I am working on my Network Defense course project and I'm looking for some guidance. We have to create a fictional company and then provide security measures. My idea for the company is on-demand remote IT services so I have some concerns about covering all the bases for remote connection. Here is my company plan and the corresponding security measures I have devised so far:
Workstations / Servers:
VLAN 1: 1x CEO/Operations manager, 1x HR, 1x accounting / payroll, 1x outreach / media coordinator, 2x Sales persons.
VLAN 2: 6x Remote IT Specialists.
VLAN 3: Management server + IDPS console, storage server.
DMZ Segment: Webserver, mail server, database server.
My network map is where I'm beginning to second guess myself:
Internet > Packet Filtering Router > Firewall > Switch > IDPS Sensor > VLAN 1 > IDPS Sensor > VLAN 2 > IDPS Sensor, VLAN 3 > IDPS Sensor > DMZ.
Router: appropriate ACL lists.
Firewall: set to block all inbound remote connections on the appropriate ports but allow outbound remote connections.
Switch: close unused ports, assign static IP addresses per port.
IDPS / VLANs: appropriate routing to the IDPS management server.
DMZ: Harden the bastion servers, disable all unnecessary features etc.
Are there aspects or different security measures I should be implementing? Especially in the case of remote connections?
Any advice would be greatly appreciated, this project has got me second guessing myself and stressed out trying to make sure I cover all my bases.
No comments:
Post a Comment