I need to say I am not very familiar with conduits and outbound statements. But when I think you can have both types of commands.If not just disregard my post. It would be a good idea to update your config to the use the new commands.
Previous poster Jesse provided great info and right direction, I just want to provide and share additional info on a key question in your post.
"What are the thoughts of allowing outbound access to the internet from the DMZ "
It all depends on what is connected in your DMZ, for example, at least in my experience you may have systems in DMZ that are external vendor business specific systems that are terminating at your DMZ providing some type of services to your company a good example in my experience is Reuters feeds and other real time market data information provider services, such systems not necesarily requires internet access or company policy does not allow a vendors in DMZ to use company outbound internet, so it varies from a company policies.
You may have different vendors in DMZ and perhaps you may need to allow outbound internet on just a few hosts instead of having the complete DMZ subnet nat(dmz) 1 0 0 wide opened to all hosts in DMZ subnet for outbound internet, instead you could control access per host i.e nat(dmz)1 10.10.10.1 255.255.255.255 .
In the event that inbound connections is required towards a specific DMZ host for www or ftp services etc.. Jesse's links provides perfect example for static nat and access lists.
conduit are similar to access lists and from what I have read best practice not to mix conduits with acls on same config, you can have both but acl takes precedence over conduits statements, or as Jesse suggested you may rewrite those conduits statements into acls, command is no longer available in 7.x code but it gets converted into acl when upgrading to 7.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...