sergiomarotco / Network-segmentation-cheat-sheet
- понедельник, 17 января 2022 г. в 00:29:47
Best practices for segmentation of the corporate network of any company
This project was created to publish the best practices for segmentation of the corporate network of any company. In general, the schemes in this project are suitable for any company.
Graphic diagrams are available in the Release page
The schema sources are located in the repository
Elements used in network diagrams:
Crossing the border of the rectangle means crossing the firewall.
Basic segmentation to protect against basic targeted attacks that make it difficult for an attacker to advance on the network. Basic isolation of the productive environment from the corporate one.
The default corporate network should be considered potentially compromised. Potentially compromised workstations of ordinary workers, as well as workstations of administrators, have basic and administrative access to the production network.
In this regard, the compromise of any workstation can theoretically lead to the exploitation of the following attack vector. An attacker compromises a workstation in the corporate network. Further, the attacker either elevates privileges in the corporate network or immediately attacks the production network with the rights that the attacker had previously obtained.
Installation the maximum number of information protection tools, real time monitoring suspicious events and immediate response.
OR!
Segmentation according to level 2 requirements
More network segments in the corporate network.
Full duplication of the main supporting infrastructure for production network such as:
Safer software development. Recommended implementing DevSecOps at least Level 1 of the DSOMM, what requires the introduction of a separate storage of secrets for passwords, tokens, cryptographic keys, logins, etc., additional servers for SAST, DAST, fuzzing, SCA and another DevSecOps tools.
In case of problems in the supporting infrastructure in the corporate segment, this will not affect the production environment.
It is a little harder for an attacker to compromise a production environment.
Or you can implement at least Level 2 of the SLSA.
As a result, this leads to the following problems:
Please subscribe - this is free support for the project
The company's management (CEO) understands the role of cybersecurity in the life of the company. Information security risk becomes one of the company's operational risks. Depending on the size of the company, the minimum size of an information security unit is 15-20 employees.
Implementing security services such us:
High costs of information security tools and information security specialists
Each production and corporate services has its own networks: Tier I, Tier II, Tier III.
The production environment is accessed from isolated computers. Each isolated computer does not have:
Implement other possible security services, such as:
Implementing security services such us:
Now you will have 2 computers on your desktop if you need access to production network. It hurts
Please subscribe - this is free support for the project