ISC2 CC Domain4 Network Security
ISC2 CC Domain4 Network Security
app/
network. A firewall is a network device used to filter traffic. It is typically deployed between a
L4 Network Security private network and the internet, but it can also be deployed between departments
(segmented networks) within an organization (overall network). Firewalls filter traffic based on
a defined set of rules, also called filters or access control lists.
Module 1: Understand Computer Networking A server is a computer that provides information to other computers on a network. Some
common servers are web servers, email servers, print servers, database servers and file servers.
Domain D4.1.1, D4.1.2 All of these are, by design, networked and accessed in some way by a client computer. Servers
are usually secured differently than workstations to protect the information they contain.
What is Networking
Endpoints are the ends of a network communication link. One end is often at a server where a
A network is simply two or more computers linked together to share data, information or resource resides, and the other end is often a client making a request to use a network
resources. resource. An endpoint can be another server, desktop workstation, laptop, tablet, mobile
phone or any other end user device.
To properly establish secure data communications, it is important to explore all of the technologies
involved in computer communications. From hardware and software to protocols and encryption
Other Networking Terms
and beyond, there are many details, standards and procedures to be familiar with.
Ethernet (IEEE 802.3) is a standard that defines wired connections of networked devices. This
Types of Networks standard defines the way data is formatted over the wire to ensure disparate devices can
communicate over the same cables.
There are two basic types of networks:
Media Access Control (MAC) Address - Every network device is assigned a Media Access
Local area network (LAN) - A local area network (LAN) is a network typically spanning a single
Control (MAC) address. An example is 00-13-02-1F-58-F5. The first 3 bytes (24 bits) of the
floor or building. This is commonly a limited geographical area.
address denote the vendor or manufacturer of the physical network interface. No two devices
Wide area network (WAN) - Wide area network (WAN) is the term usually assigned to the
can have the same MAC address in the same local network; otherwise an address conflict
long-distance connections between geographically remote networks.
occurs.
Network Devices Internet Protocol (IP) Address - While MAC addresses are generally assigned in the firmware of
the interface, IP hosts associate that address with a unique logical address. This logical IP
Hubs are used to connect multiple devices in a network. They’re less likely to be seen in
address represents the network interface within the network and can be useful to maintain
business or corporate networks than in home networks. Hubs are wired devices and are not as
communications when a physical device is swapped with new hardware. Examples are
smart as switches or routers.
192.168.1.1 and 2001:db8::ffff:0:1.
You might consider using a switch, or what is also known as an intelligent hub. Switches are
wired devices that know the addresses of the devices connected to them and route traffic to Networking Models
that port/device rather than retransmitting to all devices. Offering greater efficiency for traffic
Many different models, architectures and standards exist that provide ways to interconnect
delivery and improving the overall throughput of data, switches are smarter than hubs, but not
different hardware and software systems with each other for the purposes of sharing information,
as smart as routers. Switches can also create separate broadcast domains when used to create
coordinating their activities and accomplishing joint or shared tasks.
VLANs, which will be discussed later.
Computers and networks emerge from the integration of communication devices, storage devices,
Routers are used to control traffic flow on networks and are often used to connect similar
processing devices, security devices, input devices, output devices, operating systems, software,
networks and control traffic flow between them. Routers can be wired or wireless and can
services, data and people.
connect multiple switches. Smarter than hubs and switches, routers determine the most
efficient “route” for the traffic to flow across the network. Translating the organization’s security needs into safe, reliable and effective network systems
needs to start with a simple premise. The purpose of all communications is to exchange
Firewalls are essential tools in managing and controlling network traffic and protecting the
information and ideas between people and organizations so that they can get work done. communication of various hierarchical components from software interfaces to physical hardware.
Those simple goals can be re-expressed in network (and security) terms such as: The OSI model divides networking tasks into seven distinct layers. Each layer is responsible for
performing specific tasks or operations with the goal of supporting data exchange (in other words,
Provide reliable, managed communications between hosts (and users) network communication) between two computers. The layers are interchangeably referenced by
Isolate functions in layers name or layer number. For example, Layer 3 is also known as the Network Layer. The layers are
Use packets (representation of data at L3 of OSI model ) as the basis of communication ordered specifically to indicate how information flows through the various levels of
Standardize routing, addressing and control communication. Each layer communicates directly with the layer above and the layer below it. For
example, Layer 3 communicates with both the Data Link (2) and Transport (4) layers.
Allow layers beyond internetworking to add functionality
Be vendor-agnostic, scalable and resilient The Application, Presentation, and Session Layers (5-7) are commonly referred to simply as data.
However, each layer has the potential to perform encapsulation (enforcement of data hiding and
In the most basic form, a network model has at least two layers: code hiding during all phases of software development and operational use. Bundling together
data and methods is the process of encapsulation; its opposite process may be called unpacking,
UPPER LAYER APPLICATION: also known as the host or application layer, is responsible for
revealing, or using other terms. Also used to refer to taking any set of data and packaging it or
managing the integrity of a connection and controlling the session as well as establishing,
hiding it in another data structure, as is common in network protocols and encryption.).
maintaining and terminating communication sessions between two computers. It is also
Encapsulation is the addition of header and possibly a footer (trailer) data by a protocol used at
responsible for transforming data received from the Application Layer into a format that any
that layer of the OSI model. Encapsulation is particularly important when discussing Transport,
system can understand. And finally, it allows applications to communicate and determines
Network and Data Link layers (2-4), which all generally include some form of header. At the
whether a remote communication partner is available and accessible.
Physical Layer (1), the data unit is converted into binary, i.e., 01010111, and sent across physical
APPLICATION
wires such as an ethernet cable.
APPLICATION 7
PRESENTATION 6 It's worth mapping some common networking terminology to the OSI Model so you can see the
SESSION 5 value in the conceptual model.
LOWER LAYER: it is often referred to as the media or transport layer and is responsible for
Consider the following examples:
receiving bits from the physical connection medium and converting them into a frame. Frames
are grouped into standardized sizes. Think of frames as a bucket and the bits as water. If the When someone references an image file like a JPEG or PNG, we are talking about the
buckets are sized similarly and the water is contained within the buckets, the data can be Presentation Layer (6).
transported in a controlled manner. Route data is added to the frames of data to create When discussing logical ports such as NetBIOS, we are discussing the Session Layer (5).
packets. In other words, a destination address is added to the bucket. Once we have the
When discussing TCP/UDP, we are discussing the Transport Layer (4).
buckets sorted and ready to go, the host layer takes over.
When discussing routers sending packets, we are discussing the Network Layer (3).
DATA TRANSPORT
TRANSPORT 4 When discussing switches, bridges or WAPs sending frames, we are discussing the Data Link
Layer (2).
NETWORK 3
DATA LINK 2 Encapsulation occurs as the data moves down the OSI model from Application to Physical. As data
PHYSICAL 1 is encapsulated at each descending layer, the previous layer’s header, payload and footer are all
treated as the next layer’s payload. The data unit size increases as we move down the conceptual
Open Systems Interconnection (OSI) Model model and the contents continue to encapsulate.
The OSI Model was developed to establish a common way to describe the communication The inverse action occurs as data moves up the OSI model layers from Physical to Application. This
structure for interconnected computer systems. The OSI model serves as an abstract framework, or process is known as de-encapsulation (or decapsulation). The header and footer are used to
theoretical model, for how protocols should function in an ideal world, on ideal hardware. Thus, properly interpret the data payload and are then discarded. As we move up the OSI model, the
the OSI model has become a common conceptual reference that is used to understand the data unit becomes smaller. The encapsulation/de-encapsulation process is best depicted visually
below: by ping, traceroute and other network management tools. The ping utility employs ICMP echo
packets and bounces them off remote systems. Thus, you can use ping to determine whether the
remote system is online, whether the remote system is responding promptly, whether the
7 Application DATA
intermediary systems are supporting communications, and the level of performance efficiency at
Header which the intermediary systems are communicating.
6 Presentation DATA
-->
Application, Presentation and Session layers at OSI model is equivalent to Application Layer at
5 Session DATA TCP/IP, and the protocol suite is: FTP, Telnet, SNMP, LPD, TFPT, SMTP, NFS, X Window.
4 Transport DATA Transport layer are the same between OSI model and TCP/IP model, protocol suite: TCP, UDP
Network layer at OSI model is equivalent to Internet layer at TCP/IP model, and protocol suite
3 Network DATA
is: IGMP, IP, ICMP
Data link and Physical layer at OSI model is equivalent at Network Interface layer at TCP/IP,
2 Data Link DATA
and protocol suite is: Ethernet, Fast Ethernet, Token Ring, FDDI
1 Physical DATA
Base concepts
Transmission Control Protocol/Internet Protocol (TCP/IP) Switch: A device that routes traffic to the port of a known device
Server: A computer that provides information to other computers
The OSI model wasn’t the first or only attempt to streamline networking protocols or establish a
common communications standard. In fact, the most widely used protocol today, TCP/IP, was Firewall: A device that filters network traffic based on a defined set of rules
developed in the early 1970s. The OSI model was not developed until the late 1970s. The TCP/IP Ethernet: A standard that defines wired communications of networked devices
protocol stack focuses on the core functions of networking. IP Address: Logical address representing the network interface
MAC Address: Address that denotes the vendor or manufactures of the physical network
TCP/IP Protocol Architecture Layers
interface
Application Layer Defines the protocols for the transport layer
Internet Protocol (IPv4 and IPv6)
Transport Layer Permits data to move among devices
IPv4 provides a 32-bit address space. IPv6 provides a 128-bit address space. The first one is
Internet Layer Creates/inserts packets
exhausted nowadays, but it is still used because of the NAT technology. 32 bits means 4 octets of 8
Network Interface Layer How data moves through the network bits, which is represented in a dotted decimal notation such as 192.168.0.1, which means in binary
notation 11000000 10101000 00000000 00000001
The most widely used protocol suite is TCP/IP, but it is not just a single protocol; rather, it is a
protocol stack comprising dozens of individual protocols. TCP/IP is a platform-independent IP hosts/devices associate an address with a unique logical address. An IPv4 address is expressed
protocol based on open standards. However, this is both a benefit and a drawback. TCP/IP can be as four octets separated by a dot (.), for example, 216.12.146.140. Each octet may have a value
found in just about every available operating system, but it consumes a significant amount of between 0 and 255. However, 0 is the network itself (not a device on that network), and 255 is
resources and is relatively easy to hack into because it was designed for ease of use rather than for generally reserved for broadcast purposes. Each address is subdivided into two parts: the
security. network number and the host. The network number assigned by an external organization, such as
the Internet Corporation for Assigned Names and Numbers (ICANN), represents the organization’s
At the Application Layer, TCP/IP protocols include Telnet, File Transfer Protocol (FTP), Simple Mail network. The host represents the network interface within the network.
Transport Protocol (SMTP), and Domain Name Service (DNS). The two primary Transport Layer
protocols of TCP/IP are TCP and UDP. TCP is a full-duplex connection-oriented protocol, whereas To ease network administration, networks are typically divided into subnets. Because subnets
UDP is a simplex connectionless protocol. In the Internet Layer, Internet Control Message cannot be distinguished with the addressing scheme discussed so far, a separate mechanism, the
Protocol (ICMP) is used to determine the health of a network or a specific link. ICMP is utilized subnet mask, is used to define the part of the address used for the subnet. The mask is usually
converted to decimal notation like 255.255.255.0. With the ever-increasing number of computers * The range 2001:db8:: to 2001:db8:ffff:ffff:ffff:ffff:ffff:ffff is reserved for documentation use
* **fc00**:: to **fdff**:ffff:ffff:ffff:ffff:ffff:ffff:ffff are addresses reserved for internal ne
and networked devices, it is clear that IPv4 does not provide enough addresses for our needs. To
overcome this shortcoming, IPv4 was sub-divided into public and private address ranges. Public
addresses are limited with IPv4, but this issue was addressed in part with private addressing.
What is WiFi?
Private addresses can be shared by anyone, and it is highly likely that everyone on your street is
using the same address scheme. Wireless networking is a popular method of connecting corporate and home systems because of
the ease of deployment and relatively low cost. It has made networking more versatile than ever
The nature of the addressing scheme established by IPv4 meant that network designers had to
before. Workstations and portable systems are no longer tied to a cable but can roam freely within
start thinking in terms of IP address reuse. IPv4 facilitated this in several ways, such as its creation
the signal range of the deployed wireless access points. However, with this freedom comes
of the private address groups; this allows every LAN in every SOHO (small office, home office)
additional vulnerabilities.
situation to use addresses such as 192.168.2.xxx for its internal network addresses, without fear
that some other system can intercept traffic on their LAN. This table shows the private addresses Wi-Fi range is generally wide enough for most homes or small offices, and range extenders may be
available for anyone to use: placed strategically to extend the signal for larger campuses or homes. Over time the Wi-Fi
standard has evolved, with each updated version faster than the last.
RANGE
In a LAN, threat actors need to enter the physical space or immediate vicinity of the physical media
10.0.0.0 to 10.255.255.254 itself. For wired networks, this can be done by placing sniffer taps onto cables, plugging in USB
172.16.0.0 to 172.31.255.254 devices, or using other tools that require physical access to the network. By contrast, wireless
media intrusions can happen at a distance.
192.168.0.0 to 192.168.255.254
Security of the Network
The first octet of 127 is reserved for a computer’s loopback address. Usually, the address 127.0.0.1
is used. The loopback address is used to provide a mechanism for self-diagnosis and TCP/IP’s vulnerabilities are numerous. Improperly implemented TCP/IP stacks in various operating
troubleshooting at the machine level. This mechanism allows a network administrator to treat a systems are vulnerable to various DoS/DDoS attacks, fragment attacks, oversized packet attacks,
local machine as if it were a remote machine and ping the network interface to establish whether it spoofing attacks, and man-in-the-middle attacks. TCP/IP (as well as most protocols) is also
is operational. subject to passive attacks via monitoring or sniffing. Network monitoring, or sniffing, is the act of
monitoring traffic patterns to obtain information about a network.
IPv6 is a modernization of IPv4, which addressed a number of weaknesses in the IPv4 environment:
Ports and Protocols (Applications/Services)
* A much larger address field: IPv6 addresses are **128 bits**, which supports 2128 or 340,282,366,920,938,463
Physical Ports: Physical ports are the ports on the routers, switches, servers, computers, etc.
* Improved security:** IPsec is an optional part of IPv4 networks, but a mandatory component of IPv6 networks*
that you connect the wires, e.g., fiber optic cables, Cat5 cables, etc., to create a network.
* Improved quality of service (QoS): This will help services obtain an appropriate share of a network’s bandwi
Secure Secure
Insecure Insecure
Description Protocol Alternative Protocol Description Protocol Alternative Protocol
Port Port
Port Port
Port 53, Domain Name Service are commonly used to send and
(DNS), is still used widely. receive data used for managing
However, using DNS over TLS Domain DNS over infrastructure devices. Because
53 853 - DoT sensitive information is often
(DoT) on port 853 protects DNS Name Service TLS (DoT)
information from being included in these messages, it is
modified in transit recommended to use SNMP
version 2 or 3 (abbreviated
Port 80, HyperText Transfer SNMPv2 or SNMPv3) to include
Protocol (HTTP) is the basis of encryption and additional Management
nearly all web browser traffic on security features. Unlike many Protocol
the internet. Information sent others discussed here, all
via HTTP is not encrypted and is versions of SNMP use the same
susceptible to sniffing attacks. ports, so there is not a definitive
HTTPS using TLS encryption is secure and insecure pairing.
preferred, as it protects the data HyperText Additional context will be
HyperText
in transit between the server 443 - Transfer needed to determine if
80 Transfer
and the browser. Note that this HTTPS Protocol information on ports 161 and
Protocol
is often notated as SSL/TLS. (SSL/TLS) 162 is secured or not
Secure Sockets Layer (SSL) has
been compromised is no longer Port 445, Server Message Block
considered secure. It is now (SMB), is used by many versions
recommended for web servers of Windows for accessing files
and clients to use Transport over the network. Files are
Layer Security (TLS) 1.3 or higher transmitted unencrypted, and
for the best protection many vulnerabilities are well-
known. Therefore, it is
Port 143, Internet Message recommended that traffic on Server
Access Protocol (IMAP) is a Network File
445 port 445 should not be allowed Message 2049 - NFS
protocol used for retrieving System
to pass through a firewall at the Block
emails. IMAP traffic on port 143 network perimeter. A more
Internet
is not encrypted and susceptible secure alternative is port 2049,
Message IMAP for
143 to network sniffing. The secure 993 - IMAP Network File System (NFS).
Access SSL/TLS
alternative is to use port 993 for Although NFS can use
Protocol
IMAP, which adds SSL/TLS encryption, it is recommended
security to encrypt the data that NFS not be allowed
between the mail client and the through firewalls either
mail server
Port 389, Lightweight Directory Lightweight Lightweight
Ports 161 and 162, Simple Simple 636 -
161/162 - 389 Access Protocol (LDAP), is used Directory Directory
161/162 SNMPv3 LDAPS
Network Management Protocol, Network SNMP to communicate directory Access Access
Secure Worm: Worms pose a significant risk to network security. They contain the same destructive
Insecure potential as other malicious code objects with an added twist—they propagate themselves
Description Protocol Alternative Protocol
Port without requiring any human intervention.
Port
information from servers to Trojan: the Trojan is a software program that appears benevolent but carries a malicious,
clients. This can be an address behind-the-scenes payload that has the potential to wreak havoc on a system or network. For
book for email or usernames for example, ransomware often uses a Trojan to infect a target machine and then uses encryption
logins. The LDAP protocol also technology to encrypt documents, spreadsheets and other files stored on the system with a
allows records in the directory to key known only to the malware creator.
be updated, introducing
additional risk. Since LDAP is not Protocol On-path attack: In an on-path attack, attackers place themselves between two devices, often
Protocol between a web browser and a web server, to intercept or modify information that is intended
encrypted, it is susceptible to Secure
sniffing and manipulation for one or both of the endpoints. On-path attacks are also known as man-in-the-middle
attacks. Lightweight Directory (MITM) attacks.
Access Protocol Secure (LDAPS)
Side-channel: A side-channel attack is a passive, noninvasive attack to observe the operation
adds SSL/TLS security to protect
of a device. Methods include power monitoring, timing and fault analysis attacks.
the information while it is in
transit Advanced Persistent Threat: Advanced persistent threat (APT) refers to threats that
demonstrate an unusually high level of technical and operational sophistication spanning
SYN, SYN-ACK, ACK months or even years. APT attacks are often conducted by highly organized groups of
attackers.
Module 2 Understand Network (Cyber) Threats and Attacks Insider Threat: Insider threats are threats that arise from individuals who are trusted by the
organization. These could be disgruntled employees or employees involved in espionage.
Domain D4.1.2, D4.2.2, D4.2.3 Insider threats are not always willing participants. A trusted user who falls victim to a scam
could be an unwilling insider threat.
Types of Threats
Malware: A program that is inserted into a system, usually covertly, with the intent of
Spoofing: an attack with the goal of gaining access to a target system through the use of a compromising the confidentiality, integrity or availability of the victim’s data, applications or
falsified identity. Spoofing can be used against IP addresses, MAC address, usernames, system operating system or otherwise annoying or disrupting the victim.
names, wireless network SSIDs, email addresses, and many other types of logical identification.
Ransomware: Malware used for the purpose of facilitating a ransom attack. Ransomware
Phising: an attack that attempts to misdirect legitimate users to malicious websites through attacks often use cryptography to “lock” the files on an affected computer and require the
the abuse of URLs or hyperlinks in emails could be considered phishing. payment of a ransom fee in return for the “unlock” code.
DoS/DDoS: a denial-of-service (DoS) attack is a network resource consumption attack that has
the primary goal of preventing legitimate activity on a victimized system. Attacks involving Identify Threats and Tools Used to Prevent Them
numerous unsuspecting secondary victim systems are known as distributed denial-of-service Here are some examples of steps that can be taken to protect networks.
(DDoS) attacks.
If a system doesn’t need a service or protocol, it should not be running. Attackers cannot
Virus: The computer virus is perhaps the earliest form of malicious code to plague security exploit a vulnerability in a service or protocol that isn’t running on a system.
administrators. As with biological viruses, computer viruses have two main functions
Firewalls can prevent many different types of attacks. Network-based firewalls protect entire
—propagation and destruction. A virus is a self-replicating piece of code that spreads
networks, and host-based firewalls protect individual systems.
without the consent of a user, but frequently with their assistance (a user has to click on a link
or open a file).
Identify Threats and Tools Used to Prevent Them Continued require administrative attention on each system, whereas NIDSs usually support centralized
administration. A HIDS cannot detect network attacks on other systems.
Instrusion Detection System (IDS) is a form of monitoring to detect abnormal activity; it
detects intrusion attempts and system failures. Identifies Threats, Do not prevent threats Network Intrusion Detection System (NIDS): A NIDS monitors and evaluates network activity to
Host-based IDS (HIDS) monitors activity on a single computer. Identifies threats, Do not detect attacks or event anomalies. It cannot monitor the content of encrypted traffic but can
prevent Threats. monitor other packet details. A single NIDS can monitor a large network by using remote sensors
to collect data at key network locations that send data to a central management console. These
Network-based IDS (NIDS) monitors and evaluates network activity to detect attacks or event
sensors can monitor traffic at routers, firewalls, network switches that support port mirroring,
anomalies. Identifies threats, Do not prevent Threats.
and other types of network taps. A NIDS has very little negative effect on the overall network
SIEM gathers log data from sources across an enterprise to understand security concerns and
performance, and when it is deployed on a single-purpose system, it doesn’t adversely affect
apportion resources. Identifies threats, Do not prevent Threats.
performance on any other computer. A NIDS is usually able to detect the initiation of an attack or
Anti-malware/Antivirus seeks to identify malicious software or processes. Identifies and ongoing attacks, but they can’t always provide information about the success of an attack. They
Prevent threats. won’t know if an attack affected specific systems, user accounts, files or applications.
Scans evaluates the effectiveness of security controls. Identifies threats, Do not prevent
Security Information and Event Management (SIEM): Security management involves the use of
Threats.
tools that collect information about the IT environment from many disparate sources to better
Firewall filters network traffic - managers and controls network traffic and protects the
examine the overall security of the organization and streamline security efforts. These tools are
network. Identifies and Prevent threats.
generally known as security information and event management (or S-I-E-M, pronounced “SIM”)
Intrusion Protection System (IPS-NIPS/HIPS) is an active IDS automatically attempts to detect solutions. The general idea of a SIEM solution is to gather log data from various sources across
and block attacks before they reach target systems. Identifies and Prevent threats. the enterprise to better understand potential security concerns and apportion resources
accordingly. SIEM systems can be used along with other components (defense-in-depth) as part of
Intrusion Detection System (IDS) an overall information security program.
An intrusion occurs when an attacker is able to bypass or thwart security mechanisms and gain
access to an organization’s resources. Intrusion detection is a specific form of monitoring that
Preventing Threats
monitors recorded information and real-time events to detect abnormal activity indicating a Keep systems and applications up to date. Vendors regularly release patches to correct bugs
potential incident or intrusion. An intrusion detection system (IDS) automates the inspection of and security flaws, but these only help when they are applied. Patch management ensures that
logs and real-time system events to detect intrusion attempts and system failures. An IDS is systems and applications are kept up to date with relevant patches.
intended as part of a defense-in-depth security plan. IDSs can recognize attacks that come from
Remove or disable unneeded services and protocols. If a system doesn’t need a service or
external connections and attacks that spread internally. Once they detect a suspicious event, they
protocol, it should not be running. Attackers cannot exploit a vulnerability in a service or
respond by sending alerts or raising alarms. A primary goal of an IDS is to provide a means for a
protocol that isn’t running on a system. As an extreme contrast, imagine a web server is
timely and accurate response to intrusions.
running every available service and protocol. It is vulnerable to potential attacks on any of
IDS types are commonly classified as host-based and network-based. A host-based IDS (HIDS) these services and protocols.
monitors a single computer or host. A network-based IDS (NIDS) monitors a network by Use intrusion detection and prevention systems. As discussed, intrusion detection and
observing network traffic patterns. prevention systems observe activity, attempt to detect threats and provide alerts. They can
often block or stop attacks.
Host-based Intrusion Detection System (HIDS): A HIDS monitors activity on a single computer,
Use up-to-date anti-malware software. We have already covered the various types of
including process calls and information recorded in system, application, security and host-based
malicious code such as viruses and worms. A primary countermeasure is anti-malware
firewall logs. It can often examine events in more detail than a NIDS can, and it can pinpoint
software.
specific files compromised in an attack. It can also track processes employed by the attacker. A
benefit of HIDSs over NIDSs is that HIDSs can detect anomalies on the host system that NIDSs Use firewalls. Firewalls can prevent many different types of threats. Network-based firewalls
cannot detect. For example, a HIDS can detect infections where an intruder has infiltrated a protect entire networks, and host-based firewalls protect individual systems. This chapter
system and is controlling it remotely. HIDSs are more costly to manage than NIDSs because they included a section describing how firewalls can prevent attacks.
Antivirus: it is a requirement for compliance with the Payment Card Industry Data Security On-Premises Data Centers
Standard (PCI DSS). Antivirus systems try to identify malware based on the signature of known
malware or by detecting abnormal activity on a system. This identification is done with various When it comes to data centers, there are two primary options: organizations can outsource the
types of scanners, pattern recognition and advanced machine learning algorithms. Anti-malware data center or own the data center. If the data center is owned, it will likely be built on premises. A
now goes beyond just virus protection as modern solutions try to provide a more holistic approach place, like a building for the data center is needed, along with power, HVAC, fire suppression and
detecting rootkits, ransomware and spyware. Many endpoint solutions also include software redundancy.
firewalls and IDS or IPS systems.
Data Center/Closets: The facility wiring infrastructure is integral to overall information
Scans: Regular vulnerability and port scans are a good way to evaluate the effectiveness of security system security and reliability. Protecting access to the physical layer of the network is
controls used within an organization. They may reveal areas where patches or security settings are important in minimizing intentional or unintentional damage. Proper protection of the
insufficient, where new vulnerabilities have developed or become exposed, and where security physical site must address these sorts of security challenges. Data centers and wiring closets
policies are either ineffective or not being followed. Attackers can exploit any of these may include the following: Phone, network, special connections; ISP or telecommunications
vulnerabilities. provider equipment; Servers; Wiring and/or switch components.
Firewalls: Early computer security engineers borrowed that name for the devices and services that Heating, Ventilation and Air Conditioning (HVAC) / Environmental: High-density equipment
isolate network segments from each other, as a security measure. As a result, firewalling refers to and equipment within enclosed spaces requires adequate cooling and airflow. Well-
the process of designing, using or operating different processes in ways that isolate high-risk established standards for the operation of computer equipment exist, and equipment is tested
activities from lower-risk ones. Firewalls enforce policies by filtering network traffic based on a against these standards. For example, the recommended range for optimized maximum
set of rules. While a firewall should always be placed at internet gateways, other internal network uptime and hardware life is from 18° to 27°C, and it is recommended that a rack have three
considerations and conditions determine where a firewall would be employed, such as network temperature sensors, positioned at the top, middle and bottom of the rack, to measure the
zoning or segregation of different levels of sensitivity. Firewalls have rapidly evolved over time to actual operating temperature of the environment. Proper management of data center
provide enhanced security capabilities. It integrates a variety of threat management capabilities temperatures, including cooling, is essential. Cooling is not the only issue with airflow:
into a single framework, including proxy services, intrusion prevention services (IPS) and tight Contaminants like dust and noxious fumes require appropriate controls to minimize their
integration with the identity and access management (IAM) environment to ensure only impact on equipment. Monitoring for water or gas leaks, sewer overflow or HVAC failure
authorized users are permitted to pass traffic across the infrastructure. While firewalls can should be integrated into the building control environment, with appropriate alarms to signal
manage traffic at Layers 2 (MAC addresses), 3 (IP ranges) and 7 (application programming to organizational staff. Contingency planning to respond to the warnings should prioritize the
interface (API) and application firewalls), the traditional implementation has been to control systems in the building, so the impact of a major system failure on people, operations or other
traffic at Layer 4. Traditional firewalls have PORTS IP Address, IDS/IPS, Antivirus Gateway, infrastructure can be minimized.
WebProxy, VPN; NG Firewalls have PORTS IP Address, IAM Attributes, IDS/IPS, WebProxy, Anti-Bot,
Power: Data centers and information systems in general consume a tremendous amount of
Antivirus Gateway, VPN, FaaS.
electrical power, which needs to be delivered both constantly and consistently. Wide
Intrusion Prevention System (IPS): An intrusion prevention system (IPS) is a special type of active fluctuations in the quality of power affect system lifespan, while disruptions in supply
IDS that automatically attempts to detect and block attacks before they reach target systems. A completely stop system operations. Power at the site is always an integral part of data center
distinguishing difference between an IDS and an IPS is that the IPS is placed in line with the operations. Regardless of fuel source, backup generators must be sized to provide for the
traffic. In other words, all traffic must pass through the IPS and the IPS can choose what traffic critical load (the computing resources) and the supporting infrastructure. Similarly, battery
to forward and what traffic to block after analyzing it. This allows the IPS to prevent an attack backups must be properly sized to carry the critical load until generators start and stabilize. As
from reaching a target. Since IPS systems are most effective at preventing network-based attacks, with data backups, testing is necessary to ensure the failover to alternate power works
it is common to see the IPS function integrated into firewalls. Just like IDS, there are Network- properly.
based IPS (NIPS) and Host-based IPS (HIPS).
Fire Suppression: For server rooms, appropriate fire detection/suppression must be considered
based on the size of the room, typical human occupation, egress routes and risk of damage to
Module 3 Understand Network Security Infrastructure equipment. For example, water used for fire suppression would cause more harm to servers
and other electronic components. Gas-based fire suppression systems are more friendly to the
Domain D4.3.1, D4.3.2 electronics, but can be toxic to humans.
Which of the following is typically associated with an on-premises data center? Fire suppression is We must be very cautious when outsourcing with cloud-based services, because we have to make
associated, HVAC is associated, Power is associated are all associated with an on-premises data sure that we understand exactly what we are agreeing to. If the SLA promises 100 percent
center. accessibility to information, is the access directly to you at the moment, or is it access to their
website or through their portal when they open on Monday? That's where you'll rely on your legal
Which of the following is not a source of redundant power? HVAC is not a source of redundant team, who can supervise and review the conditions carefully before you sign the dotted line at the
power, but it is something that needs to be protected by a redundant power supply, which is what bottom.
the other three options will provide. What happens if the HVAC system breaks and equipment gets
too hot? If the temperature in the data center gets too hot, then there is a risk that the server will
Cloud
shut down or fail sooner than expected, which presents a risk that data will be lost. So that is
another system that requires redundancy in order to reduce the risk of data loss. But it is not itself Cloud computing is usually associated with an internet-based set of computing resources, and
a source of redundant power. typically sold as a service, provided by a cloud service provider (CSP). It is a very scalable, elastic
and easy-to-use “utility” for the provisioning and deployment of Information Technology (IT)
Redundancy services. There are various definitions of what cloud computing means according to the leading
standards, including NIST. This NIST definition is commonly used around the globe, cited by
The concept of redundancy is to design systems with duplicate components so that if a failure professionals and others alike to clarify what the term “cloud” means: “a model for enabling
were to occur, there would be a backup. This can apply to the data center as well. Risk ubiquitous, convenient, on-demand network access to a shared pool of configurable computing
assessments pertaining to the data center should identify when multiple separate utility service resources (such as networks, servers, storage, applications, and services) that can be rapidly
entrances are necessary for redundant communication channels and/or mechanisms. provisioned and released with minimal management effort or service provider interaction.” NIST
If the organization requires full redundancy, devices should have two power supplies connected to SP 800-145
diverse power sources. Those power sources would be backed up by batteries and generators. In a
high-availability environment, even generators would be redundant and fed by different fuel types. Cloud Characteristics
Cloud-based assets include any resources that an organization accesses using cloud computing.
Memorandum of Understanding (MOU)/Memorandum of Agreement (MOA) Cloud computing refers to on-demand access to computing resources available from almost
Some organizations seeking to minimize downtime and enhance BC (Business Continuity) and DR anywhere, and cloud computing resources are highly available and easily scalable. Organizations
(Disaster Recovery) capabilities will create agreements with other, similar organizations. They typically lease cloud-based resources from outside the organization. Cloud computing has many
agree that if one of the parties experiences an emergency and cannot operate within their own benefits for organizations, which include but are not limited to:
facility, the other party will share its resources and let them operate within theirs in order to Resource Pooling
maintain critical functions. These agreements often even include competitors, because their
facilities and resources meet the needs of their particular industry. Broadnetwork Access
Rapid Elasticity
These agreements are called joint operating agreements (JOA) or memoranda of understanding
(MOU) or memoranda of agreement (MOA). Sometimes these agreements are mandated by Measured Service
regulatory requirements, or they might just be part of the administrative safeguards instituted by On-Demand Self-Service
an entity within the guidelines of its industry.
Usage is metered and priced according to units (or instances) consumed. This can also be
The difference between an MOA or MOU and an SLA is that a Memorandum of Understanding is billed back to specific departments or functions.
more directly related to what can be done with a system or the information.
Reduced cost of ownership. There is no need to buy any assets for everyday use, no loss of
The service level agreement goes down to the granular level. For example, if I'm outsourcing the IT asset value over time and a reduction of other related costs of maintenance and support.
services, then I will need to have two full-time technicians readily available, at least from Monday
Reduced energy and cooling costs, along with “green IT” environment effect with optimum
through Friday from eight to five. With cloud computing, I need to have access to the information
use of IT resources and systems.
in my backup systems within 10 minutes. An SLA specifies the more intricate aspects of the
services.
Allows an enterprise to scale up new software or data-based services/solutions through cloud generally provide and maintain the computing resources (e.g., processing, storage and
systems quickly and without having to install massive hardware locally. networking) that consumer applications need to operate. PaaS clouds provide many
benefits for developers, including that the operating system can be changed and
Service Models upgraded frequently, along with associated features and system services.
Some cloud-based services only provide data storage and access. When storing data in the cloud, Infrastrucuture As Service (IaaS): A cloud provides network access to traditional
organizations must ensure that security controls are in place to prevent unauthorized access to the computing resources such as processing power and storage. IaaS models provide basic
data. There are varying levels of responsibility for assets depending on the service model. This computing resources to consumers. This includes servers, storage, and in some cases,
includes maintaining the assets, ensuring they remain functional, and keeping the systems and networking resources. Consumers install operating systems and applications and perform
applications up to date with current patches. In some cases, the cloud service provider is all required maintenance on the operating systems and applications. Although the
responsible for these steps. In other cases, the consumer is responsible for these steps. consumer has use of the related equipment, the cloud service provider retains ownership
and is ultimately responsible for hosting, running and maintenance of the hardware. IaaS
Types of cloud computing service models include Software as a Service (SaaS) , Platform as a is also referred to as hardware as a service by some customers and providers. IaaS has a
Service (PaaS) and Infrastructure as a Service (IaaS). number of benefits for organizations, which include but are not limited to: Ability to scale
up and down infrastructure services based on actual usage. This is particularly useful and
Services
beneficial where there are significant spikes and dips within the usage curve for
Software As Service (SaaS): A cloud provides access to software applications such as infrastructure. Retain system control at the operating system level.
email or office productivity tools. SaaS is a distributed model where software
applications are hosted by a vendor or cloud service provider and made available to Deployment Models
customers over network resources. SaaS has many benefits for organizations, which
Clouds * Public: what we commonly refer to as the cloud for the public user. There is no real
include but are not limited to: Ease of use and limited/minimal administration.
mechanism, other than applying for and paying for the cloud service. It is open to the public
Automatic updates and patch management. The user will always be running the latest
and is, therefore, a shared resource that many people will be able to use as part of a resource
version and most up-to-date deployment of the software release, as well as any
pool. A public cloud deployment model includes assets available for any consumers to rent or
relevant security updates, with no manual patching required. Standardization and
lease and is hosted by an external cloud service provider (CSP). Service level agreements can be
compatibility. All users will have the same version of the software release.
effective at ensuring the CSP provides the cloud-based services at a level acceptable to the
Platform As Service (PaaS): A cloud provides an environment for customers to use to organization.
build and operate their own software. PaaS is a way for customers to rent hardware,
operating systems, storage and network capacity over the internet from a cloud service * Private: it begins with the same technical concept as public clouds, **except that instead of be
provider. The service delivery model allows customers to rent virtualized servers and
associated services for running existing applications or developing and testing new * Hybrid: it is created by **combining two forms of cloud computing deployment models, typically a
ones. The consumer does not manage or control the underlying cloud infrastructure,
* Community: it can be either public or private. **What makes them unique is that they are general
including network, servers, operating systems or storage, but has control over the
deployed applications and possibly application-hosting environment configurations. A
PaaS cloud provides a toolkit for conveniently developing, deploying and Managed Service Provider (MSP)
administering application software that is structured to support large numbers of
consumers, process very large quantities of data and potentially be accessed from any A managed service provider (MSP) is a company that manages information technology assets for
point on the internet. PaaS clouds will typically provide a set of software building blocks another company. Small- and medium-sized businesses commonly outsource part or all of their
and a set of development tools such as programming languages and supporting run-time information technology functions to an MSP to manage day-to-day operations or to provide
environments that facilitate the construction of high-quality, scalable applications. expertise in areas the company does not have. Organizations may also use an MSP to provide
Additionally, PaaS clouds will typically provide tools that assist with the deployment of network and security monitoring and patching services. Today, many MSPs offer cloud-based
new applications. In some cases, deploying a new software application in a PaaS cloud is services augmenting SaaS solutions with active incident investigation and response activities. One
not much more difficult than uploading a file to a web server. PaaS clouds will also such example is a managed detection and response (MDR) service, where a vendor monitors
firewall and other security tools to provide expertise in triaging events. A virtual private network (VPN) is a communication tunnel that provides point-to-point
transmission of both authentication and data traffic over an untrusted network.
Some other common MSP implementations are: Augment in-house staff for projects; Utilize
expertise for implementation of a product or service; Provide payroll services; Provide Help Desk Defense in depth uses multiple types of access controls in literal or theoretical layers to help
service management; Monitor and respond to security incidents; Manage all in-house IT an organization avoid a monolithic security stance.
infrastructure.
Network access control (NAC) is a concept of controlling access to an environment through
strict adherence to and implementation of security policy.
Service-Level Agreement (SLA)
The cloud computing service-level agreement (cloud SLA) is an agreement between a cloud Defense in Depth
service provider and a cloud service customer based on a taxonomy of cloud computing–
Defense in depth uses a layered approach when designing the security posture of an
specific terms to set the quality of the cloud services delivered. It characterizes quality of the cloud
organization. Think about a castle that holds the crown jewels. The jewels will be placed in a
services delivered in terms of a set of measurable properties specific to cloud computing (business
vaulted chamber in a central location guarded by security guards. The castle is built around the
and technical) and a given set of cloud computing roles (cloud service customer, cloud service
vault with additional layers of security—soldiers, walls, a moat. The same approach is true when
provider, and related sub-roles).
designing the logical security of a facility or system. Using layers of security will deter many
Think of a rule book and legal contract—that combination is what you have in a service-level attackers and encourage them to focus on other, easier targets.
agreement (SLA). Let us not underestimate or downplay the importance of this document/
agreement. In it, the minimum level of service, availability, security, controls, processes, Defense in depth provides more of a starting point for considering all types of controls
communications, support and many other crucial business elements are stated and agreed to by —administrative, technological, and physical—that empower insiders and operators to work
both parties. together to protect their organization and its systems.
connecting point. Zero trust encapsulates information assets, the services that apply to them and It is critically important that all mobile devices, regardless of their owner, go through an
their security properties. This concept recognizes that once inside a trust-but-verify environment, onboarding process, ideally each time a network connection is made, and that the device is
a user has perhaps unlimited capabilities to roam around, identify assets and systems and identified and interrogated to ensure the organization’s policies are being met.
potentially find exploitable vulnerabilities. Placing a greater number of firewalls or other security
boundary control devices throughout the network increases the number of opportunities to detect Network Segmentation (Demilitarized Zone (DMZ))
a troublemaker before harm is done. Many enterprise architectures are pushing this to the
extreme of microsegmenting their internal networks, which enforces frequent re-authentication Network segmentation is also an effective way to achieve defense in depth for distributed or
of a user ID. multi-tiered applications. The use of a demilitarized zone (DMZ), for example, is a common
practice in security architecture. With a DMZ, host systems that are accessible through the firewall
Zero trust is an evolving design approach which recognizes that even the most robust access are physically separated from the internal network by means of secured switches or by using an
control systems have their weaknesses. It adds defenses at the user, asset and data level, rather additional firewall to control traffic between the web server and the internal network. Application
than relying on perimeter defense. In the extreme, it insists that every process or action a user DMZs (or semi-trusted networks) are frequently used today to limit access to application servers to
attempts to take must be authenticated and authorized; the window of trust becomes those networks or systems that have a legitimate need to connect.
vanishingly small.
Segmentation for Embedded Systems and IoT
While microsegmentation adds internal perimeters, zero trust places the focus on the assets, or
data, rather than the perimeter. Zero trust builds more effective gates to protect the assets Network-enabled devices are any type of portable or nonportable device that has native
directly rather than building additional or higher walls. network capabilities. This generally assumes the network in question is a wireless type of
network, typically provided by a mobile telecommunications company. Network-enabled devices
Network Access Control (NAC) include smartphones, mobile phones, tablets, smart TVs or streaming media players, network-
attached printers, game systems, and much more.
We need to be able to see who and what is attempting to make a network connection. At one
time, network access was limited to internal devices. Gradually, that was extended to remote The Internet of Things (IoT) is the collection of devices that can communicate over the internet
connections, although initially those were the exceptions rather than the norm. This started to with one another or with a control console in order to affect and monitor the real world. IoT
change with the concepts of bring your own device (BYOD) and Internet of Things (IoT). devices might be labeled as smart devices or smart-home equipment. Many of the ideas of
industrial environmental control found in office buildings are finding their way into more
Considering just IoT for a moment, it is important to understand the range of devices that might
consumer-available solutions for small offices or personal homes.
be found within an organization.
Embedded systems and network-enabled devices that communicate with the internet are
The organization’s access control policies and associated security policies should be enforced via
considered IoT devices and need special attention to ensure that communication is not used in a
the NAC device(s). Remember, of course, that an access control device only enforces a policy
malicious manner. Because an embedded system is often in control of a mechanism in the physical
and doesn’t create one.
world, a security breach could cause harm to people and property. Since many of these devices
The NAC device will provide the network visibility needed for access security and may later be have multiple access routes, such as ethernet, wireless, Bluetooth, etc., special care should be taken
used for incident response. Aside from identifying connections, it should also be able to provide to isolate them from other devices on the network. You can impose logical network segmentation
isolation for noncompliant devices within a quarantined network and provide a mechanism to “fix” with switches using VLANs, or through other traffic-control means, including MAC addresses, IP
the noncompliant elements, such as turning on endpoint protection. In short, the goal is to ensure addresses, physical ports, protocols, or application filtering, routing, and access control
that all devices wishing to join the network do so only when they comply with the requirements management. Network segmentation can be used to isolate IoT environments.
laid out in the organization policies. This visibility will encompass internal users as well as any
temporary users such as guests or contractors, etc., and any devices they may bring with them into Microsegmentation
the organization.
The toolsets of current adversaries are polymorphic in nature and allow threats to bypass static
Let’s consider some possible use cases for NAC deployment: Medical devices; IoT devices; security controls. Modern cyberattacks take advantage of traditional security models to move
BYOD/mobile devices (laptops, tablets, smartphones); Guest users and contractors; easily between systems within a data center. Microsegmentation aids in protecting against these
threats. A fundamental design requirement of microsegmentation is to understand the protection
requirements for traffic within a data center and traffic to and from the internet traffic flows.
When organizations avoid infrastructure-centric design paradigms, they are more likely to become
more efficient at service delivery in the data center and become apt at detecting and preventing
advanced persistent threats.
27 of 27 12/16/2023, 9:05 PM