The LAN domain refers to the organization’s local area network (LAN) infrastructure. A LAN allows two or more computers to connect within a small physical area. The small area can be a home, office, or group of buildings.
LAN security policies focus on connectivity, such as defining how devices attach to the network. The policies also define how to control traffic, such as through segmentation and router filtering.
The same individuals who use network policies often write them. This is an advantage because it reduces training and interpretation errors.
LAN configuration issues are similar to those for workstations. The primary difference is administration. The LAN domain is often centralized to a small group of network administrators. This means devices are less distributed and are under tighter control.
Control standards for the LAN domain address a wide array of connectivity issues such as firewall controls, denial of service (DoS) protection, and Wi-Fi security control. Wireless connectivity is also a part of the Workstation domain. This is a good example of a cross-domain security issue. It also underscores the importance of configuring workstations and servers to protect data as it leaves a workstation and travels on a network.
A firewall control standard, for example, describes how LAN firewalls handle network traffic. This kind of traffic filtering includes web, email, and Telnet traffic. The standard describes how to manage and update the firewall. The following are examples of statements adapted from the National Institute of Standards and Technology (NIST) Special Publication 800-41, “Guidelines on Firewalls and Firewall Policy”:
The firewall must always block the following types of traffic:
Two terms often used when describing firewalls are stateful and stateless. A stateful firewall watches all the traffic for a given connection. It inspects the packets containing the data and looks for patterns and sequences that don’t make sense. This is useful for blocking packets from someone pretending to be someone else in an attempt to hijack your session. A stateless firewall looks at each packet independently. It is not aware of what came before and does not try to predict what should come next. It restricts and blocks traffic based on source and destination addresses or other static values. A stateless firewall uses simple rules that do not account for the possibility that a packet might be received by the firewall “pretending” to be something it’s not.
Stateless firewalls seldom exist anymore. Even the free firewall that comes with Windows 10 is a stateful packet inspection (SPI) firewall. Most firewalls today are stateful. In fact, many also include even more advanced features such as application firewalls. An application firewall includes additional features to protect a specific application. The classic example is a web application firewall (WAF). A WAF still conducts stateful packet inspection, but it also has specific countermeasures for common web attacks, such as SQL injection and cross-site scripting. Cross-site scripting is often referred to as XSS.
In this example, ICMP represents a protocol within the Internet Protocol (IP). This protocol does not carry data but does carry information about the network. A simple ping command echoes back network information. It is an example of an ICMP.
A DoS protection standard describes controls that protect against or limit the effects of DoS attacks. This standard attempts to prevent using the organization’s network as a launching point against another network. Here is an example of control statements from this type of standard:
The firewall and DoS examples illustrate how technical LAN security requirements can be established. These are high-level examples. In the real world, LAN policies are usually long and detailed. TABLE 10-2 contains additional examples of LAN control standards.
TYPE OF CONTROL STANDARD | DESCRIPTION |
---|---|
Audit events | Describes important events that must be audited and reported, such as breaches to routers, firewalls, and servers |
Configuration change control | Describes the change control management process for requesting, approving, and implementing changes on the network |
Controlled maintenance | Defines the schedules on LAN-attached devices for routine preventative and regular maintenance |
Controls over media | Defines protection, access to media, labeling, storage, transport, sanitization, and disposal |
Device identification and authentication | Describes the security requirements for identifying LAN-attached devices for authentication, routing, and filtering |
Intrusion detection and prevention | Describes the requirements for host- and network-based intrusion detection and prevention tools |
Protection of audit information | Describes the controls needed to protect audit information and tools from unauthorized access, modification, disablement, and deletion |
Router security controls | Describes minimal security configuration for all routers and switches |
Security assessments | Describes the need to conduct assessments of the security controls in the LAN. These assessments determine the extent to which controls are implemented correctly, operating as intended, and producing the desired outcome |
Segmentation | Defines when and how a network is to be partitioned. It also describes how the network traffic is to be controlled passing through the separate network parts (that is, access control between network segments) |
Trusted timestamps | Describes the need for trusted timestamps and timeservers for audit record generation, such as Network Time Protocol |
Wi-Fi security controls | Defines the authorized uses of Wi-Fi on organization property |
Table 10-2 mentions the term audit several times. An audit is the act of recording relevant security events that occur on a computing or network device. Why are audits so important? Any security-relevant event needs to be written to a log. Qualified personnel review these logs to determine if a security problem has occurred. These individuals determine who, what, where, and when activity caused the problem. Audit logs determine compliance issues, hardware misconfiguration errors, and application software security problems. They are useful in reconstructing actions that took place during a security incident. Audit logs should be well protected and only accessed by those people authorized by management.
Two key areas of LAN domain controls are connectivity and controlling network traffic. Baseline standards are particularly important because they establish connectivity between devices. This connectivity is important to ensure data protection in transit. To accomplish this, configure each device with an identity and method of authenticating network traffic it receives. This is no small task given the volume of network traffic generated. The network typically contains mixed traffic, such as sensitive business transactions; routine user-related transactions; and, potentially, hacker traffic. Separating business and routine user transactions depends on properly configuring network devices. These transactions do not attempt to be in conflict and thus are reasonably easy to identify and separate.
A greater challenge is how to configure devices to ensure hackers cannot masquerade as valid transactions. Another concern is hackers monitoring sensitive transactions in the clear. A hacker can configure a network card to “promiscuous mode.” When a network card is in promiscuous mode, it captures all the network traffic on a segment. Normally, a network card only captures traffic addressed to its device. In other words, a device in promiscuous mode allows you to listen to all the traffic messages between every device on the segment. With this information, a hacker can create his or her own messages in an attempt to masquerade as valid sensitive transactions.
Network segmentation can be an effective control for limiting traffic and thus help keep hackers out. Network segmentation involves isolating (or segmenting) parts of the network from other parts. This can be achieved in many ways, including adding access lists to routers that limit traffic between segments. Think of it as doors in a house. Suppose you host a graduation party in your home. Half the guests are people you don’t know. You might think about locking your bedroom door. You have segmented that room from the rest of the house. You can do the same thing with a network. For example, you might choose to segment your network into production and development systems. You might choose to further segment production into product systems, credit card systems, and internal financial systems. The number of network segments you create depends on the level of security you want to achieve.
To understand policies within a domain, you need a basic understanding of the related technical issues. For example, in the LAN domain, you need a basic understanding of network protocols. You need to understand how to route and filter network traffic. You must also understand the TCP/IP suite.
Another important concern of baseline LAN standards is network traffic monitoring. Regardless of how good firewalls and routers are, they have their limitations. These devices prevent attacks against known and predicted threats. Intrusion systems provide a broad range of protection. They look for patterns of attack. Just as a virus scanner looks for patterns to indicate a file has become infected, an intrusion system looks for network traffic patterns to detect a network attack. An intrusion system can be detective or preventive. An intrusion detection system (IDS) recognizes a network attack and sends an alert. An intrusion prevention system (IPS) recognizes a network attack, stops the attack, and sends an alert. Audit logs also play an important role in monitoring network traffic. Configuring devices to generate logs about network events helps you to determine later what occurred during an attack.
Baseline standards determine how to monitor network traffic. It is important to log network traffic during an event. Use of network IDS or IPS systems is also highly advisable.
The following are examples of baseline standards that configure devices to address connectivity and monitoring activity:
Many of the same procedure issues exist between domains, such as configuration and patch management. There is a greater emphasis in the LAN domain on detecting and responding to network attacks. An attack on a workstation is isolated. An attack on the network threatens the entire organization. You can see this difference reflected in several network procedures, as follows:
The number of threats against a network can be substantial. The ability to assess these threats takes a combination of technical knowledge and experience. Guidelines can transfer that experience and knowledge by walking an individual through core principles and different ways to look at LAN risks.
These guidelines are useful to planners, systems administrators, network administrators, and their managers. These individuals must assess LAN threats and build appropriate countermeasures. The following guidelines illustrate this point: