Internal Network Protection By Demetrius Fluker
Here is a summary of the Internal Network Protection
Port Level Authentication (802.1x):
- Implement on all network switches to ensure only authorized devices connect to the wired network.
- Require machine certificates for authentication.
Virtual Local Area Networks (VLANs):
- Create and document VLANs for logical groupings:
- Endpoint workstations (including privileged accounts).
- Server systems.
- Network device management interfaces.
- Create and document VLANs for logical groupings:
Information Flow and Access Control:
- Document and approve data flows between internal systems and third-party/cloud systems.
- Enforce Access Control Lists (ACLs) between all VLANs.
Workstation Communication:
- Disable workstation-to-workstation communication within dedicated VLANs for workstations.
Wireless Access Points (WAPs):
- Maintain an inventory of authorized WAPs (internal and guest).
- Regularly scan wired networks to ensure only authorized WAPs are connected.
- Regularly scan physical locations to ensure only authorized WAPs are present.
- Remove unauthorized WAPs regularly.
Authentication and Encryption for Wireless Networks:
- Ensure WAPs connecting to internal networks use certificate-based authentication (e.g., EAP-TLS).
- Ensure WAPs use AES-CCMP to encrypt data in transit.
Separate Network for Untrusted Devices:
- Create a dedicated wireless network for untrusted devices and block communication to the internal network.
- Maintain an inventory of all authorized wireless devices connecting to the information systems.
These controls are aimed at securing network access, ensuring proper segmentation and authentication, and maintaining a secure wireless infrastructure.

Comments
Post a Comment