TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 35
the modification, regardless of the theoretical source and destination security
zones.
See Chapter 6, “Intrusion Detection and Prevention,” of the HP ProCurve
Threat Management Services zl Module Management and Configuration Guide
for detailed information on how to enable the intrusion subsystem, register
your signature update subscription, disable individual signatures and tune
protocol-specific anomaly settings. If absolutely necessary and the potential
risks are well-understood, steps are provided on how to modify the actions
taken for all intrusion signatures predefined for a given threat level.
7.3.3 VPN Gateway
The following figure displays a compartmentalization usage for the TMS zl
Module’s VPN gateway security control feature. Regulatory compliance, such
as HIPAA Private Health Information (PHI), and industry self-regulation
directives, like the Payment Card Industry Data Security Standard (PCI DSS),
have made it an increasingly common business strategy for those organizations
affected to implement security enclaves at the application edge for sensitive
information. For example, “credit card swipe” point-of-sale machines in
remote stores can be connected via encrypted VPN tunnels over the enterprise
network to another security enclave for the hosts in the organization’s data
center that process this sensitive information. In its simplest conceptual form,
this is a sensitive information compartment connected to another sensitive
information compartment via an encrypted tunnel, effectively creating a
sensitive information “overlay” network on top of the overall enterprise
network.
Figure 15: Compartmentalization Security Control Point(s) VPN