Lesson 3: Common Mistakes and Best Practices for Designing Network Security Zones

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
you hello and welcome to this week's security management course I'm professor world today we're going to be talking about best practices in designing network security zones so let's review a very simple example suppose you have a network connection where you have your internet you have an internal network and you have a web application that has a a web front and application zone and a data zone and you put in a firewall the simplest way to design such a network is to have a single firewall that's connected the way I show here well this is a very basic design has two serious problems the first is that these three zones the web's own applications on the day zone are not segregated from each other traffic between them is completely unfiltered it doesn't go through the firewall so that's not good and also this firewall is from a security point of view a single point of failure so if you miss configure that firewall in any way your network potentially becomes wide open and research does show that 95 percent of firewall breaches are really caused by Mis configuration of a firewall so getting that right is is crucial so what can you do to improve the next step up is to eliminate this simple network structure and connect each one of these zones directly to the firewall to a separate interface on the firewall once you do that traffic traveling between these separate zones has to go through the firewall and now you can write policy on the firewall that controls and filters the traffic between these two three zones and also between these zones and other parts of your network from the outside to the inside etc so this is more secure the challenge here now becomes a physical challenge each one of these connections takes up a physical port on the firewall and there is a limited number of physical ports that you can have on the firewall depending on the model so this is a limiting factor and the next step up is that technology lets us avoid these physical connections using virtualization of the network using VLANs instead of having a physical connection and use a physical interface in each of these connections from the zone to the firewall you can virtualize all of them and have three separate VLANs and the VLANs are all connected to virtual interfaces on the firewall running over a single high-speed physical port and you can have a very large number of VLANs you have much more flexibility and still maintain the same filtering capability and the same granularity of access control policies that you can instrument on the firewall because crossing between VLANs does require a firewall policy rule to allow the traffic through okay so that good the challenge now becomes that it's it's become quite easy to define VLANs and sometimes people over virtualize their network and you end up with thousands of VLANs and if you do that potentially you end up with a firewall that schematically would look like this it would look like a spider it might have hundreds or even thousands of VLANs hanging off of that one firewall and if you do that managing that firewall becomes quite difficult because remember if you have n different interfaces virtual interfaces on the firewall then you have N squared paths going through the firewalls going from one interface to another so you have N squared of these paths and you have to manage the policies of all those N squared paths and then the policy on this firewall becomes really complex and difficult to understand and to manage so what could you do to improve even further well now you can introduced individual pers own firewalls like so and by doing this now you have dedicated firewalls in front of each of your security zones and that makes management a lot simpler because each of these firewalls is very focused this firewall in the middle is just protecting an application zone so the rules on it only have to deal with that application zone on the one side and the policy on that firewall becomes much more compact and much more focused and easy to understand except that now you look at this picture and you realize that I've introduced a lot more devices and now I have to worry about physical boxes and I have to worry about power supply and cooling and in rack space and set etcetera and this is also something that we wish to avoid so the final piece of the puzzle is that we can use another type of virtualization which is firewall virtualization most or all major firewall vendors let you purchase one large box and have multiple separate instances of virtual firewalls running inside that box each of those individual firewalls has its own policy it's connected to its own VLANs and it does exactly what I described before it's protecting just the zone behind it nevertheless they all reside inside the single physical box so you get the best of all worlds you have all the granularity in filtering capabilities and you minimize the number of Hardware boxes that you need to worry about thank you for your attention Oh
Info
Channel: AlgoSec
Views: 52,905
Rating: 4.8553348 out of 5
Keywords: security management, security policy management, network security, security zone, network security zone, network segmentation, security zones, security, network security zones, firewalls
Id: MT_WXo7KGHc
Channel Id: undefined
Length: 6min 46sec (406 seconds)
Published: Thu Mar 26 2015
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.