6 Enterprise Network Security Configuration Concepts
6 Enterprise Network Security Configuration Concepts
Introduction
Configuration Management
Data Sovereignty
Data Protection
Hardware Security Module (HSM)
Geographical Considerations
Cloud Access Security Broker (CASB)
Response and Recovery Controls
Secure Sockets Layer (SSL)
Transport Layer Security (TLS) Inspection
Hashing
API Considerations
Site Resiliency
Deception
Disruption
Honeypot
Learning Outcomes
In this module, you will complete the following exercises:
Configuration Management
Data Sovereignty
Data Protection
Hardware Security Module (HSM)
Geographical Considerations
Cloud Access Security Broker (CASB)
Response and Recovery Controls
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Inspection
Hashing
API Considerations
Site Resiliency
Deception and Disruption
Exam Objectives
The following exam objectives are covered in this lab:
Configuration Management
Data Sovereignity
Data Protection
Hardware Security Module (HSM)
Geographical Considerations
Cloud Access Security Broker (CASB)
Response and Recovery Controls
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Inspection
Hashing
API Considerations
Site Resiliency
Deception and Disruption
Note: Our main focus is to cover the practical, hands-on
in more detail.
Lab Duration
It will take approximately 1 hour to complete this lab.
Lab Topology
During your session, you will have access to the following lab
configuration.
Depending on the exercises, you may or may not use all of the
devices, but they are shown here in the layout to get an overall
understanding of the topology of the lab.
Learning Outcomes
After completing this exercise, you should have further knowledge
of:
Configuration Management
Data Sovereignty
Data Protection
Hardware Security Module (HSM)
Geographical Considerations
Cloud Access Security Broker (CASB)
Response and Recovery Controls
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Inspection
Hashing
API Considerations
Site Resiliency
Deception and Disruption
Your Devices
This exercise contains supporting materials for Security+.
Configuration Management
Network Diagrams
A network topology diagram is a visual depiction of a network
architecture. It uses different symbols and connections, which are
represented by lines. A network diagram can help a user
understand the layout of the network.
The network topology diagram should detail out how the network is
designed. It should mention the following (at minimum):
Baseline Configuration
A baseline configuration is based on the configuration parameters
that have been set in an operating system. These parameters define
what is installed in the operating system. A baseline configuration,
once approved and rolled out, serves as a base on which changes
can be implemented.
Wastage of IP addresses
Duplicate subnets
Duplicate IP addresses
Data Sovereignty
Each country has their data sovereignty laws, and data sovereignty
refers to maintaining the data privacy. The country’s laws specify
where the information is being stored and how it is shared and
handled. For an organization to work in a global environment,
multiple offices in different countries, data sovereignty must be
considered.
Data Protection
There are different methods that can be used to protect the CIA of
data within the organization. For example, you can implement
encryption to protect the confidentiality of the data. Similarly, a
method like replication or fault tolerance can provide availability.
The key intent of DLP is to tackle insider threats and also to meet
the regulation-driven privacy requirements. DLP has three key use
cases:
Masking
Data masking hides data by concealing letters and numbers with
different characters. After data is concealed, it is masked behind
the letters and numbers. When an authorized user accesses the
concealed data, he or she is allowed to access it.
Encryption
In most cases, individuals or organizations store data in cleartext
format. In such a scenario, if a hacker gets hands on the data, it is
vulnerable. The hacker can delete, modify, or simply steal the data.
Data encryption software enhances data security by applying an
algorithm and converts normal data into encrypted data, which can
only be read by an authorized individual. If the data is stolen,
depending on the algorithm used, the encrypted data may just be
useless to the hacker. To an unauthorized person, the cipher data
will be unreadable.
Tokenization
Tokenization is a method of replacing an actual string of data with
unique identification symbols or numbers. This way if anyone gets
hold of the string of text, they cannot decipher it. Tokenization can
be used to protect sensitive information, such as:
Bank transactions
Medical records
Criminal records
Vehicle driver information
Loan applications
Stock trading
Rights Management
DRM or Digital Rights Management is mainly used with music, e-
books, and DVDs. With the use of DRM, the media is protected from
cracking, reproducing, or tampering. It is up to the creator of the
media to use DRM. Any violation of DRM can result a lawsuit under
the Digital Millennium Copyright Act (DMCA).
Geographical Considerations
Power availability
Internet service provider’s presence
Type of connectivity available
Fiber backbone availability
Locations of the customers
You would not put up a datacenter in a location where power is a
scarcity. It can cost thousands of dollars per month to run your
organization on power backup systems. Another example is that if
you are close to the customer, it gives them good throughput and
connectivity. Closure you are to the customers, less latency issues
there will be.
Malware prevention
Cloud governance
Risk assessment
Data Loss Prevention (DLP)
User and Entity Behavior Analytics (UBEA)
Threat prevention
Single sign-on
Data Encryption
Identity and Access Management (IAM)
Hashing
API Considerations
Site Resiliency
The third type of site is a cold site with the bare minimum
infrastructure, and it takes a longer time to make this site
operational. The organization may have to bring in servers and
endpoints and make necessary arrangements for Internet
connectivity. This type of site takes the longest time to be
operational.
Fake Telemetry
You would often deploy deception controls, such as a honeypot or
honeynet, on your network. Fake telemetry, which is also known as
deception telemetry, is the act of collecting information from
deception controls. Consider a scenario that you receive an alert
from the honeypot that is deployed on the network. After you
receive the alert, you know that someone is already inside the
honeypot or is attempting a connection. Based on the information
received, you have to decide on the next steps that need to be
performed.
In this exercise, you will learn how to use a program called Pentbox
to create a basic honeypot system and test it using a standard web
browser to detect an intrusion.
Learning Outcomes
After completing this exercise, you should be able to:
Step 1
Ensure that all the required devices are powered on. Connect
to PLABKALI. In the Enter your username text box, type the
following:
root
Passw0rd
Click Log In or press Enter.
Step 2
After a successful login, the desktop is displayed.
Figure 2.2 Screenshot of PLABKALI: Displaying the desktop after
the successful login.
Step 3
In the menu bar, click Terminal Emulator.
Figure 2.3 Screenshot of PLABKALI: Clicking the Terminal
Emulator icon in the menu bar.
Step 4
The terminal window is displayed. Type the following command:
wget
http://downloads.sourceforge.net/project/pentbox18re
alised/pentbox-1.8.tar.gz
Press Enter.
Figure 2.4 Screenshot of PLABKALI: The terminal window displays
the command to download the Pentbox app typed-in.
Step 5
A confirmation will be displayed to indicate a successful download
of Pentbox.
Figure 2.5 Screenshot of PLABKALI: Output displaying the
successful installation of Pentbox.
Step 6
On the next prompt, to uncompress the Pentbox files, type the
following command:
Press Enter.
Figure 2.6 Screenshot of PLABKALI: Typing the command to
uncompress the Pentbox files.
Step 7
The Pentbox files will be extracted in its folder.
Figure 2.7 Screenshot of PLABKALI: Output displaying the
uncompressed Pentbox files.
Step 8
On the next prompt, type the following to change to
the Pentbox folder:
cd pentbox-1.8/
Press Enter.
Figure 2.8 Screenshot of PLABKALI: Typing the command to
change the folder to Pentbox.
Step 9
On the next prompt, to run Pentbox, type the following:
./pentbox.rb
Press Enter.
Figure 2.9 Screenshot of PLABKALI: Typing the command to access
the required file in the Pentbox directory typed-in.
Step 10
From the Pentbox menu, type:
Press Enter.
Figure 2.10 Screenshot of PLABKALI: Terminal window is displayed
listing the Pentbox menu and showing the required menu option
typed-in.
Step 11
On the next menu screen, type:
Press Enter.
Figure 2.11 Screenshot of PLABKALI: The terminal window is
displayed listing the Pentbox network tools menu and showing the
required menu option typed-in.
Step 12
On the run Pentbox screen, type:
Press Enter.
Figure 2.12 Screenshot of PLABKALI: The terminal window is
displayed listing the conditions to run the Pentbox app and showing
the required menu option typed-in.
Step 13
You will get a notification that the HONEYPOT ACTIVATED ON
PORT 80.
Step 1
On PLABKALI, minimize the terminal window.
Figure 2.14 Screenshot of PLABKALI: The terminal window displays
the minimize icon at the top-right corner.
Step 2
Connect to PLABWIN10. In the Type here to search text box,
type the following:
Internet Explorer
Press Enter.
Figure 2.15 Screenshot of PLABWIN10: Selecting the Internet
Explorer from the search results in PLABWIN10.
Step 3
The Internet Explorer window is displayed. At the far-right corner
of the toolbar, click the cogwheel icon and select Internet
Options.
Figure 2.16 Screenshot of PLABWIN10: Settings (cogwheel icon) >
Internet options menu-options are displayed on the web browser
window.
Step 4
On the Internet Options dialog box, click the Connections tab.
Figure 2.17 Screenshot of PLABWIN10: Showing the Connections
tab highlighted in the Internet Options dialog box.
Step 5
Under the Connections tab, next to Local Area Network (LAN)
settings, click LAN settings.
Figure 2.18 Screenshot of PLABWIN10: Connections tab on the
Internet Options dialog box is displayed showing the LAN settings
button selected.
Step 6
On the Local Area Network (LAN) Settings, ensure that
the Bypass proxy server for local address checkbox is selected.
Click Advanced.
Figure 2.19 Screenshot of PLABWIN10: Local Area Network (LAN)
Settings dialog box displays the required settings performed and
the Advanced button selected.
Step 7
On the Proxy Settings dialog box, click on the provided text box
and type:
;192.*
Click OK.
In this task, you will test the functionality of the Pentbox honeypot.
Step 1
On PLABWIN10, the Internet Explorer window is open.
Press Enter.
Step 2
An “Access denied” message appears on the web page.
Figure 2.22 Screenshot of PLABWIN10: Access denied message is
displayed when access is attempted for a restricted IP address.
Step 3
Connect to PLABKALI and restore the terminal window.
Review
Well done, you have completed the Enterprise Network Security
Configuration Concepts Practice Lab.
Summary
You completed the following exercises:
Configuration Management
Data Sovereignty
Data Protection
Hardware Security Module (HSM)
Geographical Considerations
Cloud Access Security Broker (CASB)
Response and Recovery Controls
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Inspection
Hashing
API Considerations
Site Resiliency
Deception and Disruption
Feedback