|DMZ Gateways: Secret Weapons for Data Security|
|Security - Compliance / Privacy|
|Written by Justin Phipps|
|Monday, 23 July 2012 00:00|
While many organizations exchange files by uploading them to a server in the DMZ, staging files in the publicly accessible DMZ makes them vulnerable to a variety of dangerous exploits.
Exchanging files with customers and trading partners is commonplace in today's global economy, but keeping that data secure remains a difficult challenge as does staying in compliance with the various regulations governing data security, including PCI DSS, HIPAA, SOX, GBLA, and more.
A common approach for protecting internal/private networks is for companies to install file-sharing services (e.g. FTP/S, SFTP, HTTP/S servers) in a public zone for trading partners to access. When those servers and files leave the safety of the private network, however, companies risk the exposure of those services and data to outside attacks.
This white paper addresses the following questions:
1. Why is it dangerous for companies to store FTP servers and other file services in the DMZ?
2. How does incorporating a gateway into the file transfer process provide better protection for sensitive data?
3. How do gateways keep an organization's private network insulated from external reach?
DMZ for Staging Files
DMZ stands for demilitarized zone, and it's the neutral network that resides between the Internet and your company's private network. The DMZ is provisioned with a front-end firewall that limits inbound Internet traffic to certain systems within its zone. On the back end, another firewall is placed to prevent unauthorized access from the DMZ into the private network.
An organization's DMZ typically contains Web servers, FTP/S, SFTP, and HTTP/S servers, as well as other services it wants to make available to its customers and trading partners. To serve their purpose, these services need access to the data files that will be shared with partners.
The DMZ serves as a staging area between an organization's private network and the Internet. In order to share a document with a trading partner, an internal program or employee first copies the file from the private network onto a server in the DMZ. The partner then downloads the file from that server using an approved protocol like FTP/S, SFTP, or HTTP/S.
When trading partners need to share documents with the organization, they upload the files to a server in the DMZ. Later, an internal program or employee scans for the files on that server and pulls them into the private network.
Dangers in the DMZ
While many organizations exchange files using this process, staging files in the publicly accessible DMZ makes them vulnerable to a variety of dangerous exploits:
|Last Updated on Thursday, 19 July 2012 14:28|