10 Common Network Security Design Flaws PDF
10 Common Network Security Design Flaws PDF
0
10 common network security design flaws October 23, 2009
By Brien Posey
Network security is arguably one of the most critical functions of IT—yet I frequently see organizations that have
overlooked easily implemented security design practices. Here are a few common mistakes that could
compromise your network defenses and put company assets at risk.
Page 1
Copyright © 2009 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc
For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
10 common network security design flaws
We all know that a Web site needs to use SSL encryption any time a user is going to be entering sensitive
information, such as a username and password or a credit card number. However, many organizations make
some bad decisions when it comes to securing their Web portals. The security flaw I see most often is including
insecure content on a secure page. When this happens, users receive a prompt asking if they want to display
both secure and insecure content. This gets users in the habit of giving Internet Explorer permission to provide
insecure content.
A less obvious but even more common problem is that organizations often fail to encrypt critical pages within their
Web sites. In my opinion, any page that provides security information, security advice, or contact information
should be SSL encrypted. It isn't that these pages are especially sensitive. It's just that the certificate used by the
encryption process guarantees to users that they are accessing a legitimate Web page rather than a page
someone has set up as a part of a phishing scam.
Since some organizations completely neglect the importance of SSL encryption, Microsoft has begun to include
self-signed certificates with some of its products. That way, Web interfaces can be used with SSL encryption even
if the organization hasn't acquired its own certificate yet.
While self-signed certificates are better than nothing, they are not a substitute for a valid SSL certificate from a
trusted certificate authority. Self-signed certificates are primarily intended to help boost a product's security until
an administrator can properly secure it. Yes, a self-signed certificate can provide SSL encryption, but users will
receive warning messages in their browsers because their computers do not trust the certificate (nor should they).
Furthermore, some SSL-based Web services (such as ActiveSync) are not compatible with self-signed certificates
because of the trust issue.
Although it's important to log events that occur on your network, it's also important not to go hog wild and perform
excessive logging. Too much logging can make it difficult or impossible to locate the security events you're really
interested in. Rather than trying to log everything, focus on logging the events that are really meaningful.
I recommend using dedicated virtualization hosts for any Internet-facing virtual servers. In other words, if you
have three virtual servers that provide services to Internet users, you might consider grouping those servers on a
virtualization host, but don't put infrastructure servers (such as domain controllers) on the host.
My reasoning behind this is to provide protection against an escape attack. An escape attack is one in which a
hacker can escape from a virtual machine and take control of the host. To the best of my knowledge, nobody has
figured out a way to perform a real-world escape attack yet, but I'm sure that day is coming. When it does, your
odds of prevailing against the attack are going to be a lot higher if virtual machines that are exposed to the
Internet share a virtualization host only with similarly hardened Web-facing servers.
Page 2
Copyright © 2009 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc
For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html
10 common network security design flaws
Additional resources
Version history
Version: 1.0
Published: October 23, 2009
TechRepublic downloads are designed to help you get your job done as painlessly and effectively as possible.
Because we're continually looking for ways to improve the usefulness of these tools, we need your feedback.
Please take a minute to drop us a line and tell us how well this download worked for you and offer your
suggestions for improvement.
Thanks!
Page 3
Copyright © 2009 CNET Networks, Inc., a CBS Company. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc
For more downloads and a free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html