Use Sophia to knock out your gen-ed requirements quickly and affordably. Learn more
×

Security Configurations and Network Risk Mitigation

Author: Sophia

what's covered
In this lesson, you will learn about security configuration tools and techniques used to protect the confidentiality, integrity, and availability of enterprise data.

Specifically, this lesson will cover the following:

Table of Contents

1. Logical Security Configurations

Now that you have your physical network locked down tight, it is time to review the security configuration of your network. The same concepts that apply to physical security apply here, too.

First, you want to ensure that your network has an outside barrier and/or a perimeter defense. This is usually achieved by having a solid firewall, and it is best to have an IDS or IPS of some sort as well. The diagram below shows an example of what this might look like.

A security configuration representing the network path from the internet to the local network connected through cables or lines. From left to right, the ‘Internet’ is connected to a Router. The Router connects to a Firewall, which in turn connects to an I D S (intrusion detection system). The I D S is then connected to the Local Network, represented by four stacked computer monitors.

That may be enough for your network, but maybe not. Let us say that your network serves several distinct departments at your company. You can divide up your internal network into smaller administrative zones. Maybe your network would logically look like the one shown below.

A network setup with segmented access from the internet to various internal zones through a router. The ‘Internet’ is connected to a ‘Router’. The Router is connected to three separate internal network zones, labeled from top to bottom ‘Administration Network Zone 1’, ‘Production Network Zone 2’, and ‘Sales Network Zone 3’. The ‘Administration Network Zone 1’ is connected to ‘Accounting Network’, indicating that it is a Private Network. All the components are connected through lines.

Finally, your network might be similar to the one shown above but just larger. Maybe traffic is heavy and you need to break up physical segments. Perhaps different groups are in different buildings or on different floors of a building and you want to effectively segment them. There could be any number of reasons for you to physically separate your network into different groups, effectively partitioning your network by using multiple routers, as shown in the diagram below.

A network segmentation representing secure access from a ‘Border Router’ to three internal network zones, each with dedicated routers, I D S, and endpoint devices. On the left, a Border Router connects to a brick icon labeled ‘Firewall’. The firewall branches out to three separate Zone Routers, labeled from bottom to top ‘Zone 1 Router’, ‘Zone 2 Router’, and ‘Zone 3 Router’. Each zone router connects to an I D S (intrusion detection system) and multiple PCs (three per zone) on the right. All the components are connected through lines.


2. Risk-Related Concepts

All organizations should identify and analyze the risks to network security they face. This is called risk management. In the following sections, you’ll find a survey of topics that relate in some way to mitigating risks.

2a. Power Management

Power is the lifeblood of the enterprise and continued access to it is essential. In this section we will look at a few mitigations or countermeasures.

Battery Backups/UPS- One risk that all organizations should prepare for is the loss of power. All infrastructure systems should be connected to uninterruptible power supplies (UPSes). These devices can immediately supply power from a battery backup when a loss of power is detected. You should keep in mind, however, that these devices are not designed as a long-term solution. They are designed to provide power long enough for you to either shut the system down gracefully or turn on a power generator. In scenarios where long-term backup power is called for, a diesel-powered generator should be installed.

Redundant circuits- Data centers usually deploy redundant power sources to maintain constant power. Redundancy can be provided in several ways.

  • Parallel redundancy or the N+1 option describes an architecture where there is always a single extra uninterruptible power supply (UPS) available (that’s the +1) and the N simply indicates the total number of UPSes required for the data center. As the system runs in two power feeds and there is only one redundant UPS, this system can still suffer failures.
  • 2N redundancy means the data center provides double the power required by the data center. This ensures that the system is fully redundant.
Dual power supplies- Redundancy also refers to using redundant power supplies on the devices. Many servers come with two supplies and you can also buy additional power supplies as well. Always ensure that the power supply you buy can supply all the needs of the server.

term to know
Uninterruptible Power Supply (UPS)
A device or system that almost instantaneously provides emergency power in the case that main power fails.

2b. Disaster Recovery

A disaster is an emergency that goes beyond the normal response of resources. The causes of disasters are categorized into three main areas according to origin:

  • Technological disasters (device failures)
  • Manmade disasters (arson, terrorism, sabotage)
  • Natural disasters (hurricanes, floods, earthquakes)
hint
The severity of financial and reputational damage to an organization is largely determined by the amount of time it takes the organization to recover from the disaster. A properly designed disaster recovery plan (DRP) minimizes the effect of a disaster. The DRP includes the steps to restore functions and systems so the organization can resume normal operations.

term to know
Disaster Recovery Plan (DRP)
A set of policies and procedures to support the recovery mission critical networks and systems following a disaster.

2c. Business Continuity

One of the parts of a DRP is a plan to keep the business operational while the organization recovers from the disaster, known as a business continuity plan (BCP). Continuity planning deals with identifying the impact of any disaster and ensuring that a viable recovery plan for each function and system is implemented. By prioritizing each process and its supporting technologies, the company can ensure that mission-critical systems are recovered first and systems that are considered luxuries can be recovered as time allows.

term to know
Business Continuity Plan (BCP)
A plan to keep mission critical business processes up and running.

2d. Recovery Sites

Although a secondary site that is identical in every way to the main site with data kept synchronized up to the minute would be ideal, many organizations cannot justify the cost of such a system. Cost-benefit analysis must be applied to every business issue, even disaster recovery. We are going to explore three options for recovery sites.

A cold site is a leased facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring. No communications equipment, networking hardware, or computers are installed at a cold site until it is necessary to bring the site to full operation. For this reason, a cold site takes much longer to bring up to speed than a hot or warm site. A cold site provides the slowest recovery, but it is the least expensive to maintain. It is also the most difficult to test.

A warm site is a leased facility that contains electrical and communications wiring, full utilities, and networking equipment. In most cases, the only thing that needs to be restored is the software and the data. It is the most widely implemented alternate leased location. Although it is easier to test a warm site than a cold site, a warm site requires much more effort for testing than a hot site and takes more time to bring up to full functionality.

A hot site is a leased facility that contains all the resources needed for full operation. This environment includes computers, raised flooring, full utilities, electrical and communications wiring, networking equipment, and uninterruptible power supplies (UPSes). The only resource that must be restored at a hot site is the organization’s data, usually only partially. It should only take a few minutes to bring a hot site to full operation. Although a hot site provides the quickest recovery, it is the most expensive to maintain.

Using special backup utilities, you can also perform what are called snapshot backups. These are lists of pointers or references to the data and are somewhat like a detailed table of contents about the data at a specific point in time. They can speed the data recovery process when it is needed. There are two types of snapshots: copy-on-write and split mirror. Keep in mind that snapshots are not a replacement for regular backups. In many cases the snapshot is stored on the same volume as the data so if the drive goes bad you will also lose the snapshot.

A copy-on-write snapshot is taken every time a user enters data or changes data, and it includes only the changed data. It allows for rapid recovery from a loss of data, but it requires you to have access to all previous snapshots during recovery. As changes are made, multiple copies of snapshots will be created. Some will contain changes not present in others. There will also be some data that remains unchanged in all of them.

A split-mirror snapshot also is created every time a change is made, but it is a snapshot of everything rather than just the changes. However, as you can imagine it takes significant storage space and the restore process is slower.

terms to know
Cold Site
A recovery facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring.
Warm Site
A recovery facility that contains electrical and communications wiring, full utilities, and networking equipment.
Hot Site
A recovery facility that contains all the resources needed for full operation.
Snapshot Backups
Lists of pointers provide a detailed table of contents about the data at a specific point in time.
Copy-on-Write Snapshot
A snapshot taken every time a user enters data or changes data that includes only the changed data.
Split-Mirror Snapshot
A snapshot created every time a change is made that includes information about all the data.

2f. SLA requirements

Service-level agreements (SLAs) are contracts about the ability of the support system to respond to problems within a certain time frame while providing an agreed level of service. These agreements can be internal between departments or external, with a service provider. Agreeing on the quickness with which various problems are addressed introduces some predictability to the response to problems; this ultimately supports the maintenance of access to resources.

One of the metrics used in planning both SLAs and IT operations in general is mean time to repair (MTTR). This value describes the average length of time it takes a vendor to repair a device or component. By building MTTRinto SLAs, IT can assure that the time taken to repair a component or device will not be a factor that causes them to violate the SLA’s requirements.

Another valuable metric typically provided is the mean time between failures (MTBF), which describes the average amount of time that elapses between one failure and the next. Mathematically, this is the sum of mean time to failure (MTTF) and MTTR, thereby calculating the total time required to get the device fixed and back online.

terms to know
Service-Level Agreement (SLA)
A contract defining the ability of the support system to respond to problems within a certain time frame while providing an agreed level of service.
Mean Time to Repair (MTTR)
A numeric value that describes the average length of time it takes a vendor to repair a device or component.
Mean Time Between Failures (MTBF)
A numeric value that describes the amount of time that elapses between one failure and the next.

2g. End User Awareness and Training

One of the issues related to the risk involved in security incidents and disasters over which the company has some control is the amount of preparation spent on training users. Regardless of whether the incident is as small as the mistaken deletion of a key document or as large as a fire destroying the entire building, users should be trained in how to respond to every eventuality.

IN CONTEXT

It would be even better if recovery teams were created to address the stages of disaster recovery. The following teams should be assembled and trained before a disaster occurs:
  • Damage assessment team
  • Legal team
  • Media relations team
  • Recovery team
  • Relocation team
  • Restoration team
  • Salvage team
  • Security team
Each team should rehearse its response to various scenarios. One exercise that seems to work well is called a tabletop exercise. A tabletop exercise is an informal brainstorming session that encourages participation from business leaders and other key employees. In a tabletop exercise, the participants agree to a particular disaster scenario upon which they will focus.

2h. Single Point of Failure

One concept that makes any IT technician nervous is the existence of a single point of failure anywhere in the network. During the process of creating the BCP, all single points of failure should be identified. The process begins as described in the following sections, with the identification of critical assets and nodes, which is followed by providing redundancy where indicated.

term to know
Single Point of Failure
A component in a device or network that, if it were to fail, would cause the entire device or network to fail.

2i. Critical Nodes

Critical nodes are individual systems or groups of systems without which the organization cannot operate. The process of identifying these systems should begin with prioritization of the business processes that each supports. Once this has been done, it is simple to identify the servers and other systems that are required to allow that process to continue to function. If this investigation reveals a system that is critical and a single point of failure, action should be taken to provide some form of redundancy to the node.

term to know
Critical Nodes
Individual systems or groups of systems without which the organization cannot operate.

2j. Critical Asset

While critical nodes need to be identified and provided with additional support to prepare for disasters and smaller issues, some critical business processes depend on access to assets such as data that may reside in a database or in connections to vendors and partners. These assets also need to be identified and an action plan developed that recognizes their importance. In almost all cases, the solution is some form of redundancy, as covered in the next section.

2k. Redundancy

Redundancy occurs when an organization has a secondary component, system, or device that takes over when the primary unit fails. Redundancy can be implemented in many forms. The organization should assess any systems that have been identified as critical to determine if it is cost effective to implement redundant systems. Redundant systems include redundant servers, redundant routers, redundant internal hardware, and even redundant backbones.

One form of fault tolerance that can be provided to a system is redundant array of independent disks (RAID). This technology allows for automatic recovery from a hard drive failure in a system. The major forms of RAID are as follows:

RAID-0- Also called disk striping, this method writes the data across multiple drives. While it improves performance, it does not provide fault tolerance. RAID-0 is depicted in the diagram below.

RAID-0 or disk striping is represented using two disks. Two vertical cylinders representing ‘Disk 0’ and ‘Disk 1’ are placed side by side. Each disk is divided into five horizontal slices, with the first four slices being equal in size and the fifth slice being larger. The first four slices in Disk 0 are labeled ‘A1’, ‘A3’, ‘A5’, and ‘A7’, while those in Disk 1 are labeled ‘A2’, ‘A4’, ‘A6’, and ‘A8’. A bracket labeled ‘RAID-0’ spans the top of both disks, indicating that the data is evenly split (striped) across the two disks.

RAID-1
Also called disk mirroring, RAID-1 uses two disks and writes a copy of the data to both disks, providing fault tolerance in the case of a single drive failure. RAID-1 is depicted in the diagram below.

RAID-0 or disk striping is represented using two disks. Two vertical cylinders representing ‘Disk 0’ and ‘Disk 1’ are placed side by side. Each disk is divided into five horizontal slices, with the first four slices being equal in size and the fifth slice being larger. The first four slices in Disk 0 are labeled ‘A1’, ‘A3’, ‘A5’, and ‘A7’, while those in Disk 1 are labeled ‘A2’, ‘A4’, ‘A6’, and ‘A8’. A bracket labeled ‘RAID-0’ spans the top of both disks, indicating that the data is evenly split (striped) across the two disks.

RAID-5
Requiring at least three drives, this method writes the data across all drives like striping, and then parity information is also written across all drives. With hardware RAID-5, the spare drives that replace the failed drives are usually hot swappable, meaning they can be replaced on the server while it is running. RAID-5 is depicted in the diagram below.

RAID-5 is represented using four disks labeled ‘Disk 1’, ‘Disk 2’, ‘Disk 3’, and ‘Disk 4’. Each disk is represented by a cylinder and is placed adjacent to the others. Each disk is divided into four equal horizontal slices, with each slice representing a data block. The data blocks in each disk are labeled from top to bottom as follows: 1) Disk 1: block 1a, block 1b, block 1c, and parity. 2) Disk 2: block 2a, block 2b, parity, and block 2c. 3) Disk 3: block 3a, parity, block 3b, and block 3c. 4) Disk 4: parity, block 4a, block 4b, and block 4c. A bracket labeled ‘RAID-5 Parity Across Disks’ spans the top of all the disks.

term to know
Redundant Array of Independent Disks (RAID)
A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

summary
In this lesson, you learned about the security configuration tools and techniques used to protect the confidentiality, integrity, and availability of enterprise data, including logical security configurations. You also introduced concepts related to mitigating network risk, including power management, battery backups and UPSs, recovery sites, snapshots, redundant circuits, dual power supplies, disaster recovery, and business continuity. Finally, you learned about SLA requirements, end-user awareness and training, single points of failure, critical nodes, and critical assets.

Source: This content and supplemental material has been adapted from CompTIA Network+ Study Guide: Exam N10-007, 4th Edition. Source Lammle: CompTIA Network+ Study Guide: Exam N10-007, 4th Edition - Instructor Companion Site (wiley.com)

Terms to Know
Business Continuity Plan (BCP)

A plan to keep mission critical business processes up and running.

Cold Site

A recovery facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring.

Copy-on-Write Snapshot

A snapshot taken every time a user enters data or changes data that includes only the changed data.

Critical Nodes

Individual systems or groups of systems without which the organization cannot operate.

Disaster Recovery Plan (DRP)

A set of policies and procedures to support the recovery mission critical networks and systems following a disaster.

Hot Site

A recovery facility that contains all the resources needed for full operation.

Mean Time Between Failures (MTBF)

A numeric value that describes the amount of time that elapses between one failure and the next.

Mean Time to Repair (MTTR)

A numeric value that describes the average length of time it takes a vendor to repair a device or component.

Redundant Array of Independent Disks (RAID)

A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

Service-Level Agreement (SLA)

A contract defining the ability of the support system to respond to problems within a certain time frame while providing an agreed level of service.

Single Point of Failure

A component in a device or network that, if it were to fail, would cause the entire device or network to fail.

Snapshot Backups

Lists of pointers provide a detailed table of contents about the data at a specific point in time.

Split-Mirror Snapshot

A snapshot created every time a change is made that includes information about all the data.

Uninterruptible Power Supply (UPS)

A device or system that almost instantaneously provides emergency power in the case that main power fails.

Warm Site

A recovery facility that contains electrical and communications wiring, full utilities, and networking equipment.