Book Image

Network Security Strategies

By : Aditya Mukherjee
Book Image

Network Security Strategies

By: Aditya Mukherjee

Overview of this book

With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats. You’ll understand how to identify security vulnerabilities across the network and how to effectively use a variety of network security techniques and platforms. Next, the book will show you how to design a robust network that provides top-notch security to protect against traditional and new evolving attacks. With the help of detailed solutions and explanations, you'll be able to monitor networks skillfully and identify potential risks. Finally, the book will cover topics relating to thought leadership and the management aspects of network security. By the end of this network security book, you'll be well-versed in defending your network from threats and be able to consistently maintain operational efficiency, security, and privacy in your environment.
Table of Contents (15 chapters)
1
Section 1: Network Security Concepts, Threats, and Vulnerabilities
5
Section 2: Network Security Testing and Auditing
10
Section 3: Threat Management and Proactive Security Operations

Network security architecture approach

A successful network security implementation will consider the following key pillars. Each organization and standard that talks about network security architecture may have a different block, but the foundational principles are always the same:

Let's quickly run through what these stages are about before analyzing them in detail in the upcoming subsections:

  • Planning and analysis: The planning and analysis stage is responsible for developing a conceptual network security architecture design.
  • Designing: This stage is responsible for developing a detailed network security architecture design.
  • Building: In the building phase, we focus on developing the network components that were identified in the first phase of planning and analysis, as well as the second phase, where we created the outline design of how we envision the network to be formed.
  • Testing: The testing phase focuses on validating the implementations that were done in the previous phase. This also accounts for how effective and efficient they are regarding their intended operational capability.
  • Deployment: The major focus of the deployment phase is to ensure that the deployment and go-live plans are in place and that the operation teams are equipped to take over the operations for the network.

In the upcoming subsections, we'll understand what activities are carried out in these stages and how they achieve their goal.

Before proceeding further, please ensure that you are familiar with the following concepts:
  • Simplex, half-duplex, and full-duplex communication
  • Baseband and broadband
  • Circuit-switched and packet-switched networks
  • Basic concepts such as ARP and RARP and unicast, multicast, and broadcast traffic
  • Distributed Network Protocol (DNP3 used in SCADA and smart grid applications), storage protocols (FCoE, iSCSI), and Virtual SAN (vSAN)
  • Software-defined networks
  • Authentication protocols such as Password Authentication Protocol (PAP), Challenge-Handshake Authentication Protocol (CHAP), and Extensible Authentication Protocol (EAP)

Planning and analysis

The Planning and analysis stage is responsible for developing the conceptual network security architecture design, which covers the following:

  • Network zoning and edge security
  • Network access control
  • Communication protocol security
  • Network configuration management
  • Network security monitoring and response

The objectives of this phase focus on the following activities:

  • Defining the security domains and the security zones, their security boundaries, and inter-zone data flows
  • Defining the communication security requirements for intra-zone and inter-zone data flows
  • Defining network integration with AAA, management and monitoring systems, and operators
  • Defining network access controls (physical and logical) for each security domain
  • Evaluating and selecting a network security service and component vendors

There can also be additional activities, such as the following:

  • Performing network discovery scans and comparing them to the existing network architecture documentation
  • Identifying regulatory and policy security requirements
  • Identifying the classifications, ownerships, and trust levels of different types of endpoints (users, systems, data), environments, and transit networks and performing threat modeling/threat assessment
  • Identifying the classification of data flows

The following are the inputs and outputs of this phase:

Inputs

Outputs

  • Existing network architecture designs
  • Requirements (regulatory, security policy, contract)
  • Stakeholder input
  • Network security/compliance baseline and gap analysis
  • Network security requirements
  • Conceptual network security architecture
  • Conceptual cost estimates
  • Network security solution plan

The planning and analysis phase sets the stage for having a foundational understanding of the network requirements and constructs the basis for the next phase, which is designing the network architecture and its associated components.

Designing

The designing stage is responsible for developing a detailed network security architecture that covers the following aspects:

  • A logical network security architecture
  • A physical network security architecture
  • An integration architecture for network management, monitoring, and Authentication, Authorization, and Accounting) (AAA)
  • Network access control
  • Communications security

The objectives of this phase focus on the following activities:

  • Designing logical and physical security domains/zones separation (Air-gap, VLAN, VRF, MPLS, VPN)
  • Designing logical and physical perimeters (Firewalls, NAT, Proxies, VPN Concentrators, IDS/IPS, App FW)
  • Designing management and control (in-band, out-of-band, NCM, Backup and Restore, Fail-open/Fail-close)
  • Designing AAA (Ops Model, Roles, Groups, Multi-Factor Authentication, Access Control, IAM Integration)
  • Designing monitoring and response (Logging, IDS/IPS, SIEM Integration, Audit, Ops Model)
  • Designing comms security (SSL Offload, VPN Concentrators, IPsec, MACsec, WPA2, Key Management)
  • Designing Network access control (802.1x, TNC, Quarantine, Guests/Contractors, Remote VPN, Wi-Fi)

There can also be additional activities, such as the following:

  • Building a Proof-of-Concept (POC)/model/lab environment
  • Refining activity estimates (cost/time), getting management/stakeholder sign-off and obtaining funding
  • Procurement

The following are the inputs and outputs of this phase:

Inputs

Outputs

  • Requirement gathering
  • Network security requirements
  • Conceptual network security architecture

  • Network security/compliance baseline and gap analysis
  • Network security requirements
  • Conceptual network security architecture
  • Conceptual cost estimates
  • Network security solution plan

Once the designing phase has been completed and an outline of the network architecture is formed, we can move on to the next phase, which is the building phase.

Building

In the building phase, we focus on developing the network components that were identified in the first phase of planning and analysis, as well as the second phase, where we created an outline design of how we envision the network to be formed. This covers the following broad aspects:

  • Building a core network and integration architecture
  • Developing an asset inventory with equipment configuration (CMDB)
  • Developing firewall rules
  • Documenting a test plan
  • Executing the component test
  • Developing a deployment execution plan
  • Developing standard operating procedures

The objectives of this phase focus on the following activities:

  • Deploying, configuring, hardening, and testing equipment
  • Developing and optimizing firewall rules and network security policies (IPv4, IPv6, 6in4 tunnels, and so on)
  • Developing installation/configuration guides and operational procedures
  • Performing a network security component test
  • Developing a deployment execution plan (including a go-live support plan)

There can also be additional activities, such as the following:

  • Completing asset and cable labeling and tracking registers
  • Creating, installing, securing, and tracking cryptographic keys/certificates
  • Changing/replacing default usernames, passwords, and cryptographic keys/certificates

The following are the inputs and outputs of this phase:

Inputs

Outputs

  • Network security requirements
  • Network security detailed design
  • Installation and configuration guides
  • Equipment configuration templates
  • Configuration baseline
  • Network security operational procedures
  • Asset inventory (CMDB) and cable and cryptographic key registers
  • Network security test plan
  • Deployment execution plan (including a go-live support plan)

Once the building phase has been completed and the major components of the network architecture have been put in place, we can move on to the next phase, which is the testing phase.

Testing

The testing phase focuses on validating the implementations that have been done in the previous phase. It also accounts for how effective and efficient they are in their intended operational capability. This includes the following:

  • Auditing equipment labels and their location against the asset register
  • Auditing cable labels against the cable register
  • Auditing network configuration and labels
  • Auditing cryptographic keys against the key register
  • Performing a network scan for discovery and mapping
  • Performing vulnerability analysis and penetration testing scans
  • Auditing logging functionality
  • Performing integration and acceptance tests

The objectives of this phase focus on the following activities:

  • Auditing all networked equipment and cabling labels against asset and cable registers
  • Auditing equipment configuration against a documented baseline
  • Auditing default/system account passwords and cryptographic keys/certificates
  • Performing discovery network scans and firewall scans
  • Performing vulnerability scans for management purposes, as well as the control planes and systems (in-band and out-of-band)
  • Verifying that password audits and network scans have been captured by the appropriate audit logs
  • Testing integration with the management, AAA, and monitoring systems
  • Performing performance and scalability testing
  • Performing user acceptance testing against requirements

There can also be additional activities, such as the following:

  • Validating scan results against the documented design, configuration, and registers
  • Validating the naming conventions for network devices that don't reveal the device's type, version, or model

The following are the inputs and outputs of this phase:

Inputs

Outputs

  • Network security requirements
  • Network security detailed design
  • Asset, cable, and cryptographic key registers
  • Configuration baseline
  • Asset, cable, and cryptographic key audit results
  • Configuration audit results
  • Network scan results
  • Testing results signoff

After completing the testing phase, where we document our findings from the various tests and audits we've performed, we can move on to the next phase, which is the deployment phase.

Deployment

The major focus of the deployment phase is to ensure that the deployment and go-live plans are in place and that the operation teams are equipped to take over the operations for the network. This includes the following:

  • Conducting training with operations staff
  • Confirming and communicating deployment readiness
  • Rolling out new capabilities
  • Monitoring deployment and operations
  • Operational handover and acceptance
  • Closure and signoff

The objectives of this phase focus on the following activities:

  • Conducting training sessions with operations staff
  • Confirming a participant's and environment's readiness and communicating rollout dates and details
  • Coordinating a rollout for a new capability to the deployment groups
  • Monitoring deployment delivery and operations
  • Handing over and signing off operational responsibility to the network/security operations teams
  • Creating a summary report and acceptance checklist

There can also be additional activities, such as the following:

  • Performing a pilot deployment on a less-critical subset of participants/environments
  • Supporting security operations and network operations teams
  • Updating network security/compliance and gap analysis

The following are the inputs and outputs of this phase:

Inputs

Outputs

  • Deployment execution plan (including a go-live support plan)
  • Authorization to deploy
  • Network security implementation plan
  • Network security solution plan

  • Deployed new network security capability
  • Operational acceptance
  • Updated network security/compliance baseline and gap analysis
  • Management signoff

Once the deployment phase has been completed, along with the required signoffs from the operation teams and the executive leadership, we can move on to the last phase, which is the post-deployment phase.

Post-deployment

The post-deployment phase focuses on the activities that will be used to monitor the performance of the network, as anticipated, and inculcate strategies and methods to uplift the network's performance. This includes the following:

  • Reporting: Establish regular KPI and KRI reporting (for example, for compliance)
  • Continuous improvement: Perform regular vulnerability assessments
  • Regular audits: Perform regular audits against known configuration and registers

This concludes our discussion on the network security architecture approach. This gave you a detailed deep dive into the mindset and procedures that you should take into account when planning for a network security exercise for an organization. However, most organizations might already have a network in place.

The approach we use might take a slight diversion in this case, such as starting with a security audit, which investigates their network security policies and verifies the network assets for potential deficiencies. This will give you a clear picture of what needs to be addressed and the prioritization. Findings may result in restrict user access privileges and implementing the least privileges across the environment in an iterative process. You may also need to review your security controls and platforms in use for detection, prevention, response, and so on based on their effectiveness and how they are used (the way they are used and the team's ability to use them appropriately).

Now that we've completed the basic groundwork, we will look at the various best practices of network security and how they help us build a more resilient environment.