The Construction of Enterprise Security Talk about the Security of Office Network

Source: Internet
Author: User
Keywords Internet security corporate security
Tags access apt behavior business business network company corporate security e-mail

The Construction of Enterprise Security Talk about the Security of Office Network. In most internet companies, the main focus of security building is put on the business network security, and the office network often becomes the short board. In order to avoid textbook-style theory of preaching, this article from the offensive and defensive perspective to medium-sized Internet companies, for example, to discuss the construction of office network security. The office network here is a narrow office network, including only employee office network area, support office erp, e-mail and other systems are not included.

Office network infiltration ideas

Office network is usually a major breach of hacking, the reason I think the main:

Office network security investment relative to the business network is not enough, the cost of invasion is low The main office of the network is people, people have emotions, the Internet behave strangely, the attack surface is larger than the business network business network often trust office network, can be a strategic circuitous offensive business network excellent Springboard R & D, operations and other important information are often highly concentrated in the office terminal, the value of the data even more than business network

A lot of ideas to penetrate the office network, the following is an example:

Examples of ideas to penetrate the office network

From the entrance point of view, malicious links, documents are common means.

From the hacking behavior, mainly divided into:

Horizontal horizontal penetration vertical lifting

From the perspective of hacking purposes, mainly divided into:

Office network as a springboard attack business network steal HR, finance, senior management, etc. Important information in the hands of network security

The following figure shows the common office network topology

Example of office network topology

Firewall

As the first protection against attacks, the firewall has a heavy responsibility, but he also shoulders the important responsibility of accessing the Internet through NAT. The performance and stability of the firewall are demanding. I think from a purely security perspective, there are several things to consider when choosing a firewall:

Malicious Website Filtering Malicious file filtering

2016 gartner business network firewall magic quadrant

IPS / IDS

IPS / IDS has a very important role here is to identify the use of Nday's software, especially browsers, office network suite vulnerability attacks on employees. There are many manufacturers claim that their own IPS / IDS can identify 0day, I personally think that the more mature 0day recognition technology relies mainly on the sandbox and machine learning, really need to identify 0day or need professional APT equipment to do.

2017 gartner intrusion detection and defense magic quadrant

Email Security Gateway

This topic is too much content, you can write a separate article, this article omitted.

APT device

APT devices identify APT behavior by analyzing mail, traffic in the file and traffic behavior, and I know that foreign fireeye, trend, pa, mcafee, etc. all do this piece in.

Safe isolation

The main purpose of safety isolation are two:

On-demand network access to avoid abuse of authority Reduce the horizontal penetration of hackers in the office network and vertical rights attack surface, increase attack costs

For these two purposes, so security isolation is usually combined with access or vlan division, the main difference is that access can dynamically adjust the network permissions based on user identity, vlan division is relatively inflexible.

Network permission isolation

The figure is a simple classification, of which there are several types of students need to focus on:

O & M & DBA, system privilege, vertical optimization of the best goal, a kind of joke, black out of an operation and maintenance of the computer, turn all the text files over and over again, can not find a password is hell. Try to limit other people's access to them. The administrators of important business systems, who are responsible for the operation and management of the company's core business, have high authority over important back-end systems. Once their computers are compromised, the consequences will be serious. Such as the game company recharge system background, advertising company's customer advertising management system, recruiting company's background resume management system, electricity supplier's order logistics management system, a thing is a big deal. Try to limit other people's access to them, while strictly restricting their access to the extranet. Executives, HR, Finance, these students on the office system requires a relatively simple visit, the main network access needs outside the network, usually do not understand technology, security awareness is the weakest, but also the most can not afford to offend. The concentration of a large number of company-important data on their office computers can directly incur losses once intruded. This part of students can be strictly limited with other areas of the office network and access to internal systems. Wireless security

The wireless situation is particularly complicated, here discuss the more common situation. Many companies rely on static wireless password protection, authentication can access the office network. There are two common mistakes here:

I wireless only cover the company, hacking ye search?

Hackers if you really intend to black, you can really go to your company, and now AP launch capability are very strong, if you use a dedicated device hacker, the ability to receive signals is also strong.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.