I am wondering how many of you who work for LARGE companies have a network architecture that enforces the use of three-separate firewalls to get at the data. In other words:
- Separation of external (internet) parties and a presentation tier by a firewall
- Separation of presentation and application tier by a firewall
- Separation of application and data tier by a firewall
In short: Public->Presentation->Application->Data (where each arrow is a firewall)
Here is my problem: I work for a very large US company (75K+ employees) where each environment seems to have a different number of segmentation firewalls. We wanted to standardize our firewall architecture, but:
- We can't find any real material to justify the need for three firewalls (as opposed to, say, just a single perimeter firewall)
- We can't qualify the value-add of three layers of firewalls.
- We can't sort out if this should be an architecture for just internet facing apps, or for ALL applications/appliances/gear.
Any advice?