Chapter 1. i5/OS IP packet filtering 3
1.1.3 Security policy
Before creating a network security policy, you must have an IT security policy for the entire
organization. Otherwise, you do not know what guidelines to follow.
General security policies are:
The default policy is to deny. Use high caution anytime a less trusted resource accesses a
more trusted resource. Allow only what is needed. In our scenario, the only (untrusted)
access is SSH when it is enabled.
Hide theIP addressing with private IP addressing.
Harden systems by disabling and removing unrequired resources.
Push data to less trusted systems.
Limit what data resides on less trusted systems.
Encrypt data on systems.
Log access and intrusion attempts. Intrusion detection ...