SY0-071-Module 3 Powerpoint Slides
SY0-071-Module 3 Powerpoint Slides
0 Security Architecture
CompTIA Security+ SY0-701
Topics
• Security Implications of Different Architecture Models
• Enterprise Infrastructure Security
• Data Protection Concepts and Strategies
• Resilience and Recovery in Security Architecture
• Network Segmentation
Security • High Availability
• Virtualization
Implications of • Cloud
Different • Serverless Computing
Architecture • IoT
• ICS/SCADA
Models • RTOS and Embedded Systems
Network Segmentation
Implications of Network Segmentation
• Creating segments as “security zones” is an excellent way to group
devices with the same security needs
• Physical segments can be air-gapped
• Air-gapped systems are highly secure but still at risk of compromise through:
• Removable media
• Environmental controls compromise
• VLANs are cheaper, more flexible, and more convenient
• Can be overlaid on top of nearly any physical topology configuration that uses
Ethernet switches
• VLANs can be extended across campus to multiple switches via trunk links
• Can even be extended across a Metropolitan Area Network using Metro Ethernet
• Still at risk of “VLAN Hopping” – attacker forces traffic onto a different VLAN, even
without the aid of a router
VLAN Use Case Example
NETWORK SWITCHES
VLAN Trunk Link Example
Network Zones by Trust Level
Medium Trust
Highest Trust
Low Trust
High Trust
No Trust
Highest Trust
Medium Trust
Segmentation Trust Levels
Air-gapped
Very High
common environment
• What would be the most common data loss path for an air-gapped
network?
• Removable devices
Question #2
• What is the best way to isolate a section of the network and its
externally available resources from the internal corporate network?
• Air-gapping
High Availability
High Availability
• Clustering
• Load balancing
• Replication
Clustering
• A group of two or more hosts (physical machines) act as a single, unified system,
running the same service
• Each host has its own IP address, MAC address and name
• The cluster itself also has an IP address, MAC address and name
• The hosts typically access the same shared data
• Usually, one host is active while the other(s) is on standby
• Should the first host fail, the cluster quickly and automatically fails over to the
standby host
• The two hosts need a dedicated network link just for “heartbeat” communications
• In an Active/Standby configuration, the standby server is effectively doing nothing
• It’s just waiting around for the active server to fail
• It is possible to implement an Active/Active configuration where each host is active for one
service, while also being standby for a different service
• Database servers are typical candidates for clustering
Clustering Example
SYSTEM1 SYSTEM2
10.0.0.30
Load Balancing
Replicated or
Clustered Servers
Replication
• Similar to load balancing except:
• The nodes do not share a common name, IP address, or MAC address
• They are very often on separate networks
• Clients are aware that each node is a separate server running its own copy of the service
• Servers each maintain a copy of the data
• Changes to the data are replicated between the servers
• Nodes are often geographically dispersed
• You will need to manage replication across distances
• Active Directory domain controllers or other databases are typical candidates
Systems That You Can Make Highly Available
• Networks, links
• Routers, switches and gateways
• Servers and services
• Storage
• Data
• Environmental systems such as power and cooling
• Entire racks, datacenters, and sites
Front-end website
Virtualization Considerations and Risks
• IoT Gateway
• Connects your IoT devices to other networks
• Router, phone, hotspot, etc.
• Cloud Server/Data Center
• Connect through web services
• Data processing and storage
• Processed data transmitted back to the user
• Remote Control
• End user uses a mobile app
• Monitor, control, retrieve data, take an
action
• User can be in a remote location
IoT Considerations
• In IoT architecture, there is (theoretically) no limitation of location or distance
between two or more devices
• Devices and components can be spread across the globe
• There is, however, a practical consideration regarding bandwidth availability and latency
• Extending IoT into the cloud provides new opportunities for hacking
Common IoT Security Weaknesses
• Absence of device authentication
• Without authentication, unauthorized devices can access a network and act as an attack entry point
• Lack of visibility
• Without authentication or a unique identifier, it is difficult to track, monitor and manage IoT devices
• Embedded passwords
• While default or hardcoded passwords can make installation and remote access simpler, it also
makes access easier for hackers
• Patching and upgrading
• There are often no easy means to patch or upgrade software running on IoT devices, leaving devices
with known vulnerabilities exposed to hackers
• Physical access
• IoT devices are often installed in easily accessible locations, making it possible for hackers to
damage them or to remove components such as memory cards
• Others are in physically remote or inaccessible locations, making them difficult to manage
Application Server
Cloud Infrastructure
Remote Administration
Administration Interface
Administration Database
ICS / SCADA
Industrial Control Systems (ICS)
• A subset of ICS
• Refers to systems that collect data from remote locations and provide
a centralized interface for monitoring and control
• Most commonly used in telecommunications, power and energy,
water/waste-water and oil and gas refineries
If you can reach a host using one port or protocol but not another,
suspect that a firewall is blocking certain traffic types.
Network Zone
• Filters packets at the Application Layer (7) of OSI or Application layer of TCP/IP
• Examines payloads and Application Layer headers
• Traffic is examined and filtered on application-specific commands
• If configured as a proxy:
• Client session put on hold at the proxy • SOCKS is a Layer 5 protocol
• Proxy fetches approved content for the client • Connects client to proxy
• Proxy caches the content against future requests • Can forward TCP and UDP
• Optional authentication
• Only protocols supported by the proxy are serviced
• HTTP, HTTPS, SOCKS4, SOCKS5, and UDP
• All other protocols are rejected or routed through packet filtering
• Slowest performance, deepest packet inspection
Unified Threat Management (UTM)
Combines multiple security functions into a single appliance
Question
Sensor / Analyzer
Ethernet Network Tap Example
Network Intrusion Prevention System (NIPS)
• A NIPS is an active monitoring and control system
• Acts as a choke point behind the firewall
• A network packet comes from Internet and passes through firewall
• The packet passes through IDS and undergoes signature comparison
• If there is no match the packet is sent to the switch and into enterprise network
• If there is a match:
• An alarm is sent and logged
• The packet is sent through anomaly detection and stateful protocol analysis
• Connections from the source are cut
• The packet is dropped
• A NIPS is an active system
• It might inadvertently cut off legitimate traffic
NIDS vs NIPS
NIDS NIPS
IDS Results
• True Positive
• There truly was a security incident
• A real attack was detected
• True Negative
• There truly was NOT any incident
• Most desirable! Security controls are working!
• False Positive
• False alarm
• An incident was reported, but it didn’t actually happen
• Too many false positives can become annoying
• False Negative
• A security incident actually happened, but was not detected
• IDS falsely reports that everything is ok
• This is the most serious and dangerous of all!
IDS Results Example
Host-based IDS/IPS (HIDS/HIPS)
• Software installed on the host
• Only activities inside the host are monitored:
• File activity
• Processes
• Logons
• Privileged actions
• User account changes
• Software installation/deletion
• Host-based IDS/IPS does not monitor network activity
• Not even port or vulnerability scans, denial-of-service attacks against the host
• HIDS logs suspicious activities
• HIPS prevents suspicious activities
• Replaces the kernel and other critical parts of the OS
• Nearly impossible to remove once installed
Indicators of System Intrusions
• Incomplete/short logs
• Logs that are missing/have incorrect permissions
• Random data in log files that might cause DoS or a service crash
• Slow performance of the system
• Graphic displays/text messages that are unusual
• Alterations to system software/configuration files
• System crashes/reboots
• Processes that are unfamiliar
NIDS vs HIDS
NIDS, NIPS, HIDS/HIPS Placement Example
Firewall
DMZ
Wi-Fi IPS (WIPS)
INTRANET
Reverse Proxy Example
PROXY
SERVERS
INTERNET INTRANET
Jump Server
• AKA jump host, jump box
• A secure computer that spans two or more networks
• Two dissimilar security zones
• Allows users to connect to it from one network, and then “jump“ to another
network
• Provides a controlled means of access between them
• Could be placed in a DMZ or internal network
• Sometimes referred to as a bastion host
• Used specifically as a pivot point to provide access to internal devices
• External hosts only have access to the jump server
• Cannot directly access other internal computers
• Must make a secure connection to the jump server
• Then from the jump box make a separate connection to internal computers
Jump Server Example
Virtual Private Network (VPN)
• A mechanism for creating a secure connection over an unsecure network
such as the Internet
• Traffic is encrypted before transmission
• Packets can also be “tunneled” (hidden) inside other packets
• Even if the packets are intercepted, they cannot be decoded
• Effectively making the communication private
• The receiving end (firewall, VPN server, router, host) removes the packets
from the tunnel and decrypts them
• A VPN can be between:
• Two hosts
• Two networks
• A host and a network
VPN Example
Transport Layer Security (TLS)
• Encrypts the payload
• Does not tunnel
• Does not hide an entire packet inside another packet
• Originally designed for HTTPS
• Can also be used by other applications such as:
• Messaging, email, SQL, VoIP (and more)
• Uses TCP 443 by default
• Can be changed
• Firewall friendly
• Unaffected by Network Address Translation (NAT)
• Used by “newer” VPN types that only need to protect the payload
IP Security (IPSEC)
• Host-to-host VPN
• Two hosts create a VPN directly between them
• Hosts have to be able to route traffic to each other
• Typically used for client-server or server-server connections
• Extra security between hosts in a private network
• Server-to-server replication
• Secure connection between hosts in different security zones
• Web server front end in DMZ to database server back end in private network
• Client-to-server connection across the Internet
IPSEC Tunnel Mode
• Router-to-router VPN
• For site-to-site connections
• Two edge devices (routers, firewalls) create a VPN between them
• Typically over the Internet
• Client traffic between the two networks flows through the VPN
• Client traffic is only encrypted when in the tunnel
• Clients are unaware that the connection is a VPN
• Allows subnets with private IP addresses to connect to each other
IPSEC Modes
IPSEC AH Modes
IPSEC ESP MODES
Remote Access
• The ability to access a system or network, whether it's a personal
device or office server, without being physically present
• Allows employees to work off-site, such as at home or in another
location
• Still maintain secure access to a distant computer or network
• Typically accomplished through a VPN connection
• Can also use remote access protocols such as RDP, VNC and SSH
• Can also be accomplished via “meet-in-the-middle” methods such as:
• TeamViewer
• GoToMyPC
Remote Access Example
Question
• What type of VPN would you want to create between your central
office and a branch office?
• Site-to-site tunnel
Question #2
• You have users that need to make remote connections to your private
network from across the Internet.
• You want to prevent unauthorized access to the private network.
• What should the users use to make their connections?
• VPN
Question #5
• You discover that a users is using RDP to connect across the Internet
to your production network.
• Which of the following changes should you recommend?
• Changing the remote desktop port to a non-standard number
• Setting up a VPN and placing the jump server inside the firewall
Question #6
• You discover that a users is using RDP to connect across the Internet
to your production network.
• Which of the following changes should you recommend?
• Changing the remote desktop port to a non-standard number.
• Setting up a VPN and placing the jump server inside the firewall.
Question #7
SASE GW
SASE GW
SASE GW
Question
Type Consideration
Legal information • Legal advice from an attorney or your legal department
• Classify and protect as confidential
Financial information • Should be classified and protected as private or confidential
Human- and non-human- • Determine the sensitivity level
readable • Mark with classification labels in accordance with legal requirements
• Encrypt and provide access controls as the classification requires
Personally Identifiable • At a minimum, treat as confidential
Information (PII) • Also regulated under most jurisdictions
Personal Health Information • At a minimum, treat as confidential/sensitive
(PHI) • Also regulated under most jurisdictions
Data Considerations
Data Sovereignty
• Data sovereignty is the right to control one's own data based on its
location and origin
• Regulates how data should be governed and secured, specific to the
country where it was collected and not where the collector resides
• With the rise of cloud computing, over 100 countries have passed
some type of data sovereignty law
• Example: Data collected about a country’s citizens can only be stored (geo-
located) on servers in that country
• Data sovereignty complicates data storage and processing for global
enterprises and cloud providers
Data Sovereignty Considerations
• Data sovereignty refers to the concept that digital data is subject to
the laws and regulations of the country in which it is stored.
• This means that when data is physically located within a country’s
borders, the government has jurisdiction over it and can enforce its
data protection policies.
• Can affect the availability and compliance of data
• Does not prevent access to data based on location
• Can vary depending on the country or region
• This principle is particularly important for organizations operating
across international borders
• They must comply with each jurisdiction’s rules where their data resides.
GDPR Data Sovereignty Example
Cloud-based DLP is more likely to have the features needed by a modern network.
Data Flows Everywhere
Steps to Implementing DLP
1. Categorize/classify your data
2. Compile (or obtain) a list of data identifiers such as:
• File extensions
• Key words
• Number and format of numeric digits
• Text patterns, sequences, separations
• Proximity keywords such as
• Social Security number [SSN], password [pwd], credit card number [CCN], etc.
• File type, format and category
• Image, analytics, log data, archived/compressed, spreadsheet, audio, video, database, etc.
• Country-specific identification numbers
• International banking information, addresses, postal codes, national IDs, passport numbers, country
codes, phone area codes, and the like
3. Engage a DLP system to:
• Classify the data based on the identifiers
• Protect the data per your policies and regulatory requirements
DLP Example
Question
*The archive flag is an attribute of a file. It is turned on when a file is created or changed, and turned off
when the file is backed up. Backup software uses it to identify files that have changed since the last backup.
Full Backups Example
Differential Backups Example
Incremental Backups Example
Backup Type Considerations
Type Consideration
Onsite • Good in case of hardware failure
• You can quickly access the backup to restore it
Offsite • Good in case the datacenter suddenly becomes unusable
• The backup will not be caught in the damage
• Cloud-based backups can be accessed from anywhere
Frequency • Choose your backup frequency by how much data you can afford to lose
• A day’s worth? An hour? 15 minutes?
• You must balance the desire for as little loss as possible against the
practicality of constant backups
Encryption Protects backup contents from unauthorized restore or theft
Snapshots • A copy of a virtual machine it its present state
• Good for quickly restoring a VM to its previous state
Backup Type Considerations (cont’d)
Type Consideration
Replication • Good for automatically keeping an alternate database up-to-date
• The primary server can replicate on a scheduled or triggered basis
• The secondary server can then be used for quick failover
• Keep replicated copies/servers geographically dispersed to protect against
natural disasters
Journaling • Good for keeping up-to-the-minute latest copies of a file or database
• Keeps track of changes not yet committed to the database or file system's
main part
• In the event of a system crash or power failure, such databases and file
systems can be brought back online more quickly with a lower likelihood of
becoming corrupted
• Journaling is a built-in feature of most modern file systems including NTFS,
EXT, ReFS, and APFS (Apple File System)
Recovery Choose the backup type (full, incremental, differential) based on either the
desired backup time or restore time, or some balance between the two
Power Redundancy Options
Type Description
Generator • Uses diesel fuel or gasoline
• Can provide large amounts of power for extended lengths of time
• Can be configured to start quickly (within minutes) after a power
failure
Uninterruptible Power Supply (UPS) • Plugs into a wall outlet
• Keeps a charged battery inline between input and output power
• When the facility loses power, the battery will continue to
provide power for a short while – 15 minutes to several hours
• On a server rack, provides power just long enough for an orderly
shutdown of the equipment
Power bank A portable battery and power supply system to run a mobile device
or small camping equipment for a few hours
Solar power pack A power bank that uses sunlight to recharge its battery
Power Redundancy Examples
Question
• You want to go over the disaster recovery plan with team leads.
• Which preparation activity would be the least time-consuming for the
team?
• Tabletop walk-through.
Question #4