<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.infra-repository.org/oiar-2013/index.php?action=history&amp;feed=atom&amp;title=PAT.Data_Zone_Protection</id>
	<title>PAT.Data Zone Protection - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.infra-repository.org/oiar-2013/index.php?action=history&amp;feed=atom&amp;title=PAT.Data_Zone_Protection"/>
	<link rel="alternate" type="text/html" href="https://www.infra-repository.org/oiar-2013/index.php?title=PAT.Data_Zone_Protection&amp;action=history"/>
	<updated>2026-05-06T13:18:47Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.40.0</generator>
	<entry>
		<id>https://www.infra-repository.org/oiar-2013/index.php?title=PAT.Data_Zone_Protection&amp;diff=1050&amp;oldid=prev</id>
		<title>Jan Schoonderbeek: link fix</title>
		<link rel="alternate" type="text/html" href="https://www.infra-repository.org/oiar-2013/index.php?title=PAT.Data_Zone_Protection&amp;diff=1050&amp;oldid=prev"/>
		<updated>2013-01-16T15:01:55Z</updated>

		<summary type="html">&lt;p&gt;link fix&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:01, 16 January 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l50&quot;&gt;Line 50:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 50:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Pattern_Type_Adjacent_PAT_Row&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Pattern_Type_Adjacent_PAT_Row&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|pattern=PAT.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Security Management + Auditing&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|pattern=PAT.&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Facilities Monitoring&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|choice=may&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|choice=may&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|reason=Transport Zone Protection is usually employed to enforce security levels within one or more Data Transport Zones; thus, many events that occur in a Transport Zone Protection facility are of interest to the security officers. This means it is very desirable to have the facility report directly to Security &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Management &amp;amp; Auditing&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|reason=Transport Zone Protection is usually employed to enforce security levels within one or more Data Transport Zones; thus, many events that occur in a Transport Zone Protection facility are of interest to the security officers. This means it is very desirable to have the facility report directly to &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(a &lt;/ins&gt;Security &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;instance of) Facilities Monitoring&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Pattern_Type_Adjacent_PAT_Row&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Pattern_Type_Adjacent_PAT_Row&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key mwoiar2013:diff::1.12:old-537:rev-1050 --&gt;
&lt;/table&gt;</summary>
		<author><name>Jan Schoonderbeek</name></author>
	</entry>
	<entry>
		<id>https://www.infra-repository.org/oiar-2013/index.php?title=PAT.Data_Zone_Protection&amp;diff=537&amp;oldid=prev</id>
		<title>Jan Schoonderbeek: start</title>
		<link rel="alternate" type="text/html" href="https://www.infra-repository.org/oiar-2013/index.php?title=PAT.Data_Zone_Protection&amp;diff=537&amp;oldid=prev"/>
		<updated>2012-11-11T23:22:21Z</updated>

		<summary type="html">&lt;p&gt;start&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Maturity|3}}&lt;br /&gt;
{{Pageheaderbox4PatternType&lt;br /&gt;
|PATname=Data Zone Protection&lt;br /&gt;
|summary=Controls and secures data exchange between two data transport zones&lt;br /&gt;
|version=0.2&lt;br /&gt;
|owner=J.A.H. Schoonderbeek&lt;br /&gt;
|sector=Infrastructure Sector Core&lt;br /&gt;
}}&lt;br /&gt;
Two or more data transport zones may need to be separated because of different security-related requirements. If this is the case, then traffic from one zone traveling to the other zone needs to be processed so as to satisfy the security requirements imposed by the separation. To this end, this pattern may be employed.&amp;lt;br&amp;gt;&lt;br /&gt;
In practice, use of this pattern often leads to use of a firewall device, but as security requirements evolve, so may the realization of this pattern.&lt;br /&gt;
{{PAgraphic&lt;br /&gt;
|graphic=PAT.Data Zone Protection.png&lt;br /&gt;
|source=Pattern Types.vsd&lt;br /&gt;
|size=500px&lt;br /&gt;
|title=Protected Link graphic&lt;br /&gt;
|kind=Type&lt;br /&gt;
}}&lt;br /&gt;
{{Pattern Type Composition}}&lt;br /&gt;
{{Pattern Type Composition Row&lt;br /&gt;
|facility=BT.Traffic Filtering&lt;br /&gt;
|choice=must&lt;br /&gt;
|reason=This facility performs the actual filtering of traffic flowing from one data zone to the other. The filtering is based on rules that are derived from the security requirements, e.g. &amp;quot;no traffic is allowed from the DMZ to the internal network, with the exeption of ...&amp;quot;. Note that the storage of these rules call for a Permission Store, and execution of the rules is in fact Permission Validation.&lt;br /&gt;
}}&lt;br /&gt;
{{Pattern Type Composition Row&lt;br /&gt;
|facility=BT.Data Scanning&lt;br /&gt;
|choice=may&lt;br /&gt;
|reason=When filtering based on traffic characteristics is not enough, filtering based on data (content, deep inspection) may be needed. This can be useful for securing message exchange between zones (e.g. e-mail or SOAP messages), but also for deep inspection in certain protocols. This can for example detect malicious commands inside protocol packets, e.g. SQL injection instructions inside a HTTP request. When data scanning reveals a problem, a fitting action must be undertaken by another facility (e.g. the Traffic Filter may drop the packet or block the sender, or Monitoring may issue an alert).&lt;br /&gt;
}}&lt;br /&gt;
{{Pattern Type Composition Row&lt;br /&gt;
|facility=BT.Control Interface&lt;br /&gt;
|choice=may&lt;br /&gt;
|reason=If there&amp;#039;s a need to describe the interfacing with Traffic Filtering (e.g. by administrators, or maybe end users), then this function can be used for that.&lt;br /&gt;
}}&lt;br /&gt;
{{Pattern Type Composition Row&lt;br /&gt;
|facility=BT.Distribution&lt;br /&gt;
|choice=may&lt;br /&gt;
|reason=Since this Pattern often is used as a chokepoint where all data traffic must go through, it is also a good point to locate Distribution.&lt;br /&gt;
}}&lt;br /&gt;
{{Pattern Type Composition Row&lt;br /&gt;
|facility=BT.Load Balancing&lt;br /&gt;
|choice=may&lt;br /&gt;
|reason=Since this Pattern often is used as a chokepoint where all data traffic must go through, it may be necessary to include Load Balancing to provide higher availability of this Pattern.&lt;br /&gt;
}}&lt;br /&gt;
{{Table Ending}}&lt;br /&gt;
{{Pattern Type Neighbors}}&lt;br /&gt;
{{Pattern_Type_Adjacent_PAT_Row&lt;br /&gt;
|pattern=PAT.Data Transport&lt;br /&gt;
|choice=must&lt;br /&gt;
|reason=While Data Transport usually serves to link the facilities within a Pattern, in this case it also serves as the customer for this Pattern: Transport Zone Protection sits between two or more Data Transport Zones.&lt;br /&gt;
}}&lt;br /&gt;
{{Pattern_Type_Adjacent_PAT_Row&lt;br /&gt;
|pattern=PAT.Security Management + Auditing&lt;br /&gt;
|choice=may&lt;br /&gt;
|reason=Transport Zone Protection is usually employed to enforce security levels within one or more Data Transport Zones; thus, many events that occur in a Transport Zone Protection facility are of interest to the security officers. This means it is very desirable to have the facility report directly to Security Management &amp;amp; Auditing.&lt;br /&gt;
}}&lt;br /&gt;
{{Pattern_Type_Adjacent_PAT_Row&lt;br /&gt;
|pattern=PAT.Authentication+Authorization&lt;br /&gt;
|choice=may&lt;br /&gt;
|reason=The Authentication &amp;amp; Authorization Pattern can be linked to this Pattern when this Pattern is to support authorization (and/or authentication), so as to feed the Traffic Filter facility with the results of identity and/or permission validations. By &amp;quot;permission validation&amp;quot; we also understand the execution of rules such as the well-known &amp;quot;firewall rules&amp;quot;.&amp;lt;br&amp;gt;&lt;br /&gt;
Note that the rules that the Traffic Filter employs can be stored in a Permission Store within this Pattern, although most implementations of a Traffic Filter do not require Identity Validation/an Identity Store.&lt;br /&gt;
}}&lt;br /&gt;
{{Table Ending}}&lt;br /&gt;
{{PATfooter}}&lt;/div&gt;</summary>
		<author><name>Jan Schoonderbeek</name></author>
	</entry>
</feed>