Module 11 Designing Security for Network Perimeters Overview

  • Slides: 13
Download presentation
Module 11: Designing Security for Network Perimeters

Module 11: Designing Security for Network Perimeters

Overview Creating a Security Plan for the Perimeter of a Network Creating a Design

Overview Creating a Security Plan for the Perimeter of a Network Creating a Design for Security of Network Perimeters

Lesson 1: Creating a Security Plan for the Perimeter of a Network MSF and

Lesson 1: Creating a Security Plan for the Perimeter of a Network MSF and Security of Network Perimeters Defense in Depth and Security of Network Perimeters Resources to Protect with Network Perimeters Security STRIDE Threat Model and Security of Network Perimeters

MSF and Security of Network Perimeters The MSFwhich envisioning and planning Decide locations your

MSF and Security of Network Perimeters The MSFwhich envisioning and planning Decide locations your plan willphases help to help you to: protect Ensure that appropriate countermeasures are applied Identify your perimeter points. These can include: Direct Internet connections Envisio n Dedicated WAN links Perimeter Networks 5 Plan VPN client computers Applications Wireless connections 4 3

Defense in Depth and Security of Network Perimeters Policies, Procedures, and Awareness Physical Security

Defense in Depth and Security of Network Perimeters Policies, Procedures, and Awareness Physical Security Perimeter Internal Network Host Application Data

Resources to Protect with Network Perimeters Security Attacker External Internal Threat Information disclosure Denial

Resources to Protect with Network Perimeters Security Attacker External Internal Threat Information disclosure Denial of service Example An attacker runs a series of port scans on a network and creates a network diagram and vulnerability list. The attacker uses this information to systematically attack the network. An employee opens an e-mail from an external Web-based e-mail account that contains a new worm virus. The virus infects the internal network from inside the perimeter.

STRIDE Threat Model and Security of Network Perimeters Spoofing Exposure of account information Tampering

STRIDE Threat Model and Security of Network Perimeters Spoofing Exposure of account information Tampering Unauthorized access to data Repudiatio n Unmanaged VPN client computers Informatio n disclosure Denial of service Elevation of privilege Forgotten connections to the Internet E-mail worms Unauthorized Web servers

Lesson 2: Creating a Design for Security of Network Perimeters Methods for Securing Network

Lesson 2: Creating a Design for Security of Network Perimeters Methods for Securing Network Perimeters Process for Designing Secure Perimeter Networks Methods for Securing Perimeter Networks Guidelines for Protecting Computers on the Perimeter

Methods for Securing Network Perimeters Type Bastion host Three-pronged configuration Back-to-back configuration Description

Methods for Securing Network Perimeters Type Bastion host Three-pronged configuration Back-to-back configuration Description

Process for Designing Secure Perimeter Networks When designing secure screened subnets, determine: 1 The

Process for Designing Secure Perimeter Networks When designing secure screened subnets, determine: 1 The services that you must provide 2 How each service communicates with 3 4 5 6 systems How each service authenticates users How you will manage each service How you will monitor and audit each service How you will configure firewall and router rules to secure the network

Methods for Securing Perimeter Networks Implement the following security mechanisms on routers and firewalls:

Methods for Securing Perimeter Networks Implement the following security mechanisms on routers and firewalls: Packet filtering Routing rules Stateful packet inspection Application gateway Server publishing User-based authentication Intrusion detection

Guidelines for Protecting Computers on the Perimeter For traveling computers or traveling users, follow

Guidelines for Protecting Computers on the Perimeter For traveling computers or traveling users, follow these guidelines: ü Use and maintain antivirus software ü Use personal firewall applications ü Do not persistently store passwords ü Consider preventing third-party e-mail ü applications Educate users about security

Lab: Designing Security for Network Perimeters Exercise 1 Identifying Potential Perimeter Network Vulnerabilities Exercise

Lab: Designing Security for Network Perimeters Exercise 1 Identifying Potential Perimeter Network Vulnerabilities Exercise 2 Implementing Countermeasures