- Nov 28, 2004
- 1,613
- 0
- 76
First some quick background: I work for a multiple entity financial holding company with roughly 30 locations and 5 companies. Single point of external connectivity which is heavily fortified and actively monitored. Additionally, we have dedicated firewalls in addition to the routers at each location.
The issue is, we have some folks who are exploring the possibility/feasibility of employing a whitelist methodology for our internal network. We are already using a whitelist approach for our internet facing side, but what is being explored is using a highly restrictive whitelist approach (port by port) for internal location to location connections as well.
At first blush, I'm opposed to this concept simply from a complexity standpoint vs. the (admittedly preceived) limited additional protection that I feel we would gain. The problem is, I haven't been able to find much information on the subject and was wondering if anyone had any insight into this topic.
The issue is, we have some folks who are exploring the possibility/feasibility of employing a whitelist methodology for our internal network. We are already using a whitelist approach for our internet facing side, but what is being explored is using a highly restrictive whitelist approach (port by port) for internal location to location connections as well.
At first blush, I'm opposed to this concept simply from a complexity standpoint vs. the (admittedly preceived) limited additional protection that I feel we would gain. The problem is, I haven't been able to find much information on the subject and was wondering if anyone had any insight into this topic.
