Table of contents
Youcan describe the
topic of the section here
You can describe the
topic of the section here
You can describe the
topic of the section here
You can describe the
topic of the section here
You can describe the
topic of the section here
You can describe the
topic of the section here
01
04
02
05
03
06
Introduction Techniques
Misconceptio
n
Historical Practices Exercises
01
NGFW
A more advancedfirewall
that provides not only
traditional port and
protocol filtering but also
application-level
inspection, intrusion
prevention, and threat
intelligence integration to
detect and prevent
modern threats.
Security Components
02
IDS/IPS
Monitors network
traffic for malicious
activity, raising alerts
(IDS) or taking
automated preventive
actions (IPS) to block
potential attacks in
real-time.
03
VPN
Creates a secure,
encrypted tunnel over
the internet to ensure
confidentiality and
integrity when
connecting remote
users or networks.
04
WAF
Protects web applications
by filtering and
monitoring HTTP traffic
between a web application
and the internet, shielding
them from common
attacks such as cross-site
scripting (XSS) and SQL
injection.
5.
Security Components
08
MFA
Enhances securityby
requiring users to
provide two or more
verification factors
(e.g., password,
fingerprint, one-time
code) to gain access to
systems or
applications.
07
IAM
Controls user access to
systems and data by
enforcing strict
authentication and
authorization
processes, ensuring
that only legitimate
users can perform
approved actions.
05
EDR
Provides continuous
monitoring and
response to advanced
threats on endpoints,
including detection of
malware, fileless
attacks, and
suspicious behavior
that traditional
antivirus solutions
may miss.
06
NAC
Enforces security
policies by controlling
which devices can
access the network
based on predefined
compliance checks,
such as device posture,
security updates, and
user authentication.
6.
Security Components
09
SIEM
Aggregates andanalyzes
security logs and events
from various sources
across the network,
providing real-time threat
detection, incident
response, and reporting.
10
Encryption
Ensures
confidentiality of data
by encrypting
communications
between users and
applications over the
internet, preventing
eavesdropping and
tampering.
7.
Defense-in-Depth Concept Overview
Defense-in-Depthis a security strategy that
employs multiple layers of defense across
different areas of the network. Each layer
acts as an additional barrier to prevent
attackers from reaching critical assets.
8.
Data Security DataEncryption (AES, TLS), Data Loss
Prevention (DLP), Role-Based Access
Control (RBAC), Attribute-Based
Access Control (ABAC)
Comprehensive Defense-in-Depth Strategy
Internal Network
Security
Perimeter Security
Physical Security
Policies, Procedures,
and Awareness
Security Policies, Data Classification,
Employee Awareness Training
Access Control Systems
(keycard/biometric access), Security
Cameras, Guards/Fences
NGFW, VPN, WAF, IPS/IDS
Firewall, IPS/IDS, Encryption, NAC
Patch Management, EDR
Application Security
WAF, API Security, Authentication
Mechanisms (MFA/SSO), Secure
Software Development Practices
Host Security
Zero Trust Architecture:A Modern
Security Framework
• Zero Trust is a security concept that assumes no entity
(internal or external) is automatically trusted. Every access
request is authenticated, authorized, and continuously
verified. It focuses on minimizing risk through:
• Continuous verification.
• Least privilege access.
• Micro-segmentation of network and resources.
• Assuming breach: Every interaction is treated as potentially
compromised, and security checks are performed at every access
point.
12.
Zero Trust forBusiness Mobility and
Work-from-Home
• Zero Trust Network Access (ZTNA): Replaces VPNs by
applying identity-based policies to control access.
• Identity and Access Management (IAM) with MFA: Uses
robust IAM solutions to enforce identity verification and
secure access.
• Endpoint Detection and Response (EDR): Continuous
monitoring of endpoints ensures compliance before
granting access.
13.
References
•Wallarm, “Defense-in-Depth: ACybersecurity Strategy to Protect Resources,” Wallarm Blog, Feb. 26, 2024.
[Online]. Available: https://www.wallarm.com/what/defense-in-depth-concept. [Accessed: Oct. 4, 2024].
•M. Beschokov, “Elements of Defense-in-Depth Strategy: The Comprehensive Approach,” Wallarm Learning
Center, Feb. 26, 2024. [Online]. Available: https://lab.wallarm.com/ufaq-category/defense-in-depth-concept/.
[Accessed: Oct. 4, 2024].
•SANS Institute, “Defense in Depth: An Effective Approach to Cybersecurity,” SANS Whitepaper, Aug. 10,
2023. [Online]. Available: https://www.sans.org/white-papers/defense-depth/. [Accessed: Oct. 4, 2024].
•Cisco Systems, “Understanding Defense-in-Depth Security,” Cisco Blog, Aug. 2023. [Online]. Available:
https://www.cisco.com/c/en/us/about/security-center/defense-in-depth.html. [Accessed: Oct. 4, 2024].
•NIST, “Guide to General Server Security (SP 800-123),” National Institute of Standards and Technology, Jul.
2023. [Online]. Available: https://csrc.nist.gov/publications/detail/sp/800-123/final. [Accessed: Oct. 4, 2024].
•NIST SP 800-207: The official NIST Zero Trust Architecture framework that provides guidelines and best
practices for implementing Zero Trust.
•Forrester's Zero Trust eXtended (ZTX) Framework: A comprehensive model that extends Zero Trust beyond
the network to include identity, endpoints, applications, and data.
•Gartner's Definition of Zero Trust: Insights into the adoption of Zero Trust principles across various industries.
Editor's Notes
#11 Let’s start with what Zero Trust is: it’s a security approach that never trusts anyone or anything automatically. Instead, it always checks users, devices, and requests before allowing access.
Why do we need Zero Trust? In today’s world, threats can come from anywhere, not just outside the network. So, Zero Trust doesn’t assume any user or device is safe.
The main principles are Continuous Verification, meaning you keep checking access every time; Least Privilege, which gives only the minimum access needed; and Micro-Segmentation, which divides the network into smaller pieces so that an attack can’t spread easily.
Here’s how it works: When someone tries to access resources, they authenticate with IAM and MFA. Next, the system checks the context, such as where they are and the time. Finally, it controls access, allowing users to see only what they need for their role. The main tools that help with this are IAM, ZTNA, and EDR.