Security Plus - Chapter 12 Flashcards
Designing Secure Networks
The ability to implement key elements of design and architecture found in enterprise networks in order to properly secure them.
Selection of Effective Controls
Key components in securing a network requires both an understanding of threats and the controls that can address them.
Defense In Depth
Security that is built around multiple controls designed to ensure that a failure of a single control, or multiple controls, is unlikely to cause a security breach.
Open Systems Interconnection (OSI) Model
Used to conceptually describe how devices and software operate together through networks. Sometimes used to create security zones using devices that separate networks at trust boundaries and will deploy protections appropriate to both the threats and security requirements of each zone.
Attack Surface
Consists of the points at which an unauthorized user could gain access.
OSI Model
7 Application Layer —–> Human Computer Interaction
6 Presentation Layer —–> Format data, handles data encryption, compression
5 Session Layer —–> Authentication, sessions, permissions
4 Transport Layer —–> Transmission of data, error control
Ex. TCP, UDP
3 Network Layer —–> Physical path decisions, addressing, routing
Ex. IP, ICMP, IPSec
2 Data Link Layer —–> Data format for the network, error detection, flow control
Ex. Frames, Ethernet
1 Physical Layer —–> Sends electrical impulses, light, and radio waves
Ex. Cables, NICs
Infrastructure Considerations
How organizations design their infrastructure by impacting cost, manageability, functionality, and availability.
Device Placement
Devices may be placed to secure a specific zone or network segment, to allow them to access network traffic from a network segment, VLAN, or broader network, or may be placed due to capabilities like maximum throughout. Common placement options include at network borders, datacenter borders, and between network segments and VLANs, but devices may be placed to protect specific infrastructure or systems.
Security Zones
Network segments, physical or virtual, or other components of an infrastructure that are able to be separate from less secure zones through logical or physical means.
Common examples:
- Guest networks
- Internet-facing networks - For hosting web servers
- Management VLANs - used for network device management of access to ports for switches, access points, routers and other devices.
Connectivity Considerations
Includes the below decisions:
- How the organization connects to the Internet
- Whether there is redundant connections
- How fast the connections are
- What are the security controls and what the upstream connectivity provider can make available
- What type of connectivity - fiber optic, copper, wireless or other
- If the connections paths are physically separated and using different providers so a single event will not cause a disruption.
Failure Modes
How the organization wants to address a security device when a disruption causes it to fail.
- Fail-closed - This ends all traffic and communication and disrupts the function of business if not available.
- Fail-open - The device will fail but leaves the connection and communication still able to function. This continues operations, but there will not be any security controls in place.
Network Design Concepts
Physical isolation
Logical segmentation
High availability
Implementing secure protocols
Reputation services
Physical Isolation
The idea of separating devices so that there is no connection between them.
- Air-gapped design
Logical Segmentation
Using software or settings to separate networks or systems rather than a physical separation. Virtual local area networks (VLANs) are a common method of providing logical segmentation.
High Availability
The ability of a service, system, network, or other element of infrastructure to be consistently available without downtime. Allows for the ability to perform upgrades, patching, system, or service failures without interruption of services.
Implementing Secure Protocols
Common part of ensuring that communications and services are secure.
- HTTPS
- SSH instead of Telnet
- Wrapping other services using TLS
Protocol selection - Usually will default to automatically chooses the more secure protocol if it exists.
Reputation Services
Services and data feeds that track IP addresses, domains, and hosts that engage in malicious activity. They will monitor, or block potentially malicious actors and systems. Usually combined with threat feeds and log monitoring for better insight.
Software-Defined Networking
Designing a network relying on controllers that manage network devices and configurations with software-based controls. Allows for dynamic configuration of security zones to add systems based on authorization or to remove or isolate systems when they need to be quarantined.
Software-Defined Wide Area Network (SD-WAN)
A virtual wide area network design that can combine multiple connectivity services for organizations. Commonly used with Multiprotocol Label Switching (MPLS), 4G, 5G, and broadband networks. Provides high availability and allows networks to route traffic based on application requirements, while sending traffic to less expensive networks.
Secure Access Service Edge (SASE)
Combines virtual private networks, SD-WAN, and cloud-based security tools like firewalls. cloud access security brokers (CASB), and zero-trust networks to provide secure access for devices regardless of their location.
Network Segmentation
Dividing a network into logical or physical groupings that are frequently based on trust boundaries, functional requirements, or other reasons that help an organization apply controls or assist with functionality.
Virtual Local Area Network (VLAN)
Sets up a broadcast domain that is segmented at the data link layer. Switches or other devices are used to separate the areas using VLAN tags, allowing different ports across multiple network devices.
Broadcast Domain
A segment of a network in which all of the devices or systems can reach one another via packets sent as broadcast at the data link layer.
Network Design Concepts for Segmentation
Screened subnets - (DMZ, demilitarized zone) - Network zones that contain systems that are exposed to less trusted areas. Screened subnets are commonly used to contain web servers or other internet facing devices.
Intranets - Internal networks setup to provide information to employees or other members of an organization. They are typically protected from external access.
Extranets - Networks that are setup for external access, typically for partners or customers of an organization that provide products or services between each other. These networks are not usually available for access to the public at large.