{"id":94,"date":"2009-03-09T17:50:45","date_gmt":"2009-03-09T23:50:45","guid":{"rendered":"http:\/\/www.digitallachance.com\/blog\/?p=94"},"modified":"2009-03-09T17:50:45","modified_gmt":"2009-03-09T23:50:45","slug":"perimeter-defense-is-useless","status":"publish","type":"post","link":"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/","title":{"rendered":"Perimeter defense is useless!"},"content":{"rendered":"<p>I think it is well known by security experts that the old perimeter defense model just does not work any more.  A firewall does give some protection, but users are constantly asking that ports be opened so that they can access services outside of the corporate network.\u00a0 Not only that, but there is not much to prevent malicious traffic to go through your ports that are already opened.\u00a0 Should we ditch the firewall?\u00a0 No, but you should add more layers to your defense.\u00a0 In this post, I will list of the defenses you should have in your environment.<\/p>\n<p>Whenever such a user requests to have yet another port to be opened, you should make sure that you restrict as much as possible the end-points that can make use of that port you are opening up.  For example, John asks that a port be opened so he can establish a VNP connection from the corporate LAN to a business partner, you should make sure that only John&#8217;s IP address is allowed to use that port and that there is only one outside IP address that John can reach on that port.<\/p>\n<p>Firewall management is not what keeps me up at night though.  What keeps my up at night is the fact that it is so easy to create tunnels from inside my network to the outside over well known ports, such as port 80 or 443 in order to access anything that you would normally block at the firewall.  That plus the fact that now you cannot browse most web sites with first installing such things as Flash player and Adobe PDF reader.<\/p>\n<p>A recently <a href=\"http:\/\/www.infoworld.com\/article\/09\/02\/20\/Adobe_flaw_heightens_risk_of_encountering_malicious_PDFs_1.html\" target=\"_blank\">vulnerability in Adobe Reader<\/a> for which there is no patch as of now (Adobe said they will release one on March 11th) is a rather scary one.\u00a0 This type of vulnerability can be exploited <a href=\"http:\/\/blog.didierstevens.com\/2009\/03\/04\/quickpost-jbig2decode-trigger-trio\/\" target=\"_blank\">without the user even opening the malicious PDF!<\/a> How can you defend yourself against that?!\u00a0 You should have as many layers as possible in order to prevent that malicious PDF from succesfully penetrate your network.\u00a0 The <a href=\"http:\/\/securityblog.verizonbusiness.com\/2009\/03\/05\/pdf-security-through-minority\/\" target=\"_blank\">Verison Business Security Blog<\/a> has a very good list of steps that can be taken to protect yourself against that threat.\u00a0 of course, you could always <a title=\"eWeek - It May Be Time to Abandon Adobe\" href=\"http:\/\/www.eweek.com\/c\/a\/Security\/It-May-Be-Time-to-Abandon-Adobe\/\" target=\"_blank\">drop Abode Reader<\/a> altogether.<\/p>\n<p>In general though, that approach can be applied against any threats.\u00a0 Here are the different layers you should have in place in order of priority:<\/p>\n<ol>\n<li>A firewall.\u00a0 I would venture to guess that everyone out there has that one in place.\u00a0 Make sure that a regular review of what rules you have in place is done.<\/li>\n<li>Intrusion Detection (IDS) or better yet, Intrusion Prevention (IPS).\u00a0 If you can affort it, TippingPoint is probably a leader in that field and works great.\u00a0 At the very least, you should have Snort in your network.<\/li>\n<li>Don&#8217;t allow your users to be local administrators.\u00a0 Most of the people that get infected with malware\u00a0 and virus are logged on with local administrator rights.\u00a0 That&#8217;s a very bad idea.\u00a0 Lock down those users!<\/li>\n<li>Anti-Virus on every machines.\u00a0 AV is not perfect as it is a reactive technology, but it will catch a lot of what is out there.\u00a0 Anti-Virus products now can do more than just detecting and cleaning virus.\u00a0 The can block use of certain ports on your hosts (such as port 25 for e-mails or ports typically used for IRC).<\/li>\n<li><a href=\"http:\/\/en.wikipedia.org\/wiki\/Host_based_intrusion_detection_system\" target=\"_blank\">Host-based Intrusion Detection System (HIDS)<\/a>.\u00a0 This technology is starting to catch on in corporate environments.\u00a0 This is basically the equivalent of having <a href=\"http:\/\/en.wikipedia.org\/wiki\/Zonealarm\" target=\"_blank\">ZoneAlarm<\/a> on each desktop, but centrally managed by the corporate IT.<\/li>\n<li>Last but not least, patching!\u00a0 Make sure that you are current in your OS patches and your application patches.\u00a0 That is not always easy in corporate environment since it sometimes requires careful testing and planning.<\/li>\n<\/ol>\n<p>In my experience, the mobile users are the weak links.\u00a0 Once they take their laptops outside of the corporate LAN, many of those defensive layers, such as IPS and the firewall, are no longer there to protect them.\u00a0 That&#8217;s why you need to have strong defenses on the workstations, such as disk encryption and HIDS.<\/p>\n<p>Can anyone think of other layers that should be in place?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I think it is well known by security experts that the old perimeter defense model just does not work any more. A firewall does give some protection, but users are constantly asking that ports be opened so that they can access services outside of the corporate network.  Not only that, but there is not much to prevent malicious traffic to go through your ports that are already opened.  Should we ditch the firewall?  No, but you should add more layers to your defense.  In this post, I will list of the defenses you should have in your environment.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[14,27,29,31,32,33,40,52],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Perimeter defense is useless! - IT A Digital Life<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#website\",\"url\":\"https:\/\/digitallachance.com\/blog\/\",\"name\":\"IT A Digital Life\",\"description\":\"All things digital\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/digitallachance.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/#webpage\",\"url\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/\",\"name\":\"Perimeter defense is useless! - IT A Digital Life\",\"isPartOf\":{\"@id\":\"https:\/\/digitallachance.com\/blog\/#website\"},\"datePublished\":\"2009-03-09T23:50:45+00:00\",\"dateModified\":\"2009-03-09T23:50:45+00:00\",\"author\":{\"@id\":\"https:\/\/digitallachance.com\/blog\/#\/schema\/person\/8a2f0b2a18af80d71541deadfac4d02f\"},\"breadcrumb\":{\"@id\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/\",\"url\":\"http:\/\/digitallachance.com\/blog\/2009\/03\/perimeter-defense-is-useless\/\",\"name\":\"Perimeter defense is useless!\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#\/schema\/person\/8a2f0b2a18af80d71541deadfac4d02f\",\"name\":\"Francois\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/ce2ee0649f3fb6a643ffff9a9f1e63e4?s=96&d=mm&r=g\",\"caption\":\"Francois\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts\/94"}],"collection":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/comments?post=94"}],"version-history":[{"count":0,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts\/94\/revisions"}],"wp:attachment":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/media?parent=94"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/categories?post=94"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/tags?post=94"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}