[pb_row ][pb_column span="span12"][pb_heading el_title="Step #3: Network Security" tag="h1" div_margin_top="30" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Step #3: Network Security[/pb_heading][pb_text el_title="Introduction" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

This section from within the NCSC's '10 Steps To Cyber Security' concerns Network Security.

[/pb_text][pb_heading el_title="Summary" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Summary[/pb_heading][pb_text el_title="Summary" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

The connections from your networks to the Internet, and other partner networks, expose your systems and technologies to attack. By creating and implementing some simple policies and appropriate architectural and technical responses, you can reduce the chances of these attacks succeeding (or causing harm to your organisation).

Your organisation's networks almost certainly span many sites, and the use of mobile / remote working, and cloud services, makes defining a fixed network boundary difficult. Rather than focusing purely on physical connections, think also about where your data is stored and processed, and where an attacker would have the opportunity to interfere with it.

[/pb_text][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_heading el_title="What is the Risk?" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]What is the Risk?[/pb_heading][pb_text el_title="What is the Risk?" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

Networks need to be protected against both internal and external threats. Organisations that fail to protect their networks appropriately could be subject to a number of risks, including:

  • Exploitation of systems: Ineffective network design may allow an attacker to compromise systems that perform critical functions, affecting the organisations ability to deliver essential services or resulting in severe loss of customer or user confidence.
  • Compromise of information: A poor network architecture may allow an attacker to compromise sensitive information in a number of ways. They may be able to access systems hosting sensitive information directly or perhaps allow an attacker to intercept poorly protected information whilst in transit (such as between your end user devices and a cloud service).
  • Import and export of malware: Failure to put in place appropriate security controls could lead to the import of malware and the potential to compromise business systems. Conversely users could deliberately or accidentally release malware or other malicious content externally with associated reputational damage.
  • Denial of service: Internet-facing networks may be vulnerable to Denial Of Service (DOS) attacks, where access to services and resources are denied to legitimate users or customers.
  • Damage or defacement of corporate resources: Attackers that have successfully compromised the network may be able to further damage internal and externally facing systems and information (such as defacing your organisation's websites, or posting onto your social media accounts), harming the organisation’s reputation and customer confidence.

[/pb_text][pb_divider el_title="Divider 1" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_heading el_title="How Can the Risk be Managed?" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]How Can the Risk be Managed?[/pb_heading][pb_text el_title="How Can the Risk be Managed?" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

Produce, implement and maintain network security designs and policies that align with the organisation’s broader risk management approach. It may be helpful to follow recognised network design principles (eg ISO 27033) to help define an appropriate network architecture including both the network perimeter, any internal networks, and links with other organisations such as service providers or partners.

Manage the network perimeter: Manage access to ports, protocols and applications by filtering and inspecting all traffic at the network perimeter to ensure that only traffic which is required to support the business is being exchanged. Control and manage all inbound and outbound network connections and deploy technical controls to scan for malicious content:

  • Use firewalls: Use firewalls to create a buffer zone between the Internet (and other untrusted networks) and the networks used by the business. The firewall rule set should deny traffic by default and a whitelist should be applied that only allows authorised protocols, ports and applications to exchange data across the boundary. This will reduce the exposure of systems to network based attacks. Ensure you have effective processes for managing changes to avoid workarounds.
  • Prevent malicious content: Deploy malware checking solutions and reputation-based scanning services to examine both inbound and outbound data at the perimeter in addition to protection deployed internally. The antivirus and malware solutions used at the perimeter should ideally be different to those used to protect internal networks and systems in order to provide some additional defence in depth.

Protect the internal network: Ensure that there is no direct routing between internal and external networks (especially the Internet), which limits the exposure of internal systems to network attack from the Internet. Monitor network traffic to detect and react to attempted or actual network intrusions.

  • Segregate networks as sets: Identify, group and isolate critical business systems and apply appropriate network security controls to them.
  • Secure wireless access: All wireless access points should be appropriately secured, only allowing known devices to connect to corporate Wi-Fi services.  Security scanning tools may be useful to detect and locate unauthorised or spoof wireless access points.
  • Enable secure administration: Administrator access to any network component should properly authenticated and authorised. Make sure default administrative passwords for network equipment are changed.
  • Configure the exception handling processes: Ensure that error messages returned to internal or external systems or users do not include sensitive information that may be useful to attackers.
  • Monitor the network: Network intrusion detection and prevention tools should be deployed on the network and configured by qualified staff. The capabilities should monitor all traffic for unusual incoming and outgoing activity that could be indicative of an attack. Alerts generated by the system should be promptly managed by appropriately trained staff.
  • Assurance processes: Conduct regular penetration tests of the network architecture and undertake simulated cyber attack exercises to ensure that security controls have been well implemented and are effective.

[/pb_text][pb_heading el_title="Learn More" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Learn More[/pb_heading][pb_text el_title="Learn More" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

[/pb_text][pb_divider el_title="Divider 1 2 3" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_heading el_title="What Next?" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]What Next?[/pb_heading][pb_text el_title="What Next?" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

IS Know How Pointer:

You may also be interested to read the next phase of the 10 Steps;

[/pb_text][pb_button el_title="What Next Button" button_text="Step #4: Managing User Privileges" link_type="url" button_type_url="https://www.isknow.how/your-is-know-how/national-cyber-security-centre-ncsc/the-10-steps-are/10-steps-managing-user-privileges" open_in="current_browser" icon="fa-arrow-right" button_alignment="inherit" button_size="btn-lg" button_color="btn-primary" appearing_animation="0" ][/pb_button][pb_divider el_title="Divider 1 2 3 3" div_margin_top="20" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_alert el_title="Dislcaimer" div_margin_top="20" div_margin_bottom="-20" alert_style="alert-warning" alert_close="no" appearing_animation="0" ]


The above resources and content "Contains public sector information licensed under the Open Government Licence v1.0." unless stated with the text "IS Know How Pointer:" which is where ISKH would like to input a call to action to it's visitor's and clients.

ISKH is in no way affiliated with, or working on behalf of the National Cyber Security Centre (NCSC). ISKH is quite simply reproducing their 10 Steps to Cyber Security information, to be able to put it in front of our Third Sector target audience(s) as much as possible.

Additionally, this should further support the NCSC's drive to show that Cyber Security, has a positive impact on a business or organisations Cyber / Data Security Positioning.

Any externally linked NCSC content in the ISKH website, including PDF documents or video media, is offered for information purposes only, as is.