Security Architecture
Security Architecture
SECURITY
ARCHITECTURE
Barbara Krašovec
TABLE
of contents
Trusted
Untrusted
IDENTIFY
RECOVER
Understand the system and its
Update security policies, and
operation, the context and
procedures, and prepare RECOVER
potential risks.
guidelines, and documentation. IDENTIFY
SECURITY
PREVENT
RESPOND RESPOND DESIGN
Apply security controls to
Respond to security incident, PREVENT prevent the risk. Harden and
investigate system, run analysis, isolate systems.
and inform stakeholders.
DETECT
DETECT
Provide continuous monitoring
and logging to detect anomalies.
RISK - Focus of security
Ingredients of Happiness
Impact
Vulnerability Threat
Threat modelling
Strategically thinking about what can go wrong.
IDENTIFY
SET OBJECTIVES PLAN MITIGATE AUDIT
THREATS
What do we want to What are we How to prevent Did we succed in
What can go
accomplish? deploying? threats? previous steps?
wrong?
FUNDAMENTAL SECURITY
PRINCIPLES
Defence-in-depth Zero trust Least privileges Separation of CIA triad
duties
Multiple layers of No person, device or Only services and people SPOC - no single point of Cybersecurity is the
protection, if a level of service can automatically that need permissions, control, a single person protection of
protection fails, the be trusted. will get them. cannot do a compromise. Confidentiality, Integrity
subsequent level will and Availability of
prevent an attack. information in the
system.
Defence-in-depth
Any layer of
protection might fail
Integration of defence-in-depth means that multiple
levels of protection must be deployed and different
types of security controls (organisational, technical
etc.)
A single magical solution doesn’t exist.
An example: MFA + patches + firewall + IDS +
automatic penetration tests + data encryption
Zero trust
No asset or user is trusted.
You don’t automatically believe everything inside your firewall can be trusted.
All users should be authenticated (in or outside of an organisation network) - MFA if
possible.
Key principles: continuous verification, minimising the impact of a compromise if it
occurs, and granting access only if it is really needed.
The focus is on protecting resources, not network segments
See NIST SP 800-207: https://csrc.nist.gov/pubs/sp/800/207/final
Least privilege
The principle of least
privilege (POLP)
Access rights are not permanent. access means
Revise assigned privileges regularly.
granting a minimum
Hardening hosts is part of this approach
level of access rights
too: delete default accounts, and
to users and services
uninstall/disable services that are installed
to perform their
by default but not needed.
Don’t give users privileges on a “just-in-
jobs.
case” you need them basis.
Separation of duties
No single point of control
:
QUIZ
Web server is down when trying to access a website. Is this the loss of:
integrity
availability
confidentiality
To access her mailbox, Alice has to use the company’s VPN and log in with her
username and password and OTP. Is this implementation of:
defence-in-depth principle
zero trust principle
separation of duties principle
Security architect
Security architect works to design, build, test, and implement security systems withing an organisation.
1 3
Define objectives Create security solution architecture
Based on risk assessment, security architect Development of Security Solution Architecture
defines the objectives of the information system.
2 4
Create architecture plan Detect anomalies and revise
Preparation of reference architecture, definition of Monitor the system, audit it, and review the
the approach and required security controls procedures, policies, and controls. Based on the
(topology diagram, definition of processes etc.) results, revise the architecture framework and
security controls.
Role of security architect Core tasks
architecture 2
Understand how a system works and how
it can fail, what are the critical services,
what is the highest risk, what are the
threats.
Security should be included in Prepare policies and system design
the process from start to finish, Based on the risk assessment, prepare
3
from design to production. security controls, policies, procedures.
You cannot do security when
Implement and review
the service is in production, as
Prepare the system, implement it. After
you cannot build an earthquake the implementation, monitor the system
proof builing after it is already 4 to detect anomalies and prevent
built. cybersecurity attacks. Constantly improve
the procedures and controls.
Security models
https://www.iso.org/standards.html
ISO 27001
Specification of Information Security Management System
(ISMS)
Security controls structure: Organisational, physical, and
technological controls
Controls’ attributes are either Preventive, Detective or
Corrective.
The new version released in 2022 - includes new security
controls (threat intelligence, security for use of cloud
services, business continuity, physical security monitoring,
data deletion/masking and leaking prevention, web filtering,
configuration management and secure coding. Source: Advisera
https://www.nist.gov/itl/smallbusinesscyber/planning-guides/nist-cybersecurity-framework
NIST CSF
NIST helps you answer the following questions:
How to categorise and protect your data?
How to conduct risk assessments?
How to prepare a security plan?
How to implement security controls?
How to measure performance and efficiency?
How to process data?
https://www.nist.gov/cybersecurity
CIS controls
known also as Critical Security Controls,
developed by Center for Internet security,
contain a set of actions for system cyber defense.
CIS controls are used to identify common exploits,
they provide recommendations on how to defend (safeguards),
are measurable,
each safeguard has a description (for small office, for large organization with IT, for
organization with security expert group).
See: https://www.cisecurity.org/
CIS controls
Source: https://www.sans.org/blog/cis-controls-v8
CIS benchmarks
How to translate a CIS safeguard
to action - configuration guidelines
See: https://www.isa.org/standards-and-publications/isa-standards
ISA
Cyber Security Kill Chain
Cyber Security Kill Chain Intrustion model
explains the typical procedure that hackers
take when performing a successful cyber
attack. Developed by Lockheed Martin and
is derived from military attack models
Source: www.csoonline.com
Mittre Att&ck
security framework,
KB for cyber adversary behaviour based on real-world observations,
used by cybersecurity professionals to understand, analyze, and defend against cyber threats,
useful to plan for security improvements,
useful to understand security risks against known adversary behaviour.
Fire,
water damage, tempering,
destruction of equipment, disclosure,
earthquakes, unauthorised use,
failure of air conditioning, corruption of stored data
loss of power supply, theft
remote spying, etc.
eavesdropping,
Physical security by ISO27k
ISO27001 includes the following categories of physical and environmental security controls:
Secure areas (including virtual/cloud): walls, card-controlled entry gates, physical security for offices, data
centres, protection against flood, fire, and earthquake, access control for secure areas, IAM etc.
Physical entry controls: CCTV surveillance, security guards, protective barriers, locks, perimeter intrusion
detection, policy on visitor management process etc.
Equipment security: protected from power failures, unauthorised usage, fire protection, clear policies for
removable storage media, and policies on data removal that are saved on the equipment.
Reuse of equipment: clear policy on data erasure and destruction
Protection against environmental threats: controls for monitoring environmental conditions, such as
temperature, humidity, air quality
Hardware Security
Hardware security includes:
secure hardware design,
access controls,
secure procurement process,
Hardware must be protected from physical and environmental threats
secure supply chain (shipping,
and from opportunities for unauthorised access.
credentialing of all involved
participants etc.), Place sensitive equipment in a well-protected zone
maintenance, Monitor and restrict access to the equipment, both physical access
security of hardware off- and software-based access.
premises. Disable unused interfaces (physically, in BIOS, from OS) or
configure them in a restrictive manner, e.g. USB device whitelisting.
Power and communication cables must be protected
QUIZ
Main problem:
TO GET THE WHOLE PICTURE
many network devices are not kept up
Conceptual network design includes the identification of
to date
all core components of the network architecture, to have
an overview of what the purpose of the network is. many network devices are accessible
from external network
Understanding the threats to your system is crucial. many network devices are accessible
What are the attack methods? And what are the via a password
attacker’s objectives? Where is your critical data? Who network is not segmented, critical
has access to it?
services are not isolated.
Network design
NETWORK TOPOLOGY Network segmentation means that we split the
PHYSICAL: how the nework is connected, how the data flows network into multiple segments/sub-networks by
LOGICAL: how services communicate, which protocols are used. using firewalls, VLANs, access controls or SDN.
https://www.zenarmor.com/docs/network-basics/network-segmentation
Common network segments
PUBLIC NETWORK - Internet, not under control of an
organisation
DMZ NETWORK - semi-public network, services that need
access to the internet (web, mail, DNS etc.)
MIDDLEWARE NETWORK - used to separate DMZ from
private network (filtered access, proxy servers),
PRIVATE NETWORK - internal services (sensitive information)
- only access from middleware network is possible
DETECTION
IDS - Intrusion detection system
Firewall
Benefits Shortcomings
it enforces organisation’s security policy they cannot prevent attacks on
it protects systems from incoming and applications
outgoing attacks encrypted traffic (e.g. VPN) might bypass
ingress and egress traffic filtering it
filtering communication based on content organisation sees firewall as sufficient
it encrypts communication security control
in stores logs about successful and if the traditional approach is in use, they
blocked traffic represent a single point of failure
in increases privacy
A firewall is just one of the technological security controls. To be secure, an organisation has to
apply a defence-in-depth principle, implementing multi-layer security. If one control fails, another
one is still in place to prevent a compromise.
Intrusion detection system
NIDS = network IDS VARIANTS of
serves as a detection system, it checks network traffic DETECTION:
IDS can be seen as an alarm system, not as a firewall anomaly detection (relies on AI, it
reports attacks against monitored systems understands what normal traffic is and
reports anomalies)
the alerts that are sent, are revised by human
signature-based detection (detection of bad
it is deployed as a passive sniffer, captures traffic, detects patterns, malware) - has a db of patterns
events of interest and sends alerts reputation-based detection (reports
it is placed in different points in the network security events based on a reputation score
IPS =! FIREWALL
A firewall allows or denies traffic based on ports or the source/destination
addresses. IPS compares traffic patterns to signatures and allows or drops
packets based on any signature matches found.
How IPS detects threats?
EXAMPLES:
Arbor Edge Defense (AED) is an
inline security appliance deployed
Network Attack
at the network perimeter (i.e.
between the internet router and mitigation software
network firewall).
F5 Silverline DDoS prevention
Radware Defense pro
Usually, physical appliances, deployed
between router and network firewall,
commercial solutions. Prevent DDoS attacks
(blackholes, scrubbing), brute force attacks,
syn flood attacks etc.
NETWORK SECURITY POLICIES
A network security policy (NSP) is a generic document that outlines rules for
computer network access, determines how policies are enforced and lays out some
of the basic architecture of the company security/ network security environment.
(Redhat)
Useful security policies for your network:
Account Management
policies should be defined because they make us Password policy
aware of how the system normally performs and E-Mail policy
Security Incident Management
what is allowed. Log Management
policies can be enforced by firewalls, proxies, VPN Acceptable Use
Server Security
IDS/IPS, and ACLs on switches/routers, on the
Bring Your Own Device (BYOD) Agreement
application level. Patch Management
Systems Monitoring And Auditing
Remote work policies
Vulnerability Management
Workstation Configuration Security
IPv6 SECURITY
Organisations are transitioning to IPv6. Security considerations IPv6 uses 128-bit internet addresses, it can
encompass: support 2^128 internet addresses. The
issues due to the IPv6 protocol itself, number of IPv6 addresses is 1028 times
o issues due to transition mechanisms, and larger than the number of IPv4 addresses
o issues due to IPv6 deployment.
See https://datatracker.ietf.org/doc/html/rfc4942
TLS, SSL
IPSec
Which access mode should be disabled on network devices, because it sends username and
password in plain text?