EN.600.424 Spring 2016 Lecture Notes FUNDAMENTALS OF SECURE DESIGN (NETWORK TOPOLOGY)

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Computer Networks IGCSE ICT Section 4.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Common Devices Used In Computer Networks
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Topic 5a Operating System Fundamentals. What is an operating system? a computer is comprised of various types of software device drivers (storage, I/O,
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Module 10: Windows Firewall and Caching Fundamentals.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Troubleshooting CT NWT NameTP No. Gan Pei ShanTP Tan Ming FattTP Elamparithi A/L ThuraisamyTP Tan Ken SingTP
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
* Essential Network Security Book Slides.
Firewalls Jiang Long Spring 2002.
Introduction to Network Security
Presentation transcript:

EN Spring 2016 Lecture Notes FUNDAMENTALS OF SECURE DESIGN (NETWORK TOPOLOGY)

DESIGNING A SECURE NETWORK Later lectures are going to deal with protecting channels of communication However, the channels are supported by a network topology (architecture) Properly designed topology reduces the burden on the protected channels Today’s focus is the following principles and their contemporary implementations: Separation Isolation Encapsulation and Modularity Layering Minimized Exposure

SEPARATION: THE IDEA Humans have a tendency to “homogenize” and “consolidate” This is especially true when the complexities of an idea are not well understood Some make arguments for efficiency in planning (e.g., Governments) From a security perspective, “separation” is often superior: Separation of duties Separation of users Separation of networks Separation of responsibilities and operations

SEE ALSO: Simplicity of Design Implementation Minimization Failing Safely Least Privilege Minimizing attack surface

SEPARATION OF DUTIES Require more than one person to complete a task In military, for example, requiring two keys to fire a weapon Reduces how much TRUST must be put into a single individual Note: can use crypto to require two keys (e.g., Shamir Sharing)

SEPARATION OF USERS Separating users from data: Users access data via enforced policy Separating user populations: Users interact with each via enforced policy Policy enforcement mechanisms: ACLs Segmented networks/devices Device file-system and memory-system protections

SEPARATION OF NETWORKS Logical separation Physical separation For example, in separate rooms Separated into high/low risk (REDUCING TRUST) DMZ’s are a good example Mechanisms for Logical Separation: VLANs – Layer 2 separation Routers – Layer 3+ separation VPNs – Remote computing separation

VLAN VISUALIZATION VLAN 1VLAN 2VLAN 1VLAN 2 LAN Switch

ROUTER VISUALIZATION LAN LAN LAN LAN Router IP RangeEgress *Port *.*Port 2 InternetPort 3 Internet

VPN VISUALIZATION LAN LAN LAN Router Secure Channel Virtual Adapter (Over Secure Channel)

DMZ VISUALIZATION Internet Router (Firewall) #1 Web Server Server Router (Firewall) #2 Internal LAN DMZ

SEPARATION OF RESPONSIBILITIES A server hosting both the web server and the server is inherently less secure Now, both systems are compromised by vulnerabilities in either In general systems at risk should be have that risk minimized by hosting one thing (LEAST PRIVILEGE) (MINIMIZING ATTACK SURFACE)

ISOLATION Isolation restricts movement into and out of a separated entity If you separate but do not isolate, your separation has less impact Resource isolation separates resources from each other Allows resources to have different access levels Isolation also enables auditing and other control mechanisms Political Analogy: Separation = Borders Isolation = Border Enforcement

ENCAPSULATION AND MODULARITY Consider what happens when a computer visits Does the result depend on the OS running on the server? Does the result depend on whether or not “the server” is one machine or 100? Does the result depend on the network topology (e.g., server is in DMZ)? Like OO programming, network arch. depends on encapsulation and modularity In addition to the efficiency of design, it also supports security: Easier to reason (formally or informally) about security of the interface Easier to hide weak components behind secure façade Easier to swap in and out security components (3 rd party competition) Separation and Isolation depend on this principle

ENCAPSULATION AND PSYCHOLOGY Encapsulation also improves separating the crypto mechanism from the UI The two elements can evolve independently The two elements can be researched by different specialists

LAYERED SECURITY Multiple layers of security, each focused on a different threat Similar, from a certain point of view, to a network stack NOTE: not multiple layers focused on the SAME threat (e.g., two AV software) Sometimes sold by a single company as a “suite” of security applications Generally, for a network, good “layered security” is beyond a single vendor Firewall Anti-virus IDS Host-based protections

RETURN OF THE CONTEXT Getting layered security right really depends on the context Requirements Engineering: Figure out what attacks require protection Implementation: Create a “layer” that protects against each attack Focus that layer on solely that attack (Modularity!) Some professionals prefer “Defense in Depth” Broadest possible view… no “one true philosophy” Really, this is just another way of getting Anderson’s approach DON’T GET STUCK IN CHECK BOXES

MINIMIZING EXPOSURE The number one goal of all network design is minimizing exposure to protected elements BUT REMEMBER: The hardest part is figuring out what needs protected Once you have the requirements figured out, you can use the other principles: Separation Isolation Encapsulation and Modularity Layered Security ALL FOCUSED ON MINIMIZING EXPOSURE OF THE PROTECTED ELEMENTS (Don’t design in stuff just because it’s “cool” or you’ve done it before)

PLAYGROUND: TRY IT OUT! Begin thinking about how you might apply these principles in Playground How can you apply them? For example, how about a PLAYGROUND firewall? You could put your computing node up behind a firewall node. How would a firewall node work? It would take the request, analyze it, and pass it on to the real node You could do purely “network” security and limit the sources and destinations You could try to do application security by examining the data in the packets. Not required, but this is an example of something for the Advanced Features Lab

FIREWALL EXAMPLE IN MORE DETAIL What type of routing will you support? Will you have devices behind the firewall have private PLAYGROUND addresses? If so, you’re going to need to do NAT (Network Address Translation) outbound If so, you’ll need port forwarding inbound

PORT FORWARDING Firewall (public) Outsider Insider (private) Local PortForward To 100Insider at port 1001 Outsider connects to FW on port 100 Firewall connects to Insider on Port 1001 FW session w/ Outsider on port 100 FW session w/ Insider on port SourceForwarding connection Outsider/

NAT Firewall (public) Outsider Insider (private) Firewall connects on Insider’s behalf Insider “connects” to Outsider on port 100, src port FW session w/ Outsider on local port FW records Insider src/dst port Source DataForwarding connection Insider/11111/

OTHER PLAYGROUND OPTIONS Separate remote computation from security systems Separate remote computation from other remote computation based on privilege level Multiple remote computation (load balancing) Separate accounting system from remote computation Separate “networks” for computing and providing computation If providing advanced features, separating them out: File storage (store once, compute many) Computation services (e.g., providing support for graphing)

CITATIONS While not used word-for-word, these two sources assisted me with these slides: defense-in-depth/ defense-in-depth/ Security_Architecture.pdf Security_Architecture.pdf