Lesson 9
Lesson 9: Network Security Capabilities
Security Baselines
What is Baseline Configuration?
Standard, secure starting point for systems/networks/applications before deployment
Benchmarks and Guides:
Security Baseline: Collection of standardized best-practice configurations to harden systemsCIS Benchmarks: Community-developed, consensus-based configuration standardsSTIGs (Security Technical Implementation Guides): DoD configuration guides for federal networksVendor-Provided Guidance: Security documentation from hardware/software vendorsSCAP (Security Content Automation Protocol): NIST standards for automating vulnerability managementOpenSCAP: Open-source framework for compliance monitoring using SCAPCISCAT Pro: CIS tool that scans systems and reports compliance with CIS BenchmarksSCC (SCAP Compliance Checker): DoD tool to assess STIG/SCAP compliance
Configuration Management Tools:
Puppet, Chef, Ansible: Automation tools to deploy and enforce baselines across large-scale environments
Switch and Router Hardening
Change Default Credentials: Replace factory-default usernames/passwordsDisable Unused Ports/Services: Shut down all unused physical ports and services (Telnet, FTP, SNMP)Use Secure Management Protocols:- Replace Telnet with
SSH - Use
HTTPSinstead of HTTP - Enable
SNMPv3over SNMPv1/2
- Replace Telnet with
Implement ACLs (Access Control Lists): Define traffic rules (permit/deny based on IP/port/protocol)Enable Logging & Monitoring: Configure syslog servers, SIEM tools, real-time alertingConfigure Port Security: Restrict MAC addresses per port, sticky MAC, shutdown/restrict modesStrong Passwords: Complex passwords, regular changes, MFA where availablePhysical Security: Locked racks, server rooms, tamper-evident seals
Server Hardening
Disable Unnecessary Services: Turn off non-essential daemons (FTP, Telnet, print services)Apply Regular Updates & Patches: Keep OS and apps up to dateEnforce Least Privilege: Minimum access requiredUse Firewalls & IDS:Host-based Firewalls: Restrict traffic on the serverIDS: Monitor suspicious activity (HIDS like OSSEC)- IDS behind router ensures visibility of all traffic
Apply CIS/STIG Baselines: Standardized secure settingsEnable Logging & Monitoring: System/security logs to SIEMUse Antivirus/Antimalware: Up-to-date endpoint protectionPhysically Secure Servers: Locked racks, access control, cameras/alarms
Wireless Security
Installation Considerations:
Site Surveys & Heat Maps: Optimize WAP placement and coverage
Wireless Encryption Standards:
Open: No encryption, insecureWEP (Wired Equivalent Privacy): Outdated, insecure (1990s)WPA/WPA2: Stronger, still in useWPA3: Uses SAE (Simultaneous Authentication of Equals) for secure key exchangeEnhanced Open: For public networksDPP (Device Provisioning Protocol): Replacement for insecure WPS (Wi-Fi Protected Setup)
Authentication Methods:
WPA2/3 Personal: Pre-Shared Key (PSK)WPA2/3 Enterprise: Uses 802.1X authentication with RADIUS and EAP
EAP Types:
EAP-TLS: Uses TLS with client + server certificates, very high security (enterprise Wi-Fi)PEAP (Protected EAP): Server cert + tunnel with MSCHAPv2 (username/password), medium securityEAP-TTLS: Server cert + tunnel with flexible auth (PAP, CHAP), medium-high securityEAP-FAST: Uses PAC (pre-shared key) instead of certs, medium security (Cisco networks)LEAP (Lightweight EAP): Uses MSCHAPv1, very low security, deprecated, never use
Network Access Control (NAC)
Purpose: Validates users/devices before granting network access
Types:
Agent-Based NAC: Requires software on endpointsAgentless NAC: Uses network scans and fingerprinting
Example tool: PacketFence (supports Nessus, OpenVAS, WMI, log parsers)
Network Controls
Access Control Lists (ACLs):
Rules defining permitted/denied traffic Applied on routers, firewalls, switches Based on: Source/Destination IP, Protocols, Ports
Screened Subnet (DMZ):
Isolated network area separating public services from internal systems
Firewalls and UTM
NGFW (Next-Generation Firewall):
- Layer 7 (application layer) filtering
- Inspect SSL/TLS, detect malware, block applications
UTM (Unified Threat Management):
Combines firewall, antivirus, IDS/IPS, content filtering into one device
IDS/IPS
Types:
HIDS (Host-Based IDS): Monitors single devicesNIDS (Network-Based IDS): Monitors traffic across networksIPS (Intrusion Prevention System): Actively blocks threats
Detection Methods:
Signature-Based: Matches known attack patternsAnomaly-Based: Flags behavior outside baselinesBehavioral-Based: Tracks typical user/system behaviorTrend Analysis: NBAD (Network Behavior), UEBA (User/Entity Behavior)
Common Tools: Snort, Suricata, OSSEC
Web Filtering
Purpose: Restrict web access, block threats
Techniques:
- Agent-Based Filtering
- Centralized Filtering
- URL Scanning & Categorization
- Reputation-Based Filtering
- Block Rules
- HTTPS Decryption/Inspection
Use Cases: Block malware/phishing, enforce acceptable use, prevent data exfiltration
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources