Unit 7 & 8 Info Sec Controls
Unit 7 & 8 Info Sec Controls
1. Logical Controls
Logical Controls
Traditional Firewalls
Packet-Filtering Techniques
Application Proxies
q Static NAT
When the local address is converted to a public one, this NAT chooses
the same one. This means there will be a consistent public IP address
associated with that router or NAT device.
q Dynamic NAT
Instead of choosing the same IP address every time, this NAT goes
through a pool of public IP addresses. This results in the router or NAT
device getting a different address each time the router translates the
local address to a public address.
q PAT
PAT stands for port address translation. It’s a type of dynamic NAT, but it
bands several local IP addresses to a singular public one. Organizations
that want all their employees’ activity to use a singular IP address use a
PAT, often under the supervision of a network administrator.
PORT ADDRESS TRANSLATION
q PAT is an extension of NAT that permits multiple devices on a LAN to be mapped to a single public IP address to
conserve IP addresses.
q PAT is similar to port forwarding except that an incoming packet with destination port (external port) is translated to a
packet different destination port (an internal port). The Internet Service Provider (ISP) assigns a single IP address to the
edge device. When a computer logs on to the Internet, this device assigns the client a port number that is appended to
the internal IP address, giving the computer a unique IP address.
q If another computer logs on the Internet, this device assigns it the same public IP address, but a different port number.
Although both computers share the same public IP address, this device knows which computer to send its packets,
because the device uses the port numbers to assign the packets the unique internal IP address of the computers.
q With Port Address Translation (PAT), a single public IP address is used for all internal private IP addresses, but a
different port is assigned to each private IP address. This type of NAT is also known as NAT Overload and is the typical
form of NAT used in today’s networks. It is even supported by most consumer-grade routers.
q PAT allows you to support many hosts with only few public IP addresses. It works by creating dynamic NAT mapping, in
which a global (public) IP address and a unique port number are selected. The router keeps a NAT table entry for every
unique combination of the private IP address and port, with translation to the global address and a unique port
number.a
PORT ADDRESS TRANSLATION
OTHER EXAMPLES OF LOGICAL CONTROLS
q Access Control: Access control mechanisms are a fundamental part of logical controls. They
ensure that only authorized individuals or entities can access and interact with information
resources. Access control can be implemented through various means, such as:
§ User Authentication: Usernames, passwords, PINs, or biometric authentication methods (fingerprint,
facial recognition) are used to verify the identity of users before granting access to systems or data.
§ Authorization: Once users are authenticated, authorization determines their level of access rights or
privileges based on their roles or permissions within the system. Role-based access control (RBAC) is
a common method for managing user access privileges.
§ Access Control Lists (ACLs): ACLs define specific permissions or restrictions for individual users or
groups to access or perform certain actions on files, folders, or resources.
§ Single Sign-On (SSO): SSO allows users to authenticate once and access multiple systems or
applications without needing to provide credentials repeatedly.
OTHER EXAMPLES OF LOGICAL CONTROLS
q Secure Configuration Management: Logical controls also involve ensuring that systems and software are securely
configured to minimize vulnerabilities. This includes:
§ Patch Management: Regularly applying security patches and updates to operating systems, applications, and firmware to address
known vulnerabilities.
§ Secure Default Settings: Configuring systems and software with secure default settings and disabling unnecessary or insecure
services or features.
§ Security Configuration Baselines: Defining and implementing security configuration baselines for various systems and platforms,
following industry best practices or standards.
q Encryption: Encryption is a crucial logical control that protects data confidentiality. It involves transforming data into
an unreadable form using cryptographic algorithms. Only authorized individuals with the corresponding decryption
keys can access and interpret the encrypted data. Examples of encryption techniques include:
§ Symmetric Encryption: A single key is used for both encryption and decryption. It is typically faster but requires secure key
management.
§ Asymmetric Encryption: Two keys, a public key for encryption and a private key for decryption, are used. This method offers
secure key exchange and digital signatures.
OTHER EXAMPLES OF LOGICAL CONTROLS
q Logging and Auditing: Logging and auditing controls involve the systematic recording and analysis of
system and user activities. This includes:
§ Event Logging: Capturing and storing system logs, including user activities, authentication events, system
events, and network traffic logs.
§ Log Monitoring: Analyzing log data to detect security incidents, identify anomalies, and support forensic
investigations.
§ Regular Auditing: Conducting periodic audits to ensure compliance with security policies, detect
unauthorized activities, and assess the effectiveness of security controls.
PHYSICAL CONTROLS
q Physical security is a set of measures designed to prevent unauthorized access to a
facility, building, or location and protect against damage or harm to people and assets
within that location. It involves the use of various techniques and technologies to secure
the perimeter of a location, as well as to protect against intrusions and attacks.
q Physical security controls include such things as data center perimeter fencing, locks,
guards, access control cards, biometric access control systems, surveillance cameras, and
intrusion detection sensors.
q Every company with computers has a network and data to protect. These are super
essential, but intangible things that only exist as bytes on a wire or disk. But what about
the rest of the company's physical assets, the stuff? Property, buildings, equipment,
furniture, paperwork, snacks, all the physical things that make up any company's sum
total of assets.
q IT is always concerned with protecting the network, data, and access, but the best
infosec policies, and firewalls, are nothing if someone can get into your building, steal
desktops, paperwork, or even servers. Also, gaining network access is a whole lot easier
if you can just bypass the firewall and plug straight into a network port, so physical
security and infosec are directly related. Physical security controls are the individual
layers of protection that reduce risk to the organization's physical assets.
EXAMPLES OF PHYSICAL CONTROLS