The layered defense approach to security

Your security policy defines what you want to protect and what you expect of your system users.

It provides a basis for security planning when you design new applications or expand your current network. It describes user responsibilities, such as protecting confidential information and creating nontrivial passwords.
Note: Start of changeYou need to create and enact a security policy for your organization that minimizes the risks to your internal network. The inherent security features of iSeries™, when properly configured, provide you with the ability to minimize many risks. When you connect your iSeries system to the Internet, however, you need to provide additional security measures to ensure the safety of your internal network.End of change

Many risks are associated with using Internet access to conduct business activities. Whenever you create a security policy, you must balance providing services against controlling access to functions and data. With networking computers, security is more difficult because the communication channel itself is open to attack.

Some Internet services are more vulnerable to certain types of attacks than others. Therefore, it is critical that you understand the risks that are imposed by each service you intend to use or provide. In addition, understanding possible security risks helps you to determine a clear set of security objectives.

Start of changeThe Internet is home to a variety of individuals who pose threat to the security of Internet communications. The following list describes some of the typical security risks you may encounter:End of change

Multiple layers of defense

Because potential Internet security risks can occur at a variety of levels, you need to set up security measures that provide multiple layers of defense against these risks. In general, when you connect to the Internet, you should not wonder if you will experience intrusion attempts or denial of service attacks. Instead, you should assume that you will experience a security problem. Consequently, your best defense is a thoughtful, proactive offense. Using a layered approach when you plan your Internet security strategy ensures that an attacker who penetrates one layer of defense will be stopped by a subsequent layer.

Start of changeYour security strategy should include measures that provide protection across the following layers of the traditional network computing model. Generally, you should plan your security from the most basic (system level security) through the most complex (transaction level security).End of change

System level security
Your system security measures represent your last line of defense against an Internet-based security problem. Consequently, your first step in a total Internet security strategy must be to properly configure iSeries basic system security settings.
Network level security
Network security measures control access to your iSeries and other network systems. When you connect your network to the Internet, you should ensure that you have adequate network level security measures in place to protect your internal network resources from unauthorized access and intrusion. A firewall is the most common means for providing network security. Your Internet Service Provider (ISP) can and should provide an important element in your network security plan. Your network security scheme should outline what security measures your ISP will provide, such as filtering rules for the ISP router connection and public Domain Name Service (DNS) precautions.
Application level security
Start of changeApplication level security measures control how users can interact with specific applications. In general, you should configure security settings for each application that you use. However, you should take special care to set up security for those applications and services that you will be using from or providing to the Internet. These applications and services are vulnerable to misuse by unauthorized users looking for a way to gain access to your network systems. The security measures that you decide to use need to include both server-side and client-side security exposures. End of change
Transmission level security
Start of changeTransmission level security measures protect data communications within and across networks. When you communicate across an untrusted network like the Internet, you cannot control how your traffic flows from source to destination. Your traffic and the data it carries flows through a number of different servers that you cannot control. Unless you set up security measures, such as configuring your applications to use the Secure Sockets Layer (SSL), your routed data is available for anyone to view and use. Transmission level security measures protect your data as it flows between the other security level boundaries. End of change

When developing your overall Internet security policy, you should develop a security strategy for each layer individually. Additionally, you should describe how each set of strategies will interact with the others to provide a comprehensive security safety net for your business.

Related concepts
Security levels for basic Internet readiness
Network security options
Application security options
Transmission security options
Security policy and objectives
E-mail security
Virtual private network (VPN)
FTP security
Related reference
Security terminology