Threat defense : Security Design
Security Design of the network: Cisco Safe
Branch
The branch PINs are usually less secure compared with campus and data center PINs since branches are greater in number. Implementing all of the security features used in campus and data center PINs would be costly, making them perfect candidates for security breaches.
Threats:
Endpoint malware, wireless infrastructure vulnerabilities, unauthorized and malicious client activity, and trust exploitation
Campus
Campuses accommodate a large number of users, including personnel, guests, etc
Threats: . Phishing, web-based exploits, unauthorized network access, malware distribution, and botnet attacks are prevalent on campus PINs.
Data Center
Data centers are the primary focus of all targeted threats because they store an organization’s most valuable information assets and intellectual property. In addition, a data center can have thousands of servers. In data centers, servers are typical, making it hard to install and maintain adequate security policies to regulate network access.
Threats:data acquisition, malware distribution, unauthorized network access, botnet infections, data loss, backdoors, and reconnaissance.
Edge
The Internet edge is the most critical PIN since it is the primary entrance and exit point for traffic to and from the Internet.
Threats: web server vulnerabilities, DDoS attacks, data loss, and Man-in-the-Middle attacks.
Cloud
Service-level agreements (SLAs) with cloud service providers mandate cloud security and necessitates independent certification audits and risk assessments.
Threats: web server vulnerabilities, loss of data and access, malware, and Man-in-the-Middle attacks.
Wide Area Network (WAN)
The WAN links all of the PINs. Managing WAN security can be very difficult, especially with hundreds of branches.
Threats: unauthorized network access, WAN sniffing, malware propagation, and Man-in-the-Middle attacks.
Cisco SAFE Secure Domains
- Management – coordinates policies, objects, and alerts. It uses centralized services to manage workflow changes, policy deployments, and patching systems.
- Security Intelligence – used to detect malware and emerging threats. It also allows dynamic policy enforcement for accurate and appropriate security.
- Compliance – PINs must comply with security requirements such as PCI DSS 3.0 and HIPAA.
- Segmentation – defines data and user boundaries. Traditional manual segmentation employs network addresses and VLANs for policy enforcement, while advanced segmentation incorporates identity-aware infrastructure.
- Threat Defense – provides cyber threat visibility through network traffic telemetry, file reputation, and contextual data. It assesses the nature and possible risk of suspicious activities to respond appropriately to cyber threats.
- Secure Services – include Virtual Private Networks (VPNs), access control, and encryption. The security services also enable protection against insecure services through various methods such as authentication and authorization to secure access.
No comments: