
(Control: 0639 Table Row "Protected", Australian Government Information Security Manual: Controls)
The organization must use a network device Protection Profile compliant firewall as part of the traffic flow filter for protected networks that are connected to public, unclassified, or protected networks. (Control: 1193, Australian Government Information Security Manual: Controls)
(Control: 1017, Australian Government Information Security Manual: Controls)
The organization should install a host-based firewall on workstations that have webcams or softphones to only allow traffic to and from the least number of required ports. (Control: 0546, Australian Government Information Security Manual: Controls) An evaluated video-aware or voice-aware firewall should be used when there is a requirement to use a firewall for video conferencing or Internet Protocol telephony in a gateway environment. (Control: 0380 Bullet 6, Australian Government Information Security Manual: Controls) The organization must develop a hardened Standard Operating Environment for servers and workstations that includes installing software-based firewalls that limit the inbound network connections and the outbound network connections. (Security Control: 1416 Revision: 2, Australian Government Information Security Manual) A software firewall is implemented on workstations and servers to limit both inbound and outbound network connections. (Security Control: 1528 Revision: 1, Australian Government Information Security Manual) An evaluated firewall is used between official or classified networks and public network infrastructure.
(Security Control: 0642 Revision: 7, Australian Government Information Security Manual)
In addition to the firewall between networks of different security domains, an evaluated firewall is used between an AUSTEO or AGAO network and another Australian controlled network. (Security Control: 0639 Revision: 8, Australian Government Information Security Manual) An evaluated firewall is used between networks belonging to different security domains. (Security Control: 0546 Revision: 6, Australian Government Information Security Manual) Where a requirement exists to implement a firewall in a gateway, and video conferencing or IP telephony traffic passes through the gateway, a video or voice-aware firewall is used. a) ¶ 13 Bullet 9, Guidelines on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds) Administering the firewall using encrypted communications and strong authentication, accessing the firewall only from secure devices, and monitoring all administrative access (Critical components of information security 24) vii.