Cookie Consent by Free Privacy Policy Generator 📌 Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

🏠 Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeiträge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden Überblick über die wichtigsten Aspekte der IT-Sicherheit in einer sich ständig verändernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch übersetzen, erst Englisch auswählen dann wieder Deutsch!

Google Android Playstore Download Button für Team IT Security



📚 Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1


💡 Newskategorie: Programmierung
🔗 Quelle: dev.to

Let’s look at the story of an imaginary company called "DUCKS4EVER." This company provides hosting services for companies and individuals looking to rent a server in the cloud. They started out small, but Mr. Duckie, the CEO, was working so hard on the marketing strategy of the company to secure more contracts and generate more revenue, and his efforts did pay off; he secured a contract with a large company that wanted to host their new social media website on DUCKS4EVER’s servers. This new website, which was called "Ducklings2Meet," grew so fast that they started having more than 10,000 sign-ups per day. All of this was great for Mr. Duckie; the bigger Ducklings2Meet grew, the more servers it needed, which meant more revenue for the company, etc.

Now, aside from this cute success story, let’s look at the details of DUCKS4EVER’s operation, specifically, their security operations.

When DUCKS4EVER started, the whole company was comprised of 10 members. They had different skills; some worked on marketing, some on programming, some on designing the interface, and so on. But the security team was made up of just one person, Mr. Goose.

When Ducklings2Meet started growing, Mr. Goose started noticing a lot of malicious traffic hitting the website’s servers. He also noticed a lot of unsuccessful login attempts to the database servers that host Ducklings2Meet’s user data. All of this worried Mr. Goose, and he started tackling these issues one by one. Let’s look at how he actually stopped all these attempted attacks on the servers:

  1. First things first, he added a firewall to all the servers hosting the website, and he added rules to prevent any incoming traffic to any port except ports 22, 80, 443, and 3306 These ports are required for ssh, http, https, and MySQL, respectively.

  2. The second step was to add an intrusion detection system (IDS). An IDS can be hardware or software, but Mr. Goose chose software for this one. The IDS software Mr. Goose chose was Snort, which is a very famous open-source intrusion detection system that uses a rule-based language to inspect network traffic. Mr. Goose then spent a whole day configuring snort to alert him whenever abnormal activity occurred on the network. It’s important to note that IDS software doesn’t block malicious traffic; instead, it analyzes it and alerts the human operator whenever something malicious happens

  3. Now it was time for the intrusion prevention system (IPS). Just like the IDS, an IPS can be either hardware or software. Mr. Goose chose the hardware option this time; he ordered the device from “Amaducks.com” and connected it to the company's network. Now, an IPS’s job is to inspect and analyze the network traffic in order to prevent any malicious activity, meaning it’s more active than an IDS, but this also means that it can affect normal users’ experiences if it’s not configured properly, which is known as false positives. The IPS can actually block normal traffic, thinking it is malicious, so Mr. Goose had to be careful here. He configured the IPS to block any person who tries to login to the server unsuccessfully more than 10 times in a span of 5 minutes, and he also added a rule to block traffic from any device that sends more than 100 requests per minute.

  4. Now it is time for access control. Access control refers to the measures put in place to restrict unnecessary access to resources, data, and devices. For example, an employee working on the user interface of a website won’t need access to the database server, and vice versa. So Mr. Goose made new rules for all of the company’s employees; now an employee can only access what they actually need to do their job. Also, he enforced multi-factor authentication on all accounts within the company; strong password policies were also enforced; and he even added security guards around the server room and card readers on the doors to make sure only authorized people could access the hardware of the servers.

  5. Mr. Goose thought a lot about his next step, and he decided it was network segmentation. He will split the network into different parts for each use so that if one part is compromised, it does not spread to the others. He made virtual local area networks (VLANs) for each important part of the company; for example, he made a VLAN for the internet-facing servers, another isolated one for the backup servers, and another for all the workstations and the employees.

  6. Now that the company’s networks are all secured, Mr. Goose started thinking about other ways a hacker could compromise the company. He had been reading a lot lately about companies being breached because of phishing emails sent to employees. So Mr. Goose decided to enroll all employees in a cyber security course called “Cyber Security Best Practices for Ducklings." This course would help educate employees about cyber security and how to identify phishing links and malware.

  7. It is time for endpoint detection and response (EDR). Mr. Goose downloaded the EDR agent on all the workstations in the company so that he could monitor all the activities of each employee and detect any malicious action. Also, this enables him to isolate a device in case it is compromised so that it does not harm any other device in the network.

  8. Now that DUCKS4EVER is growing rapidly, the company is employing more and more people to take on various jobs, from marketing to programming to designing, etc., and even Mr. Goose got himself some new employees. So he decided to build a security operations center (SOC) to monitor the network and endpoints 24/7 and make sure everything was running smoothly.

After all this, Mr. Goose feels tired and exhausted. He worked nonstop for weeks to make sure no breaches would happen and that the growth of the company would go undisturbed. But is this the case? Will everything go smoothly?

Let’s Find Out In The Next Part 😉

...



📌 Red Teams, White Teams, and Blue Teams for Beginners


📈 30.26 Punkte

📌 Part 1: Guarding against sophisticated threats: Strategies for your best defense


📈 28.4 Punkte

📌 Part 2: Guarding against sophisticated threats: Strategies for your best defense


📈 28.4 Punkte

📌 BLUESPAWN - Windows Based Active Defense Tool To Empower Blue Teams


📈 26.09 Punkte

📌 Small and Medium Business Security Strategies Part 3 – Inventory Part 2, Software


📈 26.04 Punkte

📌 Small and Medium Business Security Strategies Part 3 – Inventory Part 2, Software


📈 26.04 Punkte

📌 „Red Teams“ gegen „Blue Teams“: Bundeswehr nimmt an NATO-Cyberübung teil


📈 23.53 Punkte

📌 „Red Teams“ gegen „Blue Teams“: Bundeswehr nimmt an NATO-Cyberübung teil


📈 23.53 Punkte

📌 62% of blue teams have difficulty stopping red teams during adversary simulation exercises


📈 23.53 Punkte

📌 Beyond Angular Signals: Signals & Custom Render Strategies


📈 22.13 Punkte

📌 Five Strategies for Extending Automation and Orchestration Beyond the SOC


📈 22.13 Punkte

📌 Beyond Identity and Zscaler join forces to strengthen zero trust security strategies


📈 22.13 Punkte

📌 Beyond blockchain: Strategies for seamless digital asset integration


📈 22.13 Punkte

📌 Beyond the Basics: Advanced Strategies for API Development


📈 22.13 Punkte

📌 Cybersecurity Attack Defense Strategies (Chinese Edition) 2022


📈 21.48 Punkte

📌 Ransomware Revealed: From Attack Mechanics to Defense Strategies


📈 21.48 Punkte

📌 Review: Cybersecurity – Attack and Defense Strategies


📈 21.48 Punkte

📌 Kudelski Security Threat Navigator helps users improve defense strategies


📈 21.48 Punkte

📌 Study of past cyber attacks can improve organizations’ defense strategies


📈 21.48 Punkte

📌 AI and contextual threat intelligence reshape defense strategies


📈 21.48 Punkte

📌 Elevate Your Cloud Defense: 5 Revolutionary Strategies for Cloud Vulnerability Prioritization


📈 21.48 Punkte

📌 Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies


📈 21.48 Punkte

📌 The Invisible Threat: AI-Powered Vishing Attacks and Defense Strategies


📈 21.48 Punkte

📌 Understanding Types of Cloud Malware and Effective Defense Strategies


📈 21.48 Punkte

📌 Understanding Teams apps..."Hello, world!" for Teams | Learn Together: Developing Apps for Teams


📈 20.18 Punkte

📌 Blue Cross? Blue crass: Health insurer thought it would be a great idea to mail plans on USB sticks


📈 20.16 Punkte

📌 GX Blue: Logitechs mechanische Taster à la Cherry MX Blue


📈 20.16 Punkte

📌 PS4: Berry Blue, Blue Camouflage und Copper – Neue Controller vorgestellt


📈 20.16 Punkte

📌 DEF CON 27 Blue Team Village - Christine Le - Blue Team Guide For Fresh Eyes video


📈 20.16 Punkte

📌 DEF CON 27 Blue Team Village - Scoubi - BloodHound From Red to Blue 1 point 5


📈 20.16 Punkte

📌 Blue Team Village, OpenSOC Blue Team CTF, blog.opensoc.io, Whitney Champion, DEF CON 27


📈 20.16 Punkte

📌 Blue Reflection: Second Light – Spiel zur Anime-Serie Blue Reflection Ray erscheint im Westen für Konsolen und PC


📈 20.16 Punkte

📌 Save $40 and grab the Blue Yeti USB mic on sale in Black or Blue


📈 20.16 Punkte

📌 Blue Yeti: Das meistverkaufte Mikrofon von Blue Microphones jetzt unter 100 Euro sichern


📈 20.16 Punkte

📌 Twitter's new blue checkmark isn't always blue, and other verification system changes


📈 20.16 Punkte











matomo