Network Security Risks And Controls
Failure to perform the vendor risk assessment
Risk: Impact
to IT projects, interrupt business operation.
Control: Is to
carry out the vendor risk assessment regularly and review on SLA/NDA and work
with CARA team where appropriate.
Weakness
on Network remote access control
Risk: Network
infrastructure intrusion. Impact on business operation.
Control: Harden
remote access controls: IAS to centralize AAA, AD rights management service,
VPN client access. Set up the controls environment of AAA appliance, AD group
policy privilege management and VPN client access the schedule with the Pen
Test. Apply Firewall rules (inbound/outbound).
Unauthorized
access to the network infrastructure
Risk:
Intruder attacking and interrupt to business operation.
Control: AAA
appliance must be in place. Harden on Firewall rules. Monitor log in comply
with AAA appliance. Review on Firewall rules and do Pen Test.
Insufficient
controls on Wireless Access
Risk: Packet
sniffing, IP spoofing, network system intrusion, and impact on business
operation.
Control: WEP,
WPA, Encryption have to be in place. Hide SSID. Apply WEP, WPA2 and encryption
on the share key. Hotspot user authentication. SSID must be hidden.
Improper
backup and testing plan on network security devices
Risk: Potential
risk of business interruption and financial loss
Control: Clear
procedure on performing back up and test plan with proper scheduling.
Scheduling and monitoring on the job of back up and test plan must be regularly
performed. Maker and checker with dual controls.
Absent
of Network sniffing monitoring controls
Risk: Data
leakage, private information, user ID, password are captured by sniffer.
Interrupting the security of the network.
Control:
Encryption SSH, SSL, automate controls on malicious attacks detection
mechanism. Encrypt data with SSH, SSL. Avoid one-time password. Use other tools
such as Kerberos, Deslogin, VPN, SMB/CIFS
Weakness
on Firewall rules
Risk: Network
security intrusion. Business operation impact due to the outside attack
Control: Apply
strongly Firewall rules, encryption (inbound/outbound) and cryptographic, AAA
appliance. Set up Firewall rules which allow the authorize access in Firewall
devices (Cisco ASA, Juniper…). Do Pen Test with any loophole.
Weakness
on network infrastructure design
Risk: Network
system attack from intruder. System hacking cause to business operation impact.
Control: Update
the network baseline for both physical and logical design. Firewall rules and
controls need to be in place. Regularly review and update the network baseline
(plan to upgrade) and identify problem areas that are falling out of compliance
(Pen Test).
Poor
Router configuration
Risk: Network
security intrusion. Impact on business operation
Control:
Strictly on allowing route (from branches or business operation). NAT/ACL on
inbound/outbound access. Base on P&P, set up the router configuration which
allow only on AAA. Disable CDP neighbor which intruder might use to sniff/spoof
the traffic. Core layer must comply with the strong restriction.
Poor
Switch Configuration
Risk: Packets
overflow to the entire network which causes the slowest network performance.
Control:
Separate VLAN for each department, which are controlled on bandwidth, privilege
access, and collision domain. Sticky on network access port for authorized
users. Create separate VLAN (Department, Staff, Guest, Management…). Define the
privilege access to those groups of AD. Set switch port security which allow
only the authorized access devices (MAC Address).
Default
password of console/network not change
Risk: Easily
login and get harmful to the network security and also organization operation.
Intruder/insider can exploit and gain access to the default setting of network
devices.
Control:
Disable/ harden the default password of console/network. Regularly change the
password with policy requirement. After finishing the configuration of network
devices, change the strong password of consoles and use AAA appliance or TACAS
server for login log.
Weakness
of password rules or No password policy and awareness
Risk:
Intruder easily attacks the whole network security system and destroys it.
Business operations hang/stuck.
Control:
Password length is at least 8 characters and be aware of strong password
policy. Set up the strong password to every network devices, especially the
network security device or core system. Be trained to all users aware of
password policy.
All
critical systems and network devices yet deployed into the centralization log management
system
Risk: No
tracking report on network system login log. Segregation of duties not in place
which cause high risk to the network security and interruption of business
operation.
Control:
Segregation of duties must be in place. Maker and checker closely cooperate.
Centralized login server (TACAS) is set up. Set up TACAS server.
Misappropriation
of Change/configuration
Risk: The
critical network system is down and interrupts business operation.
Control: Well
prepare the proper plan on the change, which go through many related teams
consultation and advice with contingency plan for the change failure. Prepare the change plan with approval from related teams especially CARA team. And schedule the change with contingency plan in case the failure.
consultation and advice with contingency plan for the change failure. Prepare the change plan with approval from related teams especially CARA team. And schedule the change with contingency plan in case the failure.
No
IP Security protocol/device
Risk: Date
leakage. Data transmission is captured by the hacker/intruder. Data lost.
Control: IPSec
service and protocol are enabled at any higher layer TCP/IP. Encryption,
authentication, tunnel/trunk are set with secure. IP Security devices are
installed for any branches.
No
audit trail and documentation
Risk: No
record of the log events or documentation on network security management.
Control: Create
Audit Trail and system Logs management and do it effective. Prioritize log
management appropriate and establish policies and procedures of log management
and create & maintain a secure log management infrastructure and finally
provide proper training to all staff.
Poor
DMZ implementation
Risk: Any
outside attack into network security and then to the servers (Web servers, Mail
server, FTP server, and VoIP server).
Control: Use DMZ
Gateway which has much multi-platform solution that work with conjunction
inbound and outbound. Set up DMZ device and software to define the authorize
access align with compliance policy.
Use
root Account to remote over the Internet without firewall set
Risk:
Intruder/hacker easily compromise into the network system
Control:
Firewall rules are set. Over the remote must be authentication and token
device. Set up Firewall rules aligns with security P&P, and use
authentication with Token Dongle for secure VPN client over the internet.
Man-in-the-middle
attack over the vulnerable system/network
Risk:
Denial-of-service attacks. Bypass IP address-based authentication. Network
security compromise.
Control: Packet
filtering, Cryptographic. Use packet filtering and avoid trust relationships
and use spoofing detection software and finally use cryptographic network
protocols (TLS, SSH, HTTPS….).
Man
in the middle of attack
Risk: The man
(intruder) is compromising the network security.
Control:
Strengthen communication, Cryptographic, risk awareness to user/victim.
Conventional cryptographic countermeasure. IT Risk awareness must in place to
all users.
Lapse
in Root/Super ID handling
Risk: Lead to
system compromise and data leakage. Unauthorized access could not be mitigated.
Control: Follow
the P&P of IDs. Comply strictly of Root/Super IDs procedure and review all
related critical system/network security devices root/super IDs to be action
taken accordingly.
TCP/IP
Hijacking
Risk: Data
leakage. Illegitimate conversation between a sender and a receiver. Intruder
intercepts the packets.
Control: Encrypt
protocol (IPSEC, SSL, SSH, Transport and Tunnel). Track on the
re-authentication during a session. Ciphering the packets.
No
bandwidth management
Risk:
Uncontrollable on network bandwidth access with cause to slow performance over
the corporate network.
Control: VLAN classification and proxy management. Create the classified VLAN to access group and define the bandwidth utilization to them. Keep monitor on the use of traffic flow.
Control: VLAN classification and proxy management. Create the classified VLAN to access group and define the bandwidth utilization to them. Keep monitor on the use of traffic flow.
No
furnish physical security tools (Alarm, Smoke, Humidity, and robbery, chemical,
CCTV…)
Risk: Network
security devices in DC can be impacted.
Control:
Regularly check/review on the physical security tools. Work with office
administration team to regularly review on physical security tools DC.
Buffer
overflow (HW life cycle)
Risk: Network
devices stuck/hang due to over use. Interrupt the business operation.
Control:
Regularly monitor/check the network devices performance. Back up devices. Set
up proper schedule monitor/check CUP, UPS, HDD, MEMORY, and others). Reserve
the backup devices of the critical network devices or vendor service
maintenance.
No
BYOD policy
Risk: Any
attack to network security system.
Control: BYOD
policy must be in place. Conduct the training on IT risk awareness to all users.
Raise BYOD policy to management team and enforce it.
No
proper SLA/NDA with internet/connection service provider/supportive vendors
Risk:
Connection lost, Data leakage, Reputation lost. Impact to business operation.
Control:
Sign-off on the SLA/NDA with ISP/supportive vendors on full HA and regularly
review on time of SLA/NDA with ISP/supportive vendors to bring full HA of
network infrastructure and maintenance support.
USB Flash Drives
Risk: The dangers of these innocent-looking
portable devices have been known for long enough. USB drives are also one of
the most common ways a network can get infected from inside a firewall.
Control: Have clear security policies
regarding personal storage devices including who can use them and in what
places. Restrict the computers that can read USB flash drives and help prevent
unauthorized access by encrypting the data as soon as it hits the device.
Mobile devices
Risk: Phones, tablets, and unencrypted laptops
pose some of the greatest risks to web security. Think about all the VPN
connections, cached passwords in web browsers, and emails containing sensitive
login information that you – and likely everyone else responsible for managing
your web environment – have stored on mobile devices.
Control: Instill clear data management rules
for all employees and make mandatory data encryption part of your security policy. This is becoming even more important
with employees connecting their personal devices to the corporate network.
Misconfigured firewall rule bases
Risk: One of the biggest, most dangerous,
assumptions is that everything is well in the firewall because it’s been
working fine. Digging into a firewall rule base that has never been analyzed
will inevitably turn up serious configuration weaknesses that allow for
unauthorized access into the web environment. Sometimes it’s direct access
while other times it’s indirect from other network segments including Wi-Fi –
parts of the network that may have been long forgotten.
Control: Start with your organization’s
security policy; one that reflects the current situation and foreseeable business
requirements. After all, your firewall rule base is the technical
implementation of this security policy. Review it regularly and keep it
relevant. OWASP provides some good guidance on building operational security guides.
Missing patches
Risk: All it takes for an attacker, or a
rogue insider, is a missing patch on a server that permits an unauthenticated
command prompt or other backdoor path into the web environment.
Control: Follow network security best practices by
updating your operating system and any other software running on it with the latest security patches. Too many incidents occur because criminal
hackers take advantage and exploit un-patched systems.
Network Security Risks And Controls
Reviewed by Unknown
on
2:35 AM
Rating:
No comments: