Skip to the content.

Securing the Network

Securing the Infrastructure

TCP/IP’s vulnerabilities are numerous. Improperly implemented TCP/IP stacks in various operating systems are vulnerable to various attacks:

TCP/IP (as well as most protocols) is also subject to passive attacks via monitoring or sniffing. Network monitoring, or sniffing, is the act of monitoring traffic patterns to obtain information about a network.

Physical vs Logical Separation

Network Segmentation

Involves isolating a network from outside communications.

Demilitarized Zone

Demilitarized Zone (DMZ) is an isolated network area for outside visitors.

Virtual Local Network

VLANs are created by switches to logically segments a network without altering physical topology.

More details can be found here: VLANs

Microsegmentation

Microsegmentation addresses modern cyber threats exploiting traditional security models by focusing on protection requirements for traffic within a data center and to/from the internet.

Network Access Control

Network Access Control (NAC) scans devices for thir security status before granting network access, safeguarding against both known and unknown devices.

NAC Policy typically contains:

Use Cases for NAC Deployment:

Onboarding Process Importance:

NAC Deployments:

DHCP Snooping

DHCP Snooping is a security feature that acts as a firewall between untrusted hosts and trusted DHCP servers. By monitoring and filtering DHCP traffic, it helps prevent malicious attacks such as IP address spoofing and rogue DHCP servers.

Infrastructure Considerations

Infrastructure considerations play a pivotal role in the efficiency and security of a network environment.

Understand device attributes

Failure Modes

Failover mode determines how devices will act in case something goes wrong.

Selecting Infrastructure Controls

Defense in Depth

Defense in Depth is an approach in cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information.

Zero Trust Model

The Zero Trust Model, also known as Perimeterless security, focuses on “Never trust, always verify concept whereby users and devices should not be trusted by default.

Microsegmentation in Zero Trust Networks

Analogy: Concert Access

Risk-Based Approach

Prioritizes controls based on potential risks and vulnerabilities specific to the infrastructure to make efficient use of resources.

Lifecycle Management

Involves regular reviewing, updating, and retiring controls to adapt to evolving threat landscapes.

Open Design Principle

Ensures transparency and accountability through rigorous testing and scrutiny of infrastructure and controls.

Methods and Practices for Effective Controls

Selection Process

  1. Assess the current state.
  2. Conduct gap analysis.
  3. Setting clear objective.
  4. Benchmarking against industry best practices.
  5. Conduct cost-benefit analysis.
  6. Ensure stakeholder involvement.
  7. Implement monitoring and feedback loops.

Best Practices

Virtual Private Network

A Virtual Private Network or VPN extends a private network over a public one, allowing secure access to remote networks. This enables users to securely send and receive data.

Tunneling Protocols

Tunneling protocols are essential for securing data transmission across networks, especially over the internet. They encapsulate and encrypt data to ensure confidentiality, integrity, and authentication during transmission.

Tunnel Configurations

Both tunnel configurations can be used for site-to-site or client-to-site VPNs.

VPN Configurations

VPN configurations ensure secure connections over public networks and come in various forms, including site-to-site, client-to-site, and clientless VPNs.

TLS

TLS or Transport Layer Security is a protocol that provides cryptography security for secure data transmission between clients and servers.

TCP

TLS uses the Transmission Control Protocol (TCP) to establish secure communications between a client and a server.

DTLS

Datagram TLS is a UDP-version of TLS protocol that offers that same security level as TLS while maintaining faster operations.

IPSec

IPSec (Internet Protocol Security) is the most famous protocol used today for establishing VPNs because of its confidentiality, integrity, authentication, and anti-replay operations.

To secure the communication between two endpoints, we can utilized the following mechanisms:

Establishing an IPSec Tunnel

  1. Request to start Internet Key Exchange (IKE).
    • PC1 Initiates trafffic to PC2.
    • This triggers IPSec tunnel creation by router 1
  2. IKE Phase 1
    • Router 1 and router 2 negotiates security associations for IKE Phase 1.
    • Also known as ISAKMP Tunnel
  3. IKE Phase 2
    • Establishes a tunnel within the tunnel.
  4. Data Transfer
    • Data can now be securely transferred between PC1 and PC2.
  5. Tunnel Termination
    • Tunnel is torn down, deleting IPSec security associations

IPSec Tunnel Mode

IPSec Tunnel Mode secures data transmission between two networks over the internet by encapsulating and encrypting the entire original IP packet within a new IP packet. This ensures both the payload and the original IP header are protected, commonly used in VPNs to create secure connections between gateways.

Workaround for the packetsize:

At source and destination:

IPSec Transport Mode

IPSec Transport Mode secures end-to-end communication between two devices by encrypting only the payload of the IP packet, while leaving the original IP header intact. This mode is commonly used for securing communication between two hosts or between a host and a gateway.

Packet size:

Authentication Header (AH)

Authentication Header (AH) offers connectionless data integrity and data origin authentication for IP datagrams using cryptographic hash as identification information.

Encapsulation Security Payload (ESP)

Encapsulation Security Payload (ESP) provides authentication, integrity, replay protection, and data confidentiality by encrypting the packet’s payload.

In tunneling mode, ESP can be used along with authentication headers.

Since the payload is encrypted, some details like the type of traffic, e.g. whether it is TCP or UDP, and the port numbers are hidden. This is all well and good, but it might get blocked by a firewall since the firewall will have to check the traffic type and ports.

Firewall

Safeguards networks by monitoring and controlling traffic based on predefined security rules.

Screened Subnet

In-depth Inspection

Types of Firewall

Evolution of Firewalls

Access Control Lists

Access Control Lists (ACLs) is a rule set that is placed on firewalls, routers, and other network infrastructure devices that permit or allow traffice through a particular interface.

Information contained in ACLs:

ACLs can be configured through:

IDS and IPS

Intrusion

An intrusion occurs when security mechanisms are bypassed, enabling unauthorized access to an organization’s resources.

Intrusion detection is a monitoring method that examines recorded information and real-time events to identify abnormal activities indicative of potential incidents or intrusions.

Difference between IDS and IPS

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are both crucial for network security, designed to monitor network traffic for suspicious activity.

Types of IDS/IPS

Both IDS and IPS have similar types based on how they are deployed.

IDS Detection Methods

Evolution of Network Security

SIEM

A SIEM (Security Information and Event Management) is a comprehensive security solution that collects, correlates, and analyzes log data from various sources across an organization’s IT infrastructure.

A SIEM typically provides the following features:

Mobile Device Management

Mobile Device Management (MDM) enables organizations to manage and secure mobile devices across various platforms (smartphones, tablets).

Example features:

Software Defined Networking

Software Defined Networking (SDN) is a networking approach that centralizes network control, enabling programmability and automation for improved network management and efficiency.


Back to main page