Network security fundamentals
How to design, use, and maintain secure networks.
Protecting data in transit
Securing network perimeters
Updating systems
Monitoring networks
Identifying your Assets
Do you know what assets your network is made up of?
Identifying all the assets that make up your network is a key step towards security and resilience. A common way that an attacker can gain access to a victim’s network is through systems on the network that the organisation is not aware of, and therefore are not secured (or decommissioned) appropriately.
Understanding the threat
What threats do you need to be protected against?
The controls you incorporate into your network should align with the specific threats you need to guard against. If you don’t perform ‘threat modelling’, it is highly likely you will waste resources implementing controls against irrelevant threats (or even worse, leaving your network vulnerable to unrecognised threats).
Restricting access
How do you restrict access to your network to only the people and systems you want?
Access to your network and the assets within it should be controlled. The principle of ‘least privilege’ should be followed and means users and systems have access only to the resources needed to do their job.