<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.infra-repository.org/oiar/index.php?action=history&amp;feed=atom&amp;title=GP.Data_Zone_Protection</id>
	<title>GP.Data Zone Protection - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.infra-repository.org/oiar/index.php?action=history&amp;feed=atom&amp;title=GP.Data_Zone_Protection"/>
	<link rel="alternate" type="text/html" href="https://www.infra-repository.org/oiar/index.php?title=GP.Data_Zone_Protection&amp;action=history"/>
	<updated>2026-05-02T09:49:27Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.40.0</generator>
	<entry>
		<id>https://www.infra-repository.org/oiar/index.php?title=GP.Data_Zone_Protection&amp;diff=942&amp;oldid=prev</id>
		<title>Jan Schoonderbeek: New GP</title>
		<link rel="alternate" type="text/html" href="https://www.infra-repository.org/oiar/index.php?title=GP.Data_Zone_Protection&amp;diff=942&amp;oldid=prev"/>
		<updated>2014-12-19T12:15:50Z</updated>

		<summary type="html">&lt;p&gt;New GP&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Maturity|4}}&lt;br /&gt;
{{Pageheaderbox4GP&lt;br /&gt;
|name=Data Zone Protection&lt;br /&gt;
|sector=Core&lt;br /&gt;
|version=0.3&lt;br /&gt;
|owner=J.A.H. Schoonderbeek&lt;br /&gt;
|summary=This Pattern realizes a security separation between different Data Transport zones.&lt;br /&gt;
}}&lt;br /&gt;
Two or more data transport zones may need to be separated because of different security-related requirements. If this is the case, then traffic from one zone traveling to the other zone needs to be processed so as to satisfy the security requirements imposed by the separation. To this end, this pattern may be employed.&lt;br /&gt;
In practice, use of this pattern often leads to use of a firewall device, but as security requirements evolve, so may the realization of this pattern.&lt;br /&gt;
{{Pattern Realizes&lt;br /&gt;
|service=GS.Data Zone Protection&lt;br /&gt;
}}&lt;br /&gt;
{{Pattern Graphic&lt;br /&gt;
|graphic=GP.Data Zone Protection.png&lt;br /&gt;
|size=600px&lt;br /&gt;
|title=Data Zone Protection&lt;br /&gt;
|kind=Generic&lt;br /&gt;
}}&lt;br /&gt;
{{Generic Pattern Composition}}&lt;br /&gt;
{{Generic Pattern Composition Row&lt;br /&gt;
|function=GF.Filtering&lt;br /&gt;
|choice=Must&lt;br /&gt;
|reason=This function performs the actual filtering of data flowing from one data zone to the other. The filtering is based on criteria that are derived from the security requirements, e.g. &amp;quot;no traffic is allowed from the DMZ to the internal network, with the exeption of ...&amp;quot;.&lt;br /&gt;
}}&lt;br /&gt;
{{Generic Pattern Composition Row&lt;br /&gt;
|function=GF.Load Balancing&lt;br /&gt;
|choice=May&lt;br /&gt;
|reason=Since this Pattern often is used as a chokepoint where all data traffic must go through, it may be necessary to include Load Balancing to provide higher availability of this Pattern.&lt;br /&gt;
}}&lt;br /&gt;
{{Generic Pattern Composition Row&lt;br /&gt;
|function=GF.Data Scanning&lt;br /&gt;
|choice=Must&lt;br /&gt;
|reason=When filtering based on traffic characteristics does not suffice, filtering based on data (content, deep inspection) may be needed. This can be useful for securing message exchange between zones (e.g. e-mail or SOAP messages), but also for deep inspection in certain protocols. This can for example detect malicious commands inside protocol packets, e.g. SQL injection instructions inside a HTTP request. When data scanning reveals a problem, a fitting action must be undertaken by another function (e.g. the Filter may drop the packet or block the sender, or Monitoring may issue an alert). &lt;br /&gt;
}}&lt;br /&gt;
{{Generic Pattern Composition Row&lt;br /&gt;
|function=GF.Rules Engine&lt;br /&gt;
|choice=May&lt;br /&gt;
|reason=This function enables the processing of more complex logic, such as the well-known &amp;quot;firewall rules&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Note that the rules may be stored in the Data Zone Protection facility itself, or outside of it, with deployment to this facility.&lt;br /&gt;
}}&lt;br /&gt;
{{Generic Pattern Composition Row&lt;br /&gt;
|function=GF.Logging&lt;br /&gt;
|choice=Must&lt;br /&gt;
|reason=Since this Pattern is used for security purposes, this function is required to provide security personnel with the necessary logs for security monitoring and auditing.&lt;br /&gt;
}}&lt;br /&gt;
{{Generic Pattern Composition Row&lt;br /&gt;
|function=GF.Distribution&lt;br /&gt;
|choice=May&lt;br /&gt;
|reason=Since this Pattern often is used as a chokepoint where all data traffic must go through, it is also a good point to locate Distribution. &lt;br /&gt;
}}&lt;br /&gt;
{{Generic Pattern Composition Row&lt;br /&gt;
|function=GF.Controlling&lt;br /&gt;
|choice=Must&lt;br /&gt;
|reason=Access to the configuration and operation of this security related Pattern is most always restricted.&lt;br /&gt;
}}&lt;br /&gt;
{{Table Ending}}&lt;br /&gt;
{{Pattern Adjacent Services}}&lt;br /&gt;
{{Generic Pattern Adjacent Service Row&lt;br /&gt;
|service=GS.Authentication+Authorization&lt;br /&gt;
|choice=May&lt;br /&gt;
|reason=The Authentication &amp;amp; Authorization Pattern can be linked to this Pattern when this Pattern is to support authorization (and/or authentication), so as to feed the Traffic Filter facility with the results of identity and/or permission validations.&lt;br /&gt;
}}&lt;br /&gt;
{{Generic Pattern Adjacent Service Row&lt;br /&gt;
|service=GS.Facilities Monitoring&lt;br /&gt;
|choice=May&lt;br /&gt;
|reason=Transport Zone Protection is usually employed to enforce security levels within one or more Data Transport Zones; thus, many events that occur in a Transport Zone Protection facility are of interest to the security officers. This means it is very desirable to have the facility report directly to (a Security instance of) Facilities Monitoring.&lt;br /&gt;
}}&lt;br /&gt;
{{Table Ending}}&lt;br /&gt;
{{Text Footer GP}}&lt;/div&gt;</summary>
		<author><name>Jan Schoonderbeek</name></author>
	</entry>
</feed>