Network Security

采取措施保护您的网络—在本地或在云中.

Explore InsightIDR

What is Network Security? 

Network security is the process of protecting a business’ digital landscape from threats by building a security framework into and around its various on-prem and cloud environments. 网络保护安全工具旨在持续扫描基础设施 vulnerabilities and signs of a breach.

The ephemeral nature of the connected systems that make up an organization's network means it is a constantly shifting mass of potentially vulnerable virtual and cloud devices. This can make the job of 入侵检测和响应系统(IDPS) incredibly difficult. But, today’s cybersecurity 解决方案与任务非常匹配.

网络安全的主要目的是什么? 

The main purpose of network security solutions is to reduce the risks posed to an IT infrastructure. This mission becomes particularly critical as today’s disseminated workforces are further stretching the need for security of transnational networks that connect those workers.

The pandemic supercharged adoption of remote work and accelerated the need for cloud adoption as workers moved around the world and abandoned offices. Thus, network security’s reason for existing didn’t necessarily change so much as its scope suddenly became much bigger than it had ever been.

Critical – and many times confidential – data that was safely contained in an on-prem environment now had to be flung out into the world for workers to remotely access, thus cloud network security 迅速成为2020年科技界最热门的话题. 即使2024年回归正常化, 如今,网络安全的宏大范围依然存在.

如何保护网络安全? 

You secure a network by first determining exactly what kinds of systems and environments you need to protect and defend. 根据美国网络安全和基础设施安全局(CISA), “保护网络需要持续监控, assessments, 以及各种相互关联的因素之间的缓解, including servers, the cloud, Internet of Things (IoT), 互联网连接和用于访问网络的许多物理资产.”

The agency goes on to say that the devices that make up network infrastructure “are ideal targets for malicious cyber actors because more or all organizational and customer traffic must pass through them.”

At a very high-level, securing those infrastructure devices means the same thing to everyone looking to achieve network security. 不过,从操作上看,这一过程对每个公司来说都有明显不同 安全运营中心(SOC). Let’s take a look at a few of the more general steps SOCs can take to begin working toward a stronger network security posture:

  • 查看活动目录组: Make life hard for attackers by reviewing active directory group memberships and permissions to ensure users are granted access to the minimum set of assets required to do their jobs. Ideally, even your most privileged users should have regular accounts that they use for the majority of their jobs, 只有在绝对需要完成任务时才登录管理员帐户.
  • 启用多因素身份验证(MFA): Implementing 身份和访问管理(IAM) protocols like MFA for all systems means requiring an additional piece of information in combination with a username and password. 一个例子是登录到网上银行门户网站, and having a code sent to your mobile device to then enter into the banking portal to ensure identity. 其他令牌、特定设备需求和生物识别技术都是MFA的示例.
  • Practice good posture: There are numerous attack surface profiling tools and services that provide an attacker's-eye view of what an organization is exposing as well as help to identify any problematic services and configurations. 

Types of Network Security

As it is typically understood that network security can encompass many methods of network-perimeter defense, 让我们来看看几个更经常被soc采用的解决方案. 

网络访问控制(NAC)

NAC is the process of leveraging security protocols to maximize control over who or what can access a proprietary network. 如果网络安全服务和做法-特别是 data loss prevention (DLP) 在任何特定领域都特别薄弱,那么很有可能是 threat actor 将能够找到他们的方式,恶意泄露以前安全的数据.

安全信息和事件管理(SIEM)

A SIEM 是一种通过集中检测安全问题的解决方案吗, correlating, 并通过IT网络分析数据. SIEM解决方案可以帮助公司满足遵从性需求,并通过组合来遏制攻击者 log management 集中化以及检测和搜索能力.

Zero Trust Security Model

The zero trust security model 强大的身份验证框架是否天生不信任每个人, endpoint, mobile device, server, network component, network connection, application workload, and business process. Each process or person must be authenticated and authorized continuously as every action is performed.

Web应用防火墙(WAF)

A WAF helps protect a company’s web applications by inspecting and filtering traffic between each web application and its interactions with the internet. WAF可以帮助保护web应用程序免受以下攻击 cross-site-scripting (XSS) and 结构化查询语言(SQL)注入. Common useful applications include e-commerce platforms leveraging WAFs to prevent data theft and fraud.

保安意识培训

Humans – also known as employees – are not typically thought of as part of an IT organization’s attack surface. 然而,很大一部分可利用的漏洞是人为错误造成的. 让内部员工定期参与是一个好主意 安全意识培训 programs so they can stay updated on how to defend themselves and the organization against threats – even if they’re not part of the IT or security teams.

网络安全的好处

The macro benefits of network security are fairly obvious: Keep attackers out and plug critical vulnerabilities in a timely manner so they can't be exploited. Let's now take a look at a few of the less obvious benefits of a robust network security program: 

  • Access control: IAM policies enable superior authentication practices so that anyone – or any application/system – wishing to access an enterprise network must provide extensive information to be admitted. 网络流量分析(NTA) is a technology useful in monitoring network activity for anomalies and helping to improve internal visibility and eliminate blind spots.
  • Compliance在当今严格的全球监管环境下, 确保组织网络的安全性满足状态是至关重要的, federal, 或特定地区的遵从性要求. 网络安全程序可以帮助确保遵守特定的遵从性需求.
  • Visibility: Maintaining maximum visibility over an enterprise network helps ensure a stronger and more consistent security posture, 这意味着更少的意外漏洞, breaches, attacks, 以及恶意数据泄露——所有这些都能节省资金.
  • Risk mitigation:即使违约确实发生, the right network security solution will be able to help a security organization minimize the impact of that breach. 网络检测和响应(NDR) capabilities help to cut down on risk by creating baseline network behavior so that it becomes fairly obvious when anomalous activity occurs.
  • Data protection: Any enterprise network will likely want to maintain confidentiality of large amounts of non-customer-facing data. A network security program can help protect confidential data by several of the methods listed above. Keeping the right data behind closed doors also helps organizations adhere to more strict regulations like the 一般资料保护规例(GDPR).

Read More

网络流量分析:最新的Rapid7博客文章