0% found this document useful (0 votes)
192 views46 pages

Sy0-701 - Lesson 05

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
192 views46 pages

Sy0-701 - Lesson 05

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 46

CompTIA Security+ Exam SY0-701

ARCHITECTURE DE SECURITE

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


1
CONTENT
• Secure Enterprise Network Architecture
• Secure cloud Network Architecture
• Explain Resiliency and site recovery

2
CompTIA Security+ Exam SY0-701

Lesson 5
Maintain Enterprise Campus Network
Architecture

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


3
Objectives
• Compare and contrast security implications of different on-premises
network architecture models
• Apply security principles to secure on-premises network
architecture
• Select effective controls to secure on-premises network architecture
• Ensure secure communications for remote access and tunneling

4
Lesson 5

Topic 5A
Enterprise Network Architecture

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


5
Architecture and Infrastructure Concepts

6
Objectives

Quelques Moins de Campus ou ouvert


métres 100m ville
Wired - USB - Ethernet - FDDI, 802.7 DSL
- Firewire - Token Ring, - ATM
802.5
- CPL
Wireless - IR; - Wifi, - Wimax, - GSM
- Bluetooth, 802.11 802.16 - Edge
802.15 - Hyperlan - GPRS
- HomeRF - UMTS
- ZigBee
- 5G

7
Architecture and Infrastructure Concepts

8
Switching Infrastructure Considerations
• Topology of nodes and links
• Physical versus logical

• On-premises networks
• Office/campus

• Structured cabling

• Hierarchical design
• Limit size of broadcast domains

• Enforce segmentation
Images © 123rf.com.
9
Architecture and Infrastructure Concepts

10
Architecture and Infrastructure Concepts

11
Architecture and Infrastructure Concepts

12
Architecture and Infrastructure Concepts

13
Architecture and Infrastructure Concepts
• Selection and placement
• Infrastructure (media, appliances, addressing/forwarding for connectivity)

• Applications/services

• Data

• Workflows
• Access

• Email mailbox server

• Mail transfer server


14
Network Infrastructure

Images © 123rf.com.

15
Routing Infrastructure Considerations
• Layer 3 logical segmentation
• Networks and subnetworks (subnets)

• Internet Protocol (IP)


• IPv4 and IPv6
• Network prefix/subnet mask

• Virtual LAN (VLAN)


• Map layer 2 switch port topology to
layer 3 IP subnet topology
• Makes logical topology independent of
port location on physical switches
16
Security Zones
• Segment containing hosts with
same access control/security
requirements
• Public versus private
• Database and file servers
• Compartmentalize different types
of data assets
• Client devices
• Public-facing app servers
• Network infrastructure servers
17
Attack Surface
• Points at which threat actor can gain access
• Layer 1/2 versus layer 3 versus layer 4/7

• Defense in depth and layered security controls


• What problems arise from weaknesses in the network design/architecture?
• Single points of failure
• Complex dependencies
• Availability over confidentiality and integrity
• Lack of documentation and change control
• Overdependence on perimeter security
18
Port Security
• Physical port security and administratively
disabled ports
• MAC filtering and limiting
• 802.1X, EAP, and RADIUS
• Supplicant (user’s computer)
• Authenticator/RADIUS client (switch)
• Authentication/RADIUS server
• IEEE 802.1X allows switches to implement EAP over
LAN (EAPoL)
• Extensible Authentication Protocol (EAP) provides
framework for authentication methods/factors
• Remote Authentication Dial-in User Service
(RADIUS) allows use of a directory of user accounts
and credentials
19
Physical Isolation
• Single host or group of hosts not connected to any other network
• Air gapped

• Difficult to manage
• Updates via media devices

20
Architecture Considerations (1)
• Cost
• Upfront capital cost and loss of value through depreciation
• Ongoing maintenance and support

• Compute and responsiveness


• Reduce workload processing time

• Scalability and ease of deployment


• Minimize costs associated with increasing (or decreasing) workloads

21
Architecture Considerations (2)
• Availability
• Minimize downtime

• Resilience and ease of recovery


• Reduce time taken to recover from failures

• Power
• Costs of high compute resources and reliability of infrastructure

• Patch availability
• Mitigate vulnerabilities
• Inability patch due to third-party management or lack of vendor support

• Risk transference
• Contracting infrastructure to third-parties
22
Review Activity: Enterprise Network Architecture
• Architecture and infrastructure concepts
• Media, applications/services, data supporting workflows

• Network infrastructure
• OSI layer model

• Switching and routing infrastructure considerations


• Security zones and attack surface
• Port security and physical isolation
• MAC filtering, 802.1X/EAP/RADIUS

• Architecture considerations
• Cost, compute/responsiveness, scalability/ease of deployment, availability, resilience/ease of recovery,
power, patch availability, risk transference
23
Lesson 5

Topic 5B
Network Security Appliances

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


24
Device Placement
• Selection of effective controls
• Enforce segmentation, apply
access controls, monitor traffic

• Defense in depth
• Zone border (mostly preventive)
• Within zone (mostly detective)
• Endpoint controls (preventive,
detective, and corrective)

25
Device Attributes
• Active versus passive
• Passive controls don’t require hosts to be configured
to use them (and might not be detectable by hosts)
• Active controls require host configuration or
software agents

• Inline versus tap/monitor


• Inline is installed as part of cable path (“bump-in-
the-wire”)
• Switched port analyzer (SPAN) or mirror port
• Test access point (TAP)

• Fail-open
• Preserves access on fail to prioritize availability

• Fail-close
• Prevents access on fail to priorities
confidentiality/integrity 26
Firewalls
• Enforce a network access control list (ACL)
• Packet filtering inspects headers only
• Source and destination IP address
• Protocol ID/type (TCP, UDP, ICMP, routing
protocols, and so on)
• Source and destination port numbers (TCP or
UDP application type)
• Drop/deny/reject or accept/permit a packet
(and/or log)
• Inbound, outbound, or both

• Placement and attributes


• Routed, bridged, or inline placement
• Firewall appliance versus router firewall
27
Layer 4 and Layer 7 Firewalls
• Stateful inspection validates connections
• State table stores connection
information

• Transport layer (layer 4)


• TCP handshake
• New versus established and related
connections

• Application layer (layer 7)


• Validate protocol and match threat signatures
• Application layer gateway, stateful multilayer
inspection, or deep packet inspection
Screenshot used with permission from Rubicon Communications, LLC

• Application-specific filtering
28
Proxy Servers
• Forward proxy server
• Proxy opens connections with external
servers on behalf of internal clients
• Application-specific filters
• Non-transparent and transparent
proxies
• User authentication

• Reverse proxy server


• Proxy opens connections with internal
servers on behalf of external clients

29
Intrusion Detection Systems
• Sensor captures traffic
• Placement
• Inline versus mirror/tap/monitor

• Intrusion Detection System (IDS)


• Detection engine performs real-time
analysis of indicators
• Passive logging/alerting

• Intrusion Prevention System (IPS)


• Active response (block, reset, redirect)
Screenshot Security Onion
• Inline response versus integration with securityonion.net
other security tools
30
Next-generation Firewalls and Unified Threat Management
• Next-generation firewall
• Application-aware filtering, user account-based filtering, IPS, cloud
inspection, …

• Unified threat management (UTM)


• Combining security controls into single agent and management platforms
• Firewall, anti-malware, network intrusion prevention, spam filtering, content
filtering, data loss prevention, VPN, cloud access gateway, …

31
Load Balancers
• Distributes requests across farm or pool of
servers (nodes)
• Layer 4 load balancer
• Layer 7 load balancer (content switch)

• Scheduling
• Round robin
• Fewest existing connections / best response
time
• Weighting
• Heartbeat and health checks
Images © 123rf.com.

• Source IP affinity
• Session persistence
32
Web Application Firewalls
• Able to inspect code in HTTP
packets
• Matches suspicious code to
vulnerability database
• Can be implemented as
software
on host or as appliance

Screenshot used with permission from Microsoft.


33
Review Activity: Network Security Appliances
• Device placement
• Defense in depth plus use of preventive, detective, and corrective controls

• Device attributes
• Active versus passive, inline versus TAP/monitor, fail-open versus fail-closed

• Firewalls (layer 4/7)


• Proxy servers
• Intrusion detection systems
• Next-generation firewalls and unified threat management
• Load balancers
• Web application firewalls
34
Lesson 5

Topic 5C
Virtual Private Networks

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


35
Remote Access Architecture (1)

Images ©
123RF.com.
36
Remote Access Architecture (2)

Images ©
123RF.com.

37
Transport Layer Security Tunneling
• Use TLS to negotiate a secure
connection
• Machines authenticated by PKI
certificates
• Mutual authentication allows VPN
gateway to authenticate client
certificates
• User account authentication via
RADIUS

• Tunnel network traffic over TLS Screenshot used with permission from Rubicon Communications,
LLC.

• Can use TCP or UDP


38
Internet Protocol Security Tunneling
• Provides confidentiality and/or integrity
• Authentication Header (AH)
• Signs packet but does not encrypt payload

• Provides authentication/integrity only

• Encapsulation Security Payload (ESP)


• Provides confidentiality and/or
authentication/integrity

• Modes
• Transport mode for host-to-host connections
on a private network
• Tunnel mode between gateways across an
unsecure network
Screenshot used with permission from Rubicon Communications,
LLC. 39
Internet Key Exchange
• Establishes Security Association (SA)
between peers
• Phase I provides authentication
• PKI/certificates
• Pre-shared key

• Phase II establishes cipher suites


and key sizes and use of AH or ESP
• IKE v1 supports host-to-host and site-to-
site tunneling
• IKE v2 adds better support for client-to-
site remote access VPN
Screenshot used with permission from Rubicon Communications, 40
Remote Desktop
• GUI-based remote terminal software
• Remote Desktop Protocol (RDP)
• Connect to physical machines
• RDP gateway to virtual desktops and apps

• HTML5/clientless
• Access desktops and web applications from Internet via gateway to internal
network
• Browser support for canvas element plus WebSockets
41
Secure Shell
• Remote administration with public key
cryptography security
• Host key identifies server
• Client authentication
• Username/password
• Public key authentication
• Kerberos

• Key management
• SSH commands

Screenshot used with permission from


• ssh versus scp (Secure Copy)
PuTTY. 42
Out-of-band Management and Jump Servers
• Secure admin workstations (SAWs)
• Out-of-band (OOB) management
• Serial/modem/console port
• Virtual terminal
• Separate cabling or VLAN isolation

• Jump servers
• Single host accepts SSH or RDP
connections from SAWs
• Forwards connections to app servers
• App servers only accept connections from
jump server Images © 123rf.com.
43
Review Activity: Virtual Private Networks
• Remote access architecture
• Tunneling, client-to-site remote access VPN, site-to-site VPN

• Transport Layer Security (TLS) tunneling


• Internet Protocol Security (IPSec) tunneling
• Internet Key Exchange
• Remote Desktop
• Secure Shell
• Out-of-band management and jump servers
44
Lab Activity
• Assisted Lab: Setting up Remote Access
• Assisted Lab: Using IPSec Tunneling

45
CompTIA Security+ Exam SY0-701

Lesson 5
Summary

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


46

You might also like