Network Security Best Practices
Network Security Best Practices
Best Practices
Robust network security best practices are more important than ever to protect against today’s increasingly
sophisticated cyber threats. This article explores a range of network and security best practices and technologies
you need to fortify your network against unauthorized access and data breaches.
▪ Bridges were once used to connect two or more hosts or network segments. They are outdated and no longer used.
▪ Hubs were once used to connect local area network (LAN) devices. Because they have no built-in intelligence,
hubs are seldom used in modern network setups.
▪ A network switch is the default network appliance connecting computers, servers, printers and other devic-
es in a LAN. It uses MAC addresses to manage and forward data to specific devices. Unlike a hub, a switch can
intelligently direct traffic to reduce network congestion and improve network performance.
▪ A network router directs data packets between different networks to facilitate internet connectivity and
internal network communication. Routers use IP addresses to determine the most efficient path for data
packet transmission across networks. They can also provide security features like access control lists to re-
strict network access.
▪ A gateway serves as an intermediary for devices on separate networks, enabling them to communicate even
if they are using different communication protocols.
▪ A firewall segregates one network from another. Firewalls are available in hardware and software form and
can be integrated into devices like routers or servers. The classic example of a firewall is a dedicated appliance
that serves as a barrier between the internal network and the outside world.
▪ A network access control (NAC) system assesses whether devices trying to access the network meet defined
security standards (such as up-to-date antivirus software, system updates and specific configuration settings)
and then grants or denies access.
▪ A web filter restricts access to internet content based on predefined criteria. For instance, this type of secu-
rity solution can block access to malicious or inappropriate websites as defined by an organization’s policies.
▪ A proxy server acts as an intermediary between a user’s device and the internet. Proxy servers can mask the
user’s IP address as well as filter web requests to block access to malicious sites or content.
▪ An email filter (spam filter) helps prevent unwanted emails from reaching the user’s inbox altogether, or
delivers the email but removes potentially malicious hyperlinks and attachments. Simple filters use organiza-
tional policies or vendor-specified patterns to detect spam; advanced filters employ heuristic methods to spot
suspicious patterns or word frequency.
▪ DDoS mitigation tools are designed to identify distributed denial of service (DDoS) attacks in their early
stages, absorb the associated surge in traffic and help pinpoint the attack’s origin.
▪ Load balancers contribute to network security by evenly distributing network traffic across multiple servers.
For instance, they can help prevent any single server from becoming overloaded during a DDoS attack.
For more background information, review the OSI model for network systems in Appendix A.
In particular, organizations can set up a demilitarized zone (DMZ) to serve as a buffer between its internal network
and the internet or other untrusted networks. The DMZ hosts external-facing services like web application serv-
ers; if these services are compromised, an attacker does not have direct access to the internal network.
An extreme form of segmentation is the air gap, where systems (such as servers with backups or other sensitive
information) are entirely disconnected from the network.
firewalls is especially important. Ideally, a firewall should be situated at each network zone junction to serve as a
barrier between different segments. Modern firewalls often come with integrated features like intrusion detection
and prevention systems, DDoS mitigation, and web filtering, making them highly suitable for perimeter defense.
Web application firewalls (WAFs) are best placed in zones where applications are hosted, such as the DMZ. This
placement helps protect web applications from threats like SQL injection and cross-site scripting. Load balancers
that manage application traffic or DNS servers should also be located within the DMZ to optimize traffic flow and
improve security.
Configuring personal firewalls can initially be time-intensive due to the variety of applications and services running
on a device. However, forgoing this step for convenience can leave devices vulnerable to malware and hacking.
Always enable personal firewalls to ensure each device’s security within the broader network.
However, whitelisting is not always practical, since the list must be kept updated with all applications that anyone
in the organization has a legitimate reason to run.
Use a web proxy server to manage internet access.
By authenticating and monitoring outbound connections, a web proxy server helps ensure that only web traffic
initiated legitimate users is allowed. For example, this helps prevent malware inside the network from communi-
cating with the attacker’s command and control server.
These tools can be a valuable part of your network security strategy. For example, by comparing current activity
to an established baseline, they could spot a spike in network activity that could indicate a ransomware or SQL
injection attack. They can also use attack signatures — characteristic features common to a specific attack or
pattern of attacks — to spot attacks that don’t generate activity that violates your organization’s baseline.
▪ Block IP address — An IPS or firewall can block the IP address from which the attack originated. This option
is very effective against phishing and denial-of-service attacks. However, some attackers spoof the source IP
address during attacks, so the wrong address will be blocked.
▪ Terminate connections — Routers and firewalls can be configured to disrupt the connections that an intruder
maintains with the compromised system by targeting RESET TCP packets at the attacker.
▪ Acquire additional information — Tools can also collect valuable information that help determine such the
point of initial access, which accounts were compromised, how the intruders moved across the network and
what data was compromised.
Bonus best practice
A final network security best practice applies across both threat prevention and detection & response.
Using solutions from different vendors bolsters cyber resilience by reducing the risk associated with a single point
of failure — if a solution from one vendor is compromised, the presence of solutions from other vendors helps
maintain the defensive shield. This approach also enables greater adaptability in response to evolving threats and
security requirements. More broadly, it can lead to competitive pricing and drive innovation, as vendors strive to
offer the most advanced and cost-effective solutions.
Conclusion
By adhering to the network security best practices detailed here, your organization can reduce the risk of costly
business disruptions and security incidents, as well as ensure compliance with today’s strict legislative mandates.
Appendix A: The OSI Model
The OSI (Open Systems Interconnection) model is an established framework for network systems. It comprises
seven layers, from physical hardware to application-level interactions:
3: Network Performs packet routing Router IP, OSPF, ICMP, RIP, ARP,
RARP
Next Steps
Free Trial — Set up Netwrix software in your own test environment: netwrix.com/freetrial