1.1
Securing seven domains of a typical IT infrastructure is the starting point to address cyberthreats in any company. The following elaborates on the seven domains of the infrastructure.
Content
User domain
Workstation domain
LAN domain
LAN to WAN domain
WAN domain
Remote access domain
System and application domain
1.User Domain
end users that access company IT infrastructure within the network and outside the network
companies must enforce robust password policies ,2FA,access privilege management, AUP, conduct employee training and awareness
2.Workstation domain
Domain contains devices used to access the device used to access the organization's IT infrastructure
Workstation can be infected by viruses/malware
Companies should take actions to harden all devices used by employees and adopt Defence in Depth strategy.
Hardening can be implemented by:
Having software revisions , security patches (update software regularly)
System configuration
Use of anti malware, anti virus software (legitimate)
Individual workstation login ID/password
3.LAN domain
Domain includes all technologies that establishes LAN and connect to the organization’s It infrastructure
Usually a prime target for cyberattacks
Segmentation is suggested to mitigate the above, as the network is then divided for different users (eg. Employees vs visitors)
Ensures that the internal network will not be infected even if an outsider is connected to the network
Firewall should also be deployed to have egress filtering to limit users’ access to the internet. (allow only 80/443, but the rest should be authorized case by case
Users should not access the internet from every port to avoid being infected by malware or botnets.
Network Security Protocols to encrypt communication, and ensure data transported through network's connections stays safe and secure should also be implemented. -(give some examples)
4.LAN to Wan domain -Domain where IT infrastructure connects to the Internet.
-important security controls need to be applied
-all security appliances must be configured to comply with the policies defined by -IP routers need to be logically configured to ping , along with ACL to filter traffic -Firewall to filter traffic -DMZ which serves as a buffer zone between inbound and outbound traffic -IDS to identify attack and malicious intent and trigger an alarm to responders once detecting a threat -Proxy server, which acts as a middleman where data is analysed and screened before being relayed to their destination IP -Web content filtering which filters dao main names an prevent unauthorised traffic from entering IT infrastructure -Email content filter, which blocks the content of all emails until prophet screened for viruses, then allow clear emails to pass to users
5.WAN domain -The WAN domain is the wide network where all entities including other businesses, websites, and all external users exist in.
-End users communicate with LAN using VPN,FTP,SSH
-Setting up LAN-to-WAN will mitigate any risks that comes from WAN
-Using firewalls and conducting constant penetration tests are key to ensuring that this domain remains secure
6.Remote access domain
The Remote access domain is when users gain access to an IT infrastructure remotely (WFH)
Remote access introduces risk
VPN is used to provide secure remote access connection across internet. This is achieved by providing an encrypted communication tunnel and authentication to ensure CI, Privacy of communications over the internet.
Important to use 2FA to authenticate users before they are able to access the infrastructure
Procedures like Conducting regular audits, monitoring logins attempts and using strict firewall ACLS
7.System and applications domain
Domain includes all system and software applications that users access. (Eg. Application servers, web servers, proprietary software, Database servers and applications)
Use of a data loss prevention system should be used to monitor the 5W1H of a file.
Good practices
Regular patching to maintain systems and software
Install antimalware/antivirus software to stop infectious downloads through email/compromised website.
User training and awareness to ensure that users recognize phishing and social engineering schemes to prevent hackers from penetrating the network through them.
Apart from the above,
Regular risk assessments should be conducted to identify risks and threats faced by the company
Security Measures should also be updated/reviewed constantly to be effective in reducing, neutralizing and eliminating the identified threats.
Company's employees should also receive constant awareness and training sessions to educate on the security threats including social engineering attacks
Auditing and penetration testing need to be regularly conducted to identify problems proactively to address them.
Establishing an IT security program requires administrative, physical, and technical measures and controls to ensure the IT infrastructure is protected.
Last updated