Security Infrastructure Design Document
Security Infrastructure Design Document
I Introduction
In our contemporary world Security concept acquire more importance and
focusing in daily life and business, its critical piece in major industries.
All organizations keep cyber security on the top of its agenda, Cyber Security is
one of success criteria for all organizations.
High secured structured policies, secured system infrastructure items & Firm
security culture are core of security process, all of these will be covered in the
following lines.
D. ACLS; Organizations can use access control lists (ACL) to secure data. One of
the major reasons to use access control lists is to restrict unauthorized users from
accessing business-sensitive information. It can also be used to control network
traffic by limiting the number of users accessing files, systems, and information.
B. Deny Any/Any; Create a deny all, inbound and outbound as the first created
and last firewall rule processed. Also known as a ‘Default Deny,’ it ensures
that all rules created after these initial denies are purposeful.
If possible, create different groups of IPs and ports that make sense, which
allows you to create a set of firewall rules, and primarily use groups where
you can add/remove individual components. Ensure your rules specify the
VII Recommendations
Here is some techniques & tools you can apply to harden your network security,
- Promiscuous mode, Promiscuous mode is often used to monitor network
activity and to diagnose connectivity issues. It is sometimes given to a network
snoop server that captures and saves all packets for analysis, for example, to
monitor network usage.
- Port mirroring, allows the switch to take all packets from a specified port, port
range or entire VLAN and the packet to the specified port to gain access for all
packets on the switch
- We can insert Hub into the topology on devices you want to monitor the traffic
- Monitor mode, Allows us to scan access channels to see all wireless traffic being
sent by APS Clients
Open sources for Capture and monitoring utility like Kismet or Air cracking
- Wireshark, Wireshark is better than Tcpdump, can analyse important traffic using
packet capture
- IDS/IPS System for monitoring network traffic and analysing it.
- Disable all unnecessary protocols or component, to decrease the surface
of breaching or attacks
- Reduce software deployment
- Any vendor specific AP access should be disabled, if you don’t plan using this
service or tool
- Using Microsoft 365 defending services, Microsoft 365 Defender is a unified
pre- and post-breach enterprise defence suite that natively coordinates detection,
prevention, investigation, and response across endpoints, identities, email, and
applications to provide integrated protection against sophisticated attacks.
- Using UAC (User account control), helps prevent malware from damaging a PC and
helps organizations deploy a better-managed desktop
- Application Policies, only support or require latest version of a piece of software
- Users habits, Habits and actions of users involve, having a clear and reasonable
security policies by understanding what employees need to accomplish their jobs,
you also make sure that they have the right tools to get their work done without
compromising security
Employees should never upload confidential information onto a third-
party services that hasn’t been evaluated by your company
- Password policies; it’s important to understand what threats password policies
are supposed to protect against. That way to find a better balance between security
& usability, we adjust the mandatory password rotation period
It’s important to make sure employees use new and unique passwords, and don’t
reuse them from other services
Also important to have a password change system check against old passwords, this
will prevent users from changing their password back to a previously used potentially
compromised password.
-User should be aware & educated about credential theft from phishing emails
If someone entered their password into a phishing site, or even suspects they did, it’s
important to change their password as soon as possible
We need to use tool like password alert, Password Alert is a Chrome extension
that helps Google Workspace and Cloud Identity users avoid phishing attacks by
detecting when they enter their Google password into any websites other than the
Google sign-in page.
- Third party security; It's important to hire trustworthy and reputable vendors
whenever you can
For software services, or hardware vendors, you might also ask to test the software/
hardware, that way, you can evaluate it for potential security vulnerabilities
or concerns before deciding to contract their services. It's important to understand
how well-protected your business partners are, before deciding to work with them
- Provide Security training for users; this will boost a healthy company culture
and overall attitude towards security
- Incident report, analysing & Recovery plan; here we have a critical data
which requires extra care and high incident response;
Credit card or payment card industry information (PCI)
Personally identifiable information (PII)
Export administration regulations compliance (EAR)
- Chain of custody; refers to a process that tracks evidence movement through its
collection, maintaining chain of custody make difficult for someone to argue that the
evidence tampered with or mishandled.
- Mobile security and privacy policies and regulations : Keeping users
mobiles safe and secured critical because it can contain important information and
data
- Bring your own device (BYOD) Policies; BYODs can become dangerous
security threats to companies’ data and networks, to mitigate these threats
You need to know if your company has legal requirement related to security
VIII Conclusion
Security is all about determining risks or exposure; understanding the
likelihood of attacks and designing defences around these risks to minimize the
impact of an attack
The balance between productivity and security is critical point you’re your
organization
Having define and well establish privacy policy is important part of good
privacy practice
Company policy acting as a guidelines in informational resources on how to
access and not access and handle data
Security subject is common responsibility between users & security team, no
one of two parties can survive alone