Apply security principles to secure enterprise infrastructure
This is a PBQ objective. Expect to place devices, configure network security, and make infrastructure decisions for a described environment.
Device Placement and Security Zones
Network Zones
- Internet/Untrusted: Public-facing. Everything here is hostile.
- DMZ (Screened Subnet): Hosts public-facing services (web servers, email gateways, DNS). Accessible from internet but isolated from internal network. Protected by firewalls on both sides.
- Internal/Trusted: Corporate network. User workstations, internal applications, file shares.
- Management: Isolated network for device administration. Jump servers, out-of-band management (IPMI/iLO/iDRAC). Should never be accessible from the internet.
- Guest: Isolated segment for visitors. Internet access only — no access to internal resources.
Device Placement Principles
- Public-facing services go in the DMZ, never directly on the internal network
- Database servers behind application servers — never directly accessible from DMZ
- Management interfaces on a dedicated management network
- Sensors (IDS) positioned to monitor traffic at key boundaries
Firewalls
Types
- Packet Filtering: Examines headers (source/dest IP, port, protocol). Fast but no application awareness. Stateless.
- Stateful Inspection: Tracks connection state. Allows return traffic for established connections. The baseline for modern firewalls.
- Next-Generation Firewall (NGFW): Stateful + application awareness + deep packet inspection + integrated IPS + URL filtering. Can make decisions based on application identity, not just ports.
- Web Application Firewall (WAF): Operates at Layer 7. Specifically protects web applications against OWASP Top 10 (SQLi, XSS, CSRF). Deployed in front of web servers.
- Layer 4 vs. Layer 7: L4 firewalls filter based on transport layer (TCP/UDP ports). L7 firewalls inspect application layer content. L7 is more granular but more resource-intensive.
Firewall Rules
- Processed top-down — first matching rule wins
- Implicit deny: If no rule matches, traffic is blocked (default on most firewalls)
- Rules should follow least privilege — allow only what’s needed, deny everything else
- Exam tip: Questions will present a rule set and ask what traffic is allowed/blocked, or ask you to write rules for a scenario
Intrusion Detection and Prevention
IDS (Intrusion Detection System)
Passive — monitors and alerts but does not block.
- Network-based (NIDS): Monitors network traffic at strategic points (span port, network tap)
- Host-based (HIDS): Monitors activity on individual hosts (file integrity, log analysis)
IPS (Intrusion Prevention System)
Active — sits inline and can block malicious traffic in real-time.
- Must be positioned inline (traffic flows through it)
- Risk of false positives blocking legitimate traffic
Detection Methods
- Signature-based: Matches known patterns. Effective against known threats, blind to novel attacks.
- Anomaly-based: Establishes a baseline of normal behavior, alerts on deviations. Catches unknown threats but higher false positive rate.
- Heuristic: Rule-based analysis of behavior patterns.
Inline vs. Monitor Mode
- Inline (IPS): Traffic passes through the device. Can block. Introduces latency. Single point of failure if it fails closed.
- Monitor/Tap (IDS): Receives a copy of traffic. Cannot block. No impact on traffic flow. No risk of blocking legitimate traffic.
Port Security
802.1X
Port-based Network Access Control. Requires authentication before granting network access.
Three roles:
- Supplicant: Device requesting access (laptop, phone)
- Authenticator: Network switch/AP that controls port access
- Authentication Server: RADIUS server that validates credentials
EAP Methods
- EAP-TLS: Mutual certificate-based authentication. Most secure. Both client and server present certificates.
- PEAP: Server certificate + client password (inside TLS tunnel). Easier to deploy than EAP-TLS.
- EAP-FAST: Cisco proprietary. Uses PAC (Protected Access Credential) instead of certificates.
MAC-Based Authentication (MAB)
Fallback for devices that don’t support 802.1X (printers, cameras, IoT).
- Authenticates based on MAC address — easily spoofable, use only as fallback
- Typically places devices on a restricted VLAN
Secure Communications
VPN
- IPSec: Network-layer VPN. Two modes: transport (encrypts payload) and tunnel (encrypts entire packet). Uses IKE for key exchange.
- SSL/TLS VPN: Application-layer VPN accessed through a browser or lightweight client. Easier to deploy for remote access.
- Split tunneling: Only corporate-bound traffic goes through VPN; internet traffic goes direct. Reduces VPN load but means the endpoint is exposed to internet threats without corporate controls.
- Full tunneling: All traffic goes through VPN. More secure but higher latency and bandwidth cost.
SD-WAN (Software-Defined WAN)
Centrally managed WAN that can dynamically route traffic across multiple links (MPLS, broadband, LTE).
- Provides encryption, segmentation, and centralized policy
- Replaces or supplements traditional MPLS circuits
SASE (Secure Access Service Edge)
Combines SD-WAN with cloud-delivered security (CASB, SWG, ZTNA, FWaaS) into a single service.
- Security follows the user, not the network perimeter
- Exam-relevant as a modern alternative to traditional VPN + firewall architectures
Jump Server / Bastion Host
Hardened server used as the sole access point to a secure network zone.
- Admins connect to the jump server first, then to target systems
- All administrative access is logged and monitored through this single point
- Reduces attack surface by eliminating direct access to managed systems
Load Balancers
Distribute traffic across multiple servers for availability and performance.
- Security role: Can perform SSL offloading, act as a reverse proxy, absorb DDoS traffic
- Placement: typically between the firewall and web server farm
Sensors and Collectors
- Network taps: Hardware devices that copy traffic for monitoring. Passive, no impact on traffic.
- SPAN/mirror ports: Switch configuration that copies traffic from one port to another for IDS/monitoring.
- Collectors: Aggregation points for logs and telemetry (syslog servers, SIEM collectors).
Offensive Context
When an attacker maps a target network, they’re looking for exactly the decisions you make in this objective: Where are the firewalls? Is the DMZ properly isolated or can I pivot from a web server to the database? Is 802.1X enforced or can I plug into a conference room jack? Is the management network segregated or can I reach iLO interfaces from the user VLAN? Every infrastructure decision either blocks an attack path or leaves one open.