Lesson 3 Security Control and Technologies (1)
Lesson 3 Security Control and Technologies (1)
Security controls are essential components in the protection of networks, devices, and data in the face of
evolving cyber threats. Among the most fundamental technologies are firewalls, intrusion detection and
prevention systems (IDPS), antivirus and anti-malware solutions, along with encryption and
cryptographic protocols. Each of these technologies plays a crucial role in establishing a robust
cybersecurity posture for organizations.
Firewalls
Firewalls serve the primary purpose of controlling incoming and outgoing network traffic based on
predetermined security rules. They allow or block network traffic between devices according to
instructions from the firewall administrator.
Firewalls usually sit between a trusted network and an untrusted network; oftentimes the untrusted
network is the Internet. For example, office networks often use a firewall to protect their network from
online threats.
Firewalls decide whether to allow incoming and outgoing traffic to pass through. They can be built into
hardware, software, or a combination of both. The ability of a firewall to determine the legitimacy of
traffic helps in preventing unauthorized access to sensitive data and enforcing policy compliance.
Example: Windows Defender Firewall - Windows Defender Firewall is a built-in firewall included with
Microsoft Windows operating systems.
Features:
Individual Protection: Each workstation has its own firewall, providing a tailored security layer.
Application Control: Monitors and controls the behavior of applications attempting to access the
network.
Ease of Use: Often comes with user-friendly interfaces, allowing users to configure settings
easily.
Advantages:
Granular Control: Offers detailed control over individual applications and processes.
Personalized Security: Customizable for specific user needs and usage patterns.
Disadvantages:
User-Dependent: Requires proper configuration and management by the user, which can lead to
potential vulnerabilities if not handled correctly.
Example: Cisco ASA (Adaptive Security Appliance) - Cisco ASA is a hardware-based network firewall that
provides robust security features for managing and protecting network traffic.
Features:
Advanced Filtering: Capable of deep packet inspection and sophisticated filtering techniques.
Scalability: Can be scaled to protect large networks with high traffic volumes.
Advantages:
High Performance: Designed to handle large volumes of traffic without degrading performance.
Robust Security: Often includes additional security features like intrusion detection/prevention
systems (IDS/IPS) and virtual private network (VPN) capabilities.
Disadvantages:
Cost: Can be expensive to purchase and maintain, especially for small businesses.
Single Point of Failure: If the firewall fails, it can leave the entire network segment unprotected.
The primary use case for a firewall is security. Firewalls can intercept incoming malicious traffic before it
reaches the network, as well as prevent sensitive information from leaving the network.
Firewalls can also be used for content filtering. For example, a school can configure a firewall to prevent
users on their network from accessing adult material. Similarly, in some nations the government runs a
firewall that can prevent people inside that nation-state from accessing certain parts of the Internet.
1. Proxy-based firewalls
These are proxies* that sit in between clients and servers. Clients connect to the firewall, and the
firewall inspects the outgoing packets, after which it will create a connection to the intended recipient
(the web server). Similarly, when the web server attempts to send a response to the client, the firewall
will intercept that request, inspect the packets, and then deliver that response in a separate connection
between the firewall and the client. A proxy-based firewall effectively prevents a direct connection
between the client and server.
A proxy-based firewall is kind of like a bouncer at a bar. This bouncer stops guests before they enter the
bar to make sure they are not underage, armed, or in any other way a threat to the bar and its patrons.
The bouncer also stops patrons on their way out to ensure that they have a safe way to get home and
are not planning to drink and drive.
The downside of having a bouncer at the bar is that when a lot of people are trying to enter or leave the
bar simultaneously, there will be a long line and several people will experience delays. Similarly, a major
drawback of a proxy-based firewall is that it can cause latency, particularly during times of heavy traffic.
Packet filtering firewalls operate at the network layer, responsible for regulating the flow of data packets
between networks. These firewalls rely on pre-defined rules that evaluate specific attributes of the
packets such as source IP, destination IP, ports, and protocols. If the attributes match the established
rules, the packet is allowed to pass through. If not, the packet is blocked.
Types of packet filtering firewalls can be further broken down into static packet-filtering firewalls,
dynamic packet-filtering firewalls, stateless packet-filtering firewalls, stateful packet-filtering firewalls.
In computer science, a "stateful" application is one that saves data from previous events and
interactions. A stateful firewall saves information regarding open connections and uses this information
to analyze incoming and outgoing traffic, rather than inspecting each packet. Because they do not
inspect every packet, stateful firewalls are faster than proxy-based firewalls.
Stateful firewalls rely on a lot of context when making decisions. For example, if the firewall records
outgoing packets on one connection requesting a certain kind of response, it will only allow incoming
packets on that connection if they provide the requested kind of response.
A known vulnerability associated with stateful firewalls is that they can be manipulated by tricking a
client into requesting a certain kind of information. Once the client requests that response, the attacker
can then send malicious packets that match that criteria through the firewall. For example, unsecure
websites can use JavaScript code to create these kinds of forged requests from a web browser.
A next-generation firewall (NGFW) extends the capabilities of traditional firewalls, offering more
comprehensive security solutions. Unlike their predecessors focused primarily on stateful inspection,
NGFWs provide enhanced features to understand and control application traffic, integrate intrusion
prevention mechanisms, and utilize cloud-sourced threat intelligence. This evolved approach ensures a
more meticulous inspection of data packets, accounting for the intricate nuances of modern cyber
threats.
Beyond access control, NGFWs are adept at addressing modern challenges like advanced malware and
sophisticated application-layer attacks. They delve deeper into the data, examining the nature of the
traffic and identifying patterns that could signal potential threats. The integration of threat intelligence
sources within NGFWs ensures they remain updated with the latest threat vectors, maintaining their
effectiveness against evolving cybersecurity challenges.
The emergence of NGFWs represents a significant stride forward. By marrying the fundamental features
of traditional firewalls with advanced security capabilities, NGFWs offer a robust, multi-faceted line of
defense. Their ability to operate at the application layer and integrate additional protection mechanisms
makes them an indispensable asset in safeguarding corporate networks from both conspicuous and
covert threats.
A web application firewall, commonly referred to as WAF, serves as a specialized layer of protection for
web applications, web servers, and APIs. It functions by examining and filtering HTTP traffic, thereby
safeguarding web applications from threats like cross-site-scripting (XSS), SQL injection, and file
inclusion. WAFs differentiate themselves by operating at Layer 7, specifically targeting application layer
threats.
Positioned in front of web applications, WAFs act as reverse proxies. This means that they intercept and
inspect requests bound for the web application, ensuring only legitimate traffic passes through. Any
suspicious or malicious traffic is promptly blocked, preventing potential attacks. This architecture not
only enhances the security of web applications but aids in shielding applications from direct exposure to
internet threats.
To maintain efficiency, WAFs employ policies or sets of rules. These rules help the firewall discern
between benign and potentially malicious traffic. Adjustments to these policies can be executed swiftly,
allowing for immediate response to emerging threats or changing attack patterns. Regular updates to
these rules are crucial.
Functionality of IDS
The IDS is a passive system that monitors traffic and reports results to an administrator, but it cannot
automatically take action to prevent detected exploits. It operates by looking for deviations from normal
activity and known attack signatures. If anomalies are detected, they are sent for further analysis to
determine if a threat exists.
Functionality of IPS
An IPS goes beyond detection, actively analyzing network traffic for malicious content while sitting inline
within the network infrastructure. It can automatically take measures such as blocking suspicious traffic
and dropping malicious packets. This allows it to respond to threats without requiring administrator
intervention, providing a critical layer of security for networks
Example Scenario:
In a corporate environment where numerous employees access the network, the IT security team has
deployed an Intrusion Detection and Prevention System (IDPS) to monitor and protect sensitive data. The
IDPS is configured to automatically detect any unusual activity and respond accordingly, ensuring the
safety of the company's assets.
One day, the IDPS detects unusual login attempts from an external IP address attempting to access the
company's database. This external IP address has already failed several password attempts, which
triggers the alert system of the IDPS. The system identifies this pattern as potentially malicious activity,
indicating that a possible intrusion attempt is underway.
Upon detecting the suspicious activity, the IDPS immediately blocks the offending IP address to prevent
further login attempts. This automatic response is crucial in preventing unauthorized access to sensitive
company data. Moreover, the system generates an alert message to notify the IT team of the incident,
promoting timely investigation and response.
Notification to IT Staff
In addition to blocking the IP address, the IDPS sends an email notification to the systems administrator
detailing the incident. The notification includes information such as the time of the attempted login, the
IP address, and the number of failed attempts. This comprehensive report allows the IT team to rapidly
assess the situation and take any necessary additional measures.
Follow-Up Actions
Following the incident, the IT security team conducts a thorough review to ensure no further
vulnerabilities remain. They analyze the logs generated by the IDPS and reinforce security protocols to
avoid future intrusions. The team may also choose to implement additional layers of security, such as
multi-factor authentication, to bolster defenses against similar attacks in the future.
By employing a balanced combination of policies, procedures, and technologies, security controls enable
organizations to enhance their security posture against malicious activities, proactively identify security
gaps, and ensure a resilient operational environment. This comprehensive approach ensures the
seamless integration of security measures, allowing organizations to operate securely in the ever-
evolving digital landscape.
Email Gateway Security Solutions: Protects email systems from threats such as phishing,
malware, and spam.
Web Security Gateway: Safeguards web traffic by blocking access to malicious sites and filtering
harmful content.
To have a more solid understanding, we can see an arbitrary organizational structure that shows how
these solutions can be placed.
Testing the Effectiveness of Preventative Security Solutions with Picus Complete Security Validation Platform
We observe that the Next-Generation Firewall (NGFW) is positioned as the first preventative layer
solution, interfacing between the Internet and the organizational network, followed by the Intrusion
Prevention System (IPS). It’s also noted that the Email Server is fortified by a Mail Security solution.
Additionally, the Web Application server, as the name suggests, is shielded by a Web Application Firewall
(WAF) solution. Furthermore, HQ Endpoints and the Data Center, which harbor sensitive information, are
secured through a robust Proxy solution.
It’s imperative that the effectiveness of these security controls be continuously validated and improved to
combat both emerging and known cyber threats, ensuring that the organization's information assets
remain secure and resilient against the evolving threat landscape.
These solutions enable continuous monitoring of network traffic and endpoint activities, providing alerts
for suspicious behaviors and potential threats.
Detection layer solutions are crucial for identifying threats within systems, designed to detect
unauthorized alterations, access, and disabling of services, such as creating new registry keys and
disabling Windows Defender.
The use of command-line tools for displaying network configurations and querying DNS infrastructure
may trigger alerts due to their reconnaissance nature.
Additionally, execution and removal of batch script files, abnormal termination of security services, and
creation of ransom notes are significant indicators of compromise, which modern detection solutions are
designed to identify promptly, utilizing network analysis, behavior analysis, and signature-based
detection mechanisms.
While prevention aims to block threats before they breach the first layer of perimeter controls and cause
disruption to organizational networks and systems, detection's role is to swiftly identify and respond to
threats that have managed to bypass the preventative barriers, thus ensuring comprehensive security.