CRISC

Course
Time
6 hours 30 minutes
Difficulty
Advanced
CEU/CPE
7

Video Transcription

00:00
all right. Our next step, we looked at threat modeling, secure design and engineering. While those two elements apply to working with the network, we have to think about protecting our network building securely and then continuing to secure throughout the network life cycle. So
00:19
first thing that we're gonna talk about
00:21
is network protection. If you were to hire me to come out to your company and say, Kelly, I need you to give a security speech. In less than five minutes, I would walk out in front,
00:33
tell your audience segmentation is important.
00:38
Then I take my check and I would leave.
00:41
Okay. You probably don't want to hire me to come to your office for less than five minute lecture. But in all seriousness, if I had nothing but a couple of minutes to tell you how to protect your network segmentation
00:53
separate out trusted resource is thes air. The things that I want to protect from untrusted entities don't let untrusted entities access your trusted resource is Well, how do I do that? I segment my network in two different layers of trust. So for Internet and, uh,
01:12
for instance,
01:14
the internet is the greatest area of untrusted. Untrustworthy, right, the Internet. We don't trust anything there while our local area network is very trusting.
01:26
And then we might have a d M. C. That is semi trust.
01:30
So the idea is, I use devices like firewalls to create the separate segments on my network.
01:37
Routers do that. Routers segment the network. They divide the network up into separate sub nets, if you will. And then villains do that. Also, vey lands stands for virtual lands.
01:51
The lanes are very quickly replacing routers because they can essentially do everything. A router used to be done,
01:57
particularly if Dylan's air implemented on a Layer three switch. Now that's more technical than we're gonna go in this class. Absolutely. But you know, when we're looking at areas of segmentation, the devices that do this force routers,
02:13
virtual lands, firewalls. Okay, now lots of different types of firewalls. The first firewalls called the packet filter, and that's a very low in, but it's very fast firewall.
02:27
What that would set his things like source and destination. I p address. It looks at port number looks a protocol usage, and it makes a decision.
02:37
Usually firewalls, we're gonna use what we refer to his white listing and white listing means everything's walked
02:45
except what I allow on the white list, so to speak. So that's kind of Ah, none shall pass. Sort of means Okay. Now, with Black listing the problem with white listing even though it's very good for devices like firewalls, think about spam filters.
03:04
I'm not gonna allow any email to come through except from these 10 known domains.
03:09
We're gonna miss out on the Thanh of email. So white listing. Where is white listing blocks? Everything Black listing allows everything except what is expressly forbidden on the blacklist.
03:23
Okay, s So that's one type of firewall. Very basic. These used to be called generation One.
03:30
Then we have state full firewalls. These were called generation three. Don't ask me what happened to I do not know.
03:37
Eso state Full firewalls are aware of the connection state between devices. So is where, with a packet filter. Very basic firewall. I could block D N s Block and D and s is gonna prevent a lot of necessary traffic
03:54
with the state Full firewall. I can block misbehaving D N s. I can block a D. N s reply when it's not the result of a query that's called unsolicited reply, and that's a problem. But because state full firewalls can view the state of the connection, we can do that with state full firewalls. So that's a step. Better
04:15
application proxies. Though those air the devices that are the smart moons, you might hear him just called proxies. You could hear him called application gateways. Colonel Firewalls You know these air your Gen five again. Jen four.
04:30
I don't know,
04:31
but generations five. These air the devices that are specific to application layer protocols so you'll have a Web proxy. You'll have an FTP proxy. You'll have a male proxy, but what they need but that means is thes prop Cesaire very specialized into a specific protocol,
04:49
so your Web proxy can look for things like malformed or
04:55
yet malformed, a cheapie headers or malicious injection, perhaps Karl site scripting. So we get a lot deeper inspection with application firewalls,
05:09
but deeper inspection is slower,
05:12
so when you look at packet filters the most basic, they're cheap and fast. When you go up the application proxies. They cost more money, but they're and they're slower, but they're more.
05:23
Okay. Ah, that other idea was segmentation. I just mentioned the d M Z is a semi trusted zone. So you're going to allow traffic from the Internet into the d M Z, but it's gonna be very restricted. What you can allow you're not gonna allow everything in there. So you've got some control over the network. But because you're allowing
05:43
the
05:44
because you're allowing
05:46
access from the Internet, it's not full of trust.
05:49
And then the idea of air gaps, I'll tell you what the best way to secure network computer
05:55
pull it right off the network, right? So physically segmenting your own router A. Your own router be unless you provide some means of connectivity. That's pretty good segmentation. So that's what they mean by air gaps. So segmentation in my mind
06:13
is the single most important concept
06:16
in network security.
06:17
Isolate, trusted from untrusted.
06:21
And then, if untrusted entities have to access your precious resource is
06:27
make sure that that protection or that access is guarded, that you use devices for screening like firewalls, and that you make sure front and applications do the same things AP eyes. So whether it's in a system or an application,
06:45
Web app, database, whatever,
06:46
we make sure that untrusted doesn't access trust

Up Next

CRISC

This course on Certified in Risk and Information Systems Control is for IT and business professionals who develop and maintain information system controls, and whose job revolves around security operations and compliance.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor