Lesson 5: Secure Enterprise Network Architecture Flashcards
Define ‘Network infrastructure’
Appliances, and addressing/forwarding protocols that support basic connectivity.
Define ‘Network applications’
Services that run on the infrastructure to support business activities.
Define ‘Data assets’
Information that is created, stored, and transferred as a result of business activity.
Define a ‘workflow’
Series of tasks that a business needs to perform.
Define a ‘Email mailbox server’
Stores data assets and must only be accessed by authorized clients; Must be fully available and fault tolerant.
Define a ‘Mail transfer server’
Connects with untrusted Internet hosts to transfer mail; Any email leaving or entering the network must be subject to policy-based controls.
Define an ‘on-premises network’
A private network facility that is owned and operated by an organization for use by its employees only; Enterprise local area network (LAN)
What network topology model describes a typical on-premises network?
Star topology.
What is the security concern with a star topology?
“Flat” in terms of security; Any host can communicate freely with any other host in the same segment.
Define ‘logical segmentation’
Network topology enforced by switch, router, and firewall configuration
Define ‘attack surface’
All the points at which a threat actor could gain access to hosts and services.
What is the attack surface of layer 1 and layer 2 of the OSI model?
Unauthorized connections to physical ports or wireless networks to communicate within the broadcast domain.
What is the attack surface of layer 3 of the OSI model?
Unauthorized hosts; Authenticating all connections
What is the attack surface of layer 4 and layer 7 of the OSI model?
Unauthorized connections to TCP/UDP ports to communicate with application layer protocols and services.
Define ‘port security’
Preventing a device attached to a switch port from communicating on the network unless it matches a policy.
Define ‘MAC Filtering’
Applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it.
What is a more secure type of port security compared to MAC filtering?
802.1X Port-based Network Access Control (PNAC)
What is required for Port-based Network Access Control (PNAC) to function?
A switch authenticating a host against a radius server or certificate when it connects to one of its ports.
What two protocols allow 802.1X Port-based Network Access Control (PNAC) to function?
- Extensible Authentication Protocol (EAP)
- Remote Authentication Dial-In User Service (RADIUS)
Define ‘Extensible Authentication Protocol (EAP)’
Framework for negotiating authentication methods that enable systems to use hardware-based identifiers or digital certificates.
Define ‘Remote Authentication Dial-In User Service (RADIUS)’
AAA protocol used to manage remote and wireless authentication infrastructures.
Define ‘selection of effective controls’
The process of choosing the type and placement of security controls to ensure the goals of the CIA triad and compliance with any framework requirements.
What is the goal of ‘selection of effective controls’?
To enforce segmentation, apply access controls, and monitor traffic for policy violations.
Define ‘Defense in depth’
Security strategy that positions the layers of diverse security control categories and functions as opposed to relying on perimeter controls