Security (Part 2) - There's safety in layers
Security
This topic is huge because there are many aspects of security in an IT infrastructure. I have broken down this topic and will address various areas below. Please realize there are typically many layers in an IT infrastructure and so today's IT environment's large or small, needs to have proper security planning. Security is an aspect of IT that you never totally complete. It always seems to be a work in progress because there are so many forms of malicious attacks cropping up everyday.
There are many layers to a network and so security typically includes different physical (i.e. appliances, servers) and logical (i.e. software, firmware) services. So, a good place to start the discussion of security starts at the outer edge of the network. Below you will find some devices typically used for securing the "front door" to your business communication infrastructure. These devices screen for viruses, or any other kind of malicious activity bound for your network.
Outer edge of the Network
I refer here to the first line of defense from attacks that come from the outside of your network. So the devices listed here operate at this layer and provide a great means of preventing unwanted network traffic.
- Internet Gateway - Protection at the outer edge of the network involves a device that scans any and all internet traffic across many types of protocols i.e. SMTP, HTTP, FTP, and POP3. This scanning prevents most types of virus and malicious code threats, including macro viruses, Trojans, Internet worms, and even finds hidden threats buried in .zip and other compressed file types. Very good low-cost products are available from most major vendors and in particular one that I have had some success with is McAfee's WebShield product.
- Firewalls - A very important device which protects and controls traffic throughout your network and specifically from unauthorized intrusion into your network. There are many very good low cost firewalls which provide some great functionality. This layer of defense can come in the form of an appliance such as from SonicWall i.e. TZ170 firewall or from Cisco i.e. 515E PIX firewall. Firewall's also come in the form of software such as what Microsoft provides for its IIS web server i.e. URLScan and what Trend Micro provides with its Anti-Virus suite of software for the desktop.
- Web Site Hosting - Internet connectivity for Web sites, running web-based applications and even providing for e-commerce require further planning to make sure that the sensitive data being stored and/or processed is not contaminated, stolen or compromised in any manner. Typically when running your own web server you will want to follow much of what was mentioned above and also think about segmenting the server into its own virtual network called a DMZ or demilitarized zone. Within the DMZ the server will provide application or web site hosting but not have any critical data on it. It should also be protected by its own software based firewall and when running an IIS web server URLScan should be used.
- Email Server - Running your own email server also provides additional challenges as well. Making sure that the email server is not used maliciously as a relay point for SPAM and that it isn't victimized by SPAM itself is important. Where possible, you may want to think about having email either hosted outside exclusively, or partially hosted with a service such as Postini to provide a layer of security i.e. excerpt from the Postini website - Postini delivers preemptive threat prevention that identifies connection and content threats before they can reach your corporate network. Postini stops spam, phishing, viruses, directory harvest attacks...
- VPNs - When having users from remote locations entering the network, i.e.VPNs, you need to take extra precautions that these users are managed properly. First, make sure that these users are always protected with anti-virus and anti-spyware on their remote machines, laptops, PDAs, etc. You should also require that their VPN account passwords get changed on a frequent basis. Making sure to audit the users who connect remotely is also key since if someone leaves or is terminated and they have access to the network there is a great potential for disgruntled employee cyber-vandalism.
- Wireless Network - When employing the use of a wireless network there are a few simple configurations that can be made right away; 1) making sure that data communications are encrypted, 2) making sure that only specific computers are allowed to connect, i.e. MAC address filtering, RADIUS - device level authentication, 3) do not broadcast the SSID of the access points, 4) throttle down and where possible redirect the radio signal so as to broadcast only as much and in the direction of where the signal is needed.