Internal Network Protection By Demetrius Fluker




Here is a summary of the Internal Network Protection 

  1. Port Level Authentication (802.1x):

    • Implement on all network switches to ensure only authorized devices connect to the wired network.
    • Require machine certificates for authentication.
  2. Virtual Local Area Networks (VLANs):

    • Create and document VLANs for logical groupings:
      • Endpoint workstations (including privileged accounts).
      • Server systems.
      • Network device management interfaces.
  3. Information Flow and Access Control:

    • Document and approve data flows between internal systems and third-party/cloud systems.
    • Enforce Access Control Lists (ACLs) between all VLANs.
  4. Workstation Communication:

    • Disable workstation-to-workstation communication within dedicated VLANs for workstations.
  5. Wireless Access Points (WAPs):

    • Maintain an inventory of authorized WAPs (internal and guest).
    • Regularly scan wired networks to ensure only authorized WAPs are connected.
    • Regularly scan physical locations to ensure only authorized WAPs are present.
    • Remove unauthorized WAPs regularly.
  6. Authentication and Encryption for Wireless Networks:

    • Ensure WAPs connecting to internal networks use certificate-based authentication (e.g., EAP-TLS).
    • Ensure WAPs use AES-CCMP to encrypt data in transit.
  7. Separate Network for Untrusted Devices:

    • Create a dedicated wireless network for untrusted devices and block communication to the internal network.
    • Maintain an inventory of all authorized wireless devices connecting to the information systems.

These controls are aimed at securing network access, ensuring proper segmentation and authentication, and maintaining a secure wireless infrastructure.

Comments

Popular posts from this blog

Afterbreach: The Architect of Innovation by Demetrius Fluker

Common Encryption Standards by Demetrius Fluker

My Proof of concept for Datacenter Security