffers
c. Determine the intrusion detection system used
and actions taken based upon the intrusion
detection.
3 Identify and review General a. Establish how many people have access to the
Controls in place for Firewalls and view their permissions and
Firewall Security. roles to justify access.
b. Establish the frequency of updates and
patches applied to Firewalls and by whom.
c. Identify the methodology used to monitor the
Network and Firewall performance.
d. Establish the frequency of Backups and the
last recovery executed on Firewalls.
4 Review the filters and a. How are security rules set and enforced?
conditional filter handling on b. Obtain Firewall rules and verify if
the Firewalls. unnecessary TCP/IP services been
deactivated.
c. Review host and client host services to ensure
that host is configured for only those
necessary services.