Firewall/Router (Network Device) Administrator

Duties

Network Device Administrators are required to manage and monitor network devices. Network Device Administrators will work with user support, infrastructure, security, and depot.

Skills Required

Network Device Administrators must have extensive networking knowledge including technologies, available hardware, and networking protocols. They must have extensive knowledge about network layers, network security, and network layout. They must understand routing and how network traffic flows along with configuring network devices.

Policies Affecting Network Device Administrators

Must Take Specific action

  • Privacy and Confidentiality Policy - Network Device Administrators must be sure data stored on network devices is adequately protected by being sure confidential data is properly secured on the network using secure encryption methods for storage and transmission. They must be sure only authorized access is allowed.
  • Internet Connection Policy - Network Device Administrators must be sure the network structure and networking services comply with this policy. Firewalls may not be bypassed by any equipment nor can any equipment have a network presense in more than one network zone at a time other than firewalls.
  • Wireless Communication Policy - Network Device Administrators must be sure any systems they set up or maintain are using approved wireless technologies and are properly configured.
  • Network Documentation Policy - Network Device Administrators must meet the requirements of this policy when they manage network devices or other devices requiring network documentation. These devices include switches, routers, and firewalls but may include other devices.
  • Network and Server Scanning Policy - Network Device Administrators must be aware of how server scans may impact network traffic and be familiar with network scans against any devices they manage.
  • Perimeter Security Policy - Network Device Administrators must be sure perimeter security device logs are properly protected and that they comply with device and network traffic flow requirements.
  • Internet DMZ Equipment Policy - Network Device Administrators must be sure configuration and maintenance tasks comply.
  • Router Security Policy - Network Device Administrators must be sure router configuration is in compliance with this policy.
  • Virus Protection Policy - Network Device Administrators must be able to scan network systems for viruses, check to be sure the anti-virus software is up to date, and fix anti-virus problems. Network Device Administrators shall follow procedures for installing anti-virus programs on equipment as required.
  • Patch Management Policy - Network Device Administrators must operate network devices in compliance with this policy according to established change management processes.
  • System Lockdown Policy - Network Device Administrators must understand what services should be required and operational on the network devices that they work on and shut down all unneeded services as part of the hardening process.
  • Server Monitoring Policy - Network Device Administrators must monitor the network devices they are responsible for in accordance with this policy and associated procedures.
  • Backup and Recovery Policy - Network Device Administrators must perform and/or check backups regularly according to the policy and processes. They must also periodically test the ability to restore from backup media.
  • Server Documentation Policy - Network Device Administrators must keep network device information on the server/device list current as changes to network equipment are made. When changes are made to network equipment a means to make affected parties and help desk staff aware of the changes must be utilized.
  • Computer and Printer Naming Policy - Network Device Administrators must know how to name network devices so they set up according to the policy.
  • IP Address Assignment Policy - Network Device Administrators must understand how to set up network devices in compliance with this policy and to configure network equipment to support servers and workstations in accordance with this policy.
  • Audit Trail Policy - Network Device Administrators must configure network device logging in accordance with this policy and associated procedures.
  • Authentication Mechanism Policy - Network Device Administrators must be sure network devices being placed in service adheres to this policy.
  • Computer Center Operations Policy - Network Device Administrators and their management must be sure the computer centers environments supporting the network devices meet this policy.
  • Computer Forensics Policy - Network Device Administrators must be familiar with this policy so they know how to preserve evidence in cases of security and unacceptable use incidents. They should be trained in this area regarding both techniques, policies, and procedures. They must be able to quickly recognize situations where an investigation should be launched and ensure evidence preservation.
  • Server Security Policy - Network Device Administrators must secure network devices they manage according to this policy, associated policies, and associated procedures.
  • Server Setup and Configuration Policy - Network Device Administrators must be sure new servers meet needs required by this policy and work with systems engineers. Network devices should be properly optimized and configured in accordance with this policy.
  • Certification and Accreditation Policy - Network Device Administrators must work with assessors when systems must be certified or accredited according to this policy and associated procedures.
  • Incident Response Policy - Network Device Administrators must be familiar with this policy and follow it and associated procedures. They must be able to quickly recognize situations where a computer security incident has occurred or is in progress and notify the security section to begin an investigation while ensuring evidence is preserved. They should be able to help remediate incidents on the network and improve security. They should be able to isolate infected machines using networking equipment to contain a security incident.
  • Intrusion Detection Policy - Network Device Administrators must be able to support intrusion detection equipment and be able to use intrusion detection on network devices where required according to policy and communicate security incidents according to policy and associated procedures. Some Network Device Administrators may operate network intrusion detection devices and they must follow proper procedures in incident management.
  • Disaster Recovery Policy - Network Device Administrators must be familiar with disaster recovery policy and associated processes with knowledge about their role. The Network Device Administrator should know how to quickly perform their role when network connectivity is compromised.

Must be Aware

  • Password Policy - Needs to understand the password requirements and be sure network devices they manage meet the requirements.
  • Computer Training Policy - Network Device Administrators should be aware of computer training opportunities and skills that will improve their performance. They should request additional training where appropriate and their supervisor should also recommend training.
  • Information Sensitivity Policy - Network Device Administrators must be aware of this policy and observe to be sure it is not violated when sensitive information is stored on network devices or transmitted between devices or servers.
  • Risk Assessment Policy - Network Device Administrators may need to take risk mitigation steps associated with network equipment.
  • Encryption Policy - Network Device Administrators must be sure certificates on network devices, key management methods, data storage, and data transmission are in compliance with this policy.
  • Physical Security Policy - Network Device Administrators access will need to comply with this policy and may have entry to server rooms logged.
  • Segregation of Duties Policy - Network Device Administrators must follow this policy.
  • Change Management Policy - Changes to network devices must comply with this policy.
  • Auditing Policy - Network Device Administrators must be aware of what items auditors check and how it affects their job.
  • Preventative Maintenance Policy - Network Device Administrators must follow preventative maintenance processes and use approved tools. Network Device Administrators need to be aware of preventative maintenance contracts and what systems are covered.
  • Technology Planning Policy - Network Device Administrators must be aware of the current technology plan.
  • Configuration Management Policy - Network Device Administrators must be sure changes to systems are logged and follow the associated procedures. Network Device Administrators should know where to go to determine whether changes have recently been made to systems.
  • Emergency Access Policy - Network Device Administrators must be aware of this policy, what their roles are during emergencies, and what access may need to be granted either to them or others.
  • Service Monitoring Policy - Network Device Administrators must understand that their provided services and server services are monitored and how it can affect their job.
  • Quality Policy - Network Device Administrators must be aware of the quality policy and may be able to help to improve the quality process by suggesting improvements.

Affects Job but Awareness not Required