Sunday 8 October 2017

Cyber Security (Security Architecture)



SECURITY ARCHITECURE


Security architecture describes the structure, components, connections and layout of security controls within an organizations IT infrastructure. Organizations have different types of security architectures that determine the particulars of various subsystems, products and applications. These particulars will in turn influence an organizations approach to defense in depth, or the practice of layering defenses to provide added protection.

Security architecture shows how defense in depth is implemented, as well as how layers of control are linked. It is therefore essential to designing and implementing security controls in any complex environment.

Each component of a given system poses its own security risk. Because the topology of security architecture varies from one organization to another, there are a number of different variables and risk to consider when addressing the topology of a particular organization. This section will discuss those variables individually, along with best practices for successfully managing their related risk.

The Virtual Organizarion
Outsourcing, both onshore and offshore, is increasingly common as companies focus on core competencies and ways to cut costs. From an information security point of view, these arrangements can present risk that may be difficult to quantify and potentially difficult to mitigate. Typically, both the resources and skills of the outsourced functions are lost to the organization, which itself will present a set of risk. Providers may operate on different standards and can be difficult to control. The security strategy should consider outsourced security services carefully to ensure either that they are not a critical single point of failure or that there is a viable backup plan in the event of service provider failure.13

Much of the risk posed by outsourcing can also materialize as the result of mergers and acquisitions. Typically, significant differences in culture, systems, technology and operations between the parties present a host of security challenges that must be identified and addressed. Often, in these situations, security is an afterthought and the
security manager must strive to gain a presence in these activities and assess the risk for management consideration.14
 The Security Perimeter
Many current security controls and architectures were developed with the concept of a perimeter—a well-defined (if mostly virtual) boundary between the organization and the outside world. In these models of cybersecurity, the focus is network- or system-centric. In the system-centric model, the emphasis is on placing controls at the network and system levels to protect the information stored within. An alternative model is data-centric, which emphasizes the protection of data regardless of its location.

With the advent of the Internet, outsourcing, mobile devices, cloud and other hosted services, the perimeter has expanded considerably. Consequently, there are significant new risk and vulnerabilities to confront in this
hyper-connected and extended environment. The perimeter, then, is an important line of defense that protects the enterprise against external threats, and its design should reflect a proactive stance toward preventing potential risk.

An important component of the security perimeter is the Internet perimeter. This perimeter ensures secure access to the Internet for enterprise employees and guest users residing at all locations, including those involved in telecommuting or remote work. In order to provide security of email, front-end mobile and web apps, domain name system (DNS), etc., the Internet perimeter should:
Route traffic between the enterprise and the Internet
Prevent executable files from being transferred through email attachments or HTTP responses
Monitor network ports for rogue activity

Detect and block traffic from infected internal end points

Control user traffic bound toward the Internet
Identify and block anomalous traffic and malicious packets recognized as potential attacks
Eliminate threats such as email spam, viruses and worms
Enforce filtering policies to block access to web sites containing malware or questionable content

The perimeter should also provide protection for virtual private networks (VPNs), wide area networks (WANs) and wireless local area networks (WLANs).

For VPNs, this protection should be threefold:
1. Terminate VPN traffic from remote users
2. Provide a hub for terminating VPN traffic from remote sites
3. Terminate traditional dial-in users

VPN traffic is first filtered at the egress point to the specific IP addresses and protocols that are part of the VPN
service. A remote user can only gain access after being authenticated.

For WANs, security is provided by input/output system (IOS) features. Unwanted traffic can be blocked from the remote branch using input access lists, and IP spoofing can be mitigated through L3 filtering. Organizations that are very concerned about privacy may choose to encrypt traffic on their WAN links.

Interdependencies

As previously discussed, modern IT architectures are usually decentralized and deperimeterized. This includes a growing number of cloud-based platforms and services, as well as a shift in computing power and utilization patterns toward intelligent mobile devices such as tablet PCs or smartphones. As a consequence, both the number of potential attack targets outside the organizational boundary and the number of attack vectors have grown. Conversely, the degree of control over deperimeterized environments has been significantly reduced, especially in enterprises permitting partial or full integration of user-owned mobile devices (i.e., bring your own device [BYOD]). These changes have important ramifications for security architecture.

In distributed and decentralized IT architectures, the third-party risk is likely to increase, often as a function of moving critical applications, platforms and infrastructure elements into the cloud. For platforms, storage infrastructure and cloud-based data repositories, the focus of cybersecurity is shifting toward contracts and service level agreements (SLAs). Simultaneously, third-party cloud providers are facing an increased risk of attacks and breaches due to the agglomeration and clustering of sensitive data and information. In addition to concerns about third-party services, there is significant legal risk. Enterprises experiencing a loss of sensitive data may not be in a position to bring an action against the perpetrators because the cloud provider often has to initiate legal action.

Regardless of the generic information security arrangements made by an enterprise, there are often exposed areas within IT architectures. Cybercrime and cyberwarfare perpetrators continue to aim at weak spots in architectural elements and systems. In contrast to indiscriminate and opportunistic attacks, APTs and cybercrime always rely
on preparatory research and insight into the target enterprise. This, in turn, raises the level of exposure for weak or unsecured parts of the overall architecture. These vulnerable spots include legacy systems, unpatched parts of the architecture, “dual persona use of mobile devices and many others.

No comments:

Post a Comment