Secure Infrastructures
Device Placement
- Strategic placement of infrastructure devices within a network to enhance security and performance.
- Firewalls: Placed at network perimeters to filter and block unauthorized access.
- Jump Servers: Positioned to provide secure, controlled access to internal systems from external networks.
- Load Balancers: Placed to distribute network traffic across multiple servers, ensuring availability and preventing overload.
- Sensors: Deployed throughout the network to monitor traffic, detect intrusions, and gather security data.
- Other devices (e.g., IDS/IPS, routers, etc.)
Security Zones
A way to segment a network into different parts, each with its own security policies, actions, or philosophies.
- Trusted vs. Untrusted: Segments that differentiate internal, secure areas from external, potentially malicious areas.
- Internal vs. External: Separates areas within the organization from those outside (e.g., internal corporate network vs. internet).
- Zones: Internal, database, external, DMZ (Demilitarized Zone), etc.
Attack Surface
The total number of potential entry points or vulnerabilities that an attacker could exploit within a network.
- Application Code: Vulnerabilities in software code that could be exploited.
- Open Ports: Unsecured or unnecessary network ports that can expose services to attacks.
- Authentication: Weak or misconfigured authentication methods that may allow unauthorized access.
- Other factors (e.g., misconfigurations, unpatched systems).
The objective is to minimize the attack surface by reducing vulnerabilities and securing access points.
Connectivity
- Securing physical network cables and access points to prevent unauthorized physical tampering.
- Applying encryption at the application level (e.g., TLS/SSL) to ensure data security during transmission.
- Using IPsec tunnels, VPNs, and other secure protocols for external network-level connections.