BS ISO/IEC 27033-5:2013 Information technology. Security techniques. Network security. Securing communications across networks using Virtual Private Networks (VPNs)

BS ISO/IEC 27033-5:2013

Information technology. Security techniques. Network security. Securing communications across networks using Virtual Private Networks (VPNs)

Status : Confirmed, Current   Published : August 2013

Format
PDF

Format
HARDCOPY



What is this standard about?

This is the fifth in a six-part international series of standards on ICT network security. This part is about strengthening the technical controls which underpin the security of Virtual Private Networks (VPNs). The other parts are: 

  • Part 1: Overview and concepts
  • Part 2: Guidelines for the design and implementation of network security
  • Part 3: Reference networking scenarios – Threats, design techniques and control issues
  • Part 4: Securing communications between networks using security gateways
  • Part 6: Securing wireless IP network access

Who is this standard for?

  • Those responsible for information security within organizations, specifically network security
  • Those involved in detailed planning, design and implementation of networks, e.g.: 
    • Systems architects and designers
    • Network managers
    • Network security officers

Why should you use this standard? 

VPNs have developed rapidly as a means of inter-connecting networks and connecting remote users to networks. In their simplest form, they provide a mechanism for establishing a secure data channel over an existing network or point-to-point connection. They’re assigned to the exclusive use of a restricted user group, and can be established and removed dynamically, as needed.

However organizations can expect increasingly sophisticated attacks to be mounted against their systems. Attempts at unauthorized access can be malicious, for example leading to a Denial of Service attack, the misuse of resources, or access to valuable information.

As a defence, this standard gives guidelines for the selection, implementation and monitoring of the technical controls necessary to provide network security using Virtual Private Network (VPN) connections to interconnect networks and connect remote users to networks.

It supplies guidance on how to:

  • Address space and routing separation between VPNs carried over the label switched network
  • Provide resistance to unauthorized access attacks
  • Ensure the internal structure of the label switched network core is not visible to outside networks
  • Limit information available to a potential attackers
  • Protect against label spoofing

What’s changed since the last update?

This standard is a technical revision of BS ISO/IEC 18028-5:2006 which it supersedes.




Standard NumberBS ISO/IEC 27033-5:2013
TitleInformation technology. Security techniques. Network security. Securing communications across networks using Virtual Private Networks (VPNs)
StatusConfirmed, Current
Publication Date31 August 2013
Confirm Date05 June 2019
Normative References(Required to achieve compliance to this standard)ISO/IEC 27005:2011, ISO/IEC 27002:2005, ISO/IEC 27033-1:2009, ISO/IEC 27001:2005
Informative References(Provided for Information)ISO/IEC 27033-3, ISO/IEC 27033-2, ISO/IEC 11770-1, ISO/IEC 27033-4, ISO/IEC 27039
ReplacesBS ISO/IEC 18028-5:2006
International RelationshipsISO/IEC 27033-5:2013
Draft Superseded By12/30192109 DC
DescriptorsTeleprocessing, Communication networks, Cryptography, Computer technology, Data processing, Open systems interconnection, Data security, Computer networks, Data storage protection, Private networks
ICS35.030
Title in FrenchTechnologies de l’information. Techniques de sécurité. Sécurité de réseau. Sécurité des communications au travers des réseaux utilisant des réseaux privés virtuels (VPNs)
CommitteeIST/33/4
ISBN978 0 580 65102 1
PublisherBSI
FormatA4
DeliveryYes
Pages24
File Size516 KB
Price£182.00


 Your basket
Your basket is empty

Multi-user access to over 3,500 medical device standards, regulations, expert commentaries and other documents


Collaborate, Innovate, Accelerate.


Tracked Changes

Understand the changes made to a standard with our new Tracked Changes version


BSOL

The faster, easier way to work with standards


Customers who bought this product also bought

  • BS ISO/IEC 27033-3:2010
    Information technology. Security techniques. Network security Reference networking scenarios. Threats, design techniques and control issues
  • BS ISO/IEC 27033-4:2014
    Information technology. Security techniques. Network security Securing communications between networks using security gateways
  • BS ISO/IEC 27033-2:2012
    Information technology. Security techniques. Network security Guidelines for the design and implementation of network security
  • BS ISO/IEC 27033-1:2015
    Information technology. Security techniques. Network security Overview and concepts