-
Firewalls
- Firewalls divide networks into security zones. Place firewalls at the network edge to enforce the network security boundary.
-
Firewalls enforce separation between networks. This includes:
- Endpoints
- Wireless Networks
- Guest Networks
- Data Center Networks
- The exact placement of firewalls will depend upon your organization's security and business requirements.
-
Event Monitoring
-
Port Mirroring (SPAN)
- Switch Protocol Analyzer. A method used to provide a copy of traffic that crosses the switch.
-
Mirrored ports can be configured to detect:
- Ingress (Rx) Traffic
- Egress (Tx) Traffic
- Both Ingress (Rx) and Egress (Tx) Traffic
-
Mirrored ports can detect traffic for:
- a single port
- multiple ports
- a particular VLAN
-
SPAN can be configured:
- Locally
- Remotely
- Proper SPAN configuration is key to getting the results you're after.
-
SIEM Systems
-
Security Information and Event Management Systems. Consists of:
-
Collectors:
- A network of devices designed to gather information from other systems. Collectors gather this information from network sensors.
- Network Sensors
- Sensors placed on network segments that are designed to collect information for specific systems.
- Collectors should be placed in network locations that minimize the path distance between them and the network sensors sending them information.
-
Correlation Engine:
- Pulls together the information from those collectors for analysis.
- The correlation engine is a sensitive security device, and should be placed on a protected network where it is accessible only to authorized administrators.
-
Proxy Servers
- A server used to protect internal users from malicious Internet content.
- Proxy servers are often placed in the DMZ network. This limits the amount of outbound network traffic from the internal network, adding a layer of isolation to your trusted network.
-
VPN Concentrators
- VPN concentrators are hardware devices used to aggregate inbound VPN connections from employees and other users who require remote access.
- A common network approach for placing VPN concentrators is to place them on their own VLAN.
- Access controls should also be configured to limit the access granted to systems.
-
SSL Accelerators & Load Balancers
- SSL accelerators and load balancers are devices designed to boost the performance of services that you provide to the outside world at scale.
-
SSL Accelerators
- SSL accelerators handle the tough cryptographic work of setting up a TLS connection on behalf of a web server, allowing the web server to focus on delivering web content.
-
Load Balancers
- Load balancers allocate the load of inbound user requests among a pool of servers, allowing the organization to scale a service quickly by adding additional servers.
- Both SSL accelerators and load balancers normally reside in the DMZ where they are close to the servers that they assist.
-
DDoS Mitigation Technology
- DDoS mitigation technology uses a variety of tools and techniques to block DDoS attacks from entering the organization's network and minimizing the impact they have on legitimate network use.
- You want to place DDoS mitigation technology as close to the internet connection as possible to block the unwanted traffic from entering deeper into your network.
-
Ideally, to prevent a DDoS attack before it even reaches your network, you can purchase DDoS mitigation services from one of these providers:
- directly from your internet service provider
- from a third part cloud service