Module 8: Security Architecture

Glossary of Terms

The design and framework of systems, networks, and technologies implemented to protect an organization's digital assets from cyber threats. It encompasses the strategic planning and management of security measures.

A proactive approach where security is integrated into every phase of a system's lifecycle, from initial design to deployment and maintenance, rather than being added as an afterthought.

The sum of all possible points (attack vectors) where an unauthorized user can try to enter or extract data from an environment. Minimizing this is a key security principle.

A strategy that implements multiple layers of security controls throughout an IT infrastructure. If one layer fails, another layer is already in place to defend against an attack.

A security model centered on the belief that organizations should not automatically trust anything inside or outside their perimeters. It requires verification of every user and device before granting access.

The practice of managing and provisioning IT infrastructure through code and automation rather than manual processes. This allows security controls to be codified and applied consistently.

A cloud computing model where the cloud provider dynamically manages the allocation of server resources, allowing developers to focus on code without managing the underlying infrastructure.

An architectural approach where applications are composed of small, independent services that communicate via APIs. Each service can be developed, deployed, and scaled independently.

A lightweight form of virtualization that packages an application and its dependencies into a single "container." Containers share the host system's kernel, making them efficient but introducing shared vulnerabilities.

The process of creating a virtual instance of physical hardware, allowing multiple operating systems and applications to run on a single physical machine, isolated from one another.

A perimeter network or buffer zone that separates an organization's internal, trusted network from an untrusted external network, like the internet. It is used to host public-facing services (e.g., web servers).

The practice of dividing a computer network into smaller, isolated segments or subnetworks. This helps contain breaches and prevent the lateral movement of threats.

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Types include Packet-Filtering, Stateful, Proxy, Next-Generation (NGFW), and Web Application (WAF).

A passive security tool that monitors network or system activities for malicious actions or policy violations and generates alerts when it detects them.

An active security tool that monitors a network for malicious activity and takes automated actions to block or prevent the detected threat.

A virtual WAN architecture that uses software to control and optimize traffic across multiple types of transport services (e.g., broadband, MPLS), often with integrated security features.

A cloud-native framework that converges networking (like SD-WAN) and security functions (like firewalls, ZTNA) into a single, unified service delivered from the cloud.

Creates a secure, encrypted connection (a "tunnel") over a less secure network, such as the internet, to allow for secure remote access.

A cryptographic protocol that provides secure communication over a network. It is the successor to SSL and is fundamental to HTTPS, ensuring encryption, authentication, and data integrity.

Core Architectural Principles

Security by Design

Security cannot be an afterthought; it must be a fundamental part of the system design from the very beginning. This proactive approach ensures security is woven into every layer of the architecture.

  • Prevents Costly Retrofits: Building security in from the start is cheaper and more effective than trying to add it to an existing system.
  • Enhances Resilience: A system designed with security in mind is better equipped to withstand and recover from attacks.
  • Mitigates Risks Early: Potential risks and vulnerabilities can be identified and addressed during the development process, not after deployment.
  • Supports Compliance: Integrating security from the outset makes it easier to meet regulatory and industry standards like GDPR or HIPAA.

Balancing Architectural Factors

A good security architecture is not just about being impenetrable; it's about finding the right balance between competing business and operational needs.

  • Availability & Resilience: The system must be accessible to authorized users and able to recover quickly from incidents. This is achieved through redundancy, disaster recovery plans, and regular testing.
  • Cost: Security measures must provide a good return on investment (ROI) by balancing the cost of implementation against the potential cost of a breach.
  • Scalability & Responsiveness: The architecture must be able to grow with the organization and adapt quickly to new technologies and emerging threats.
  • Ease of Deployment & Recovery: Security solutions should be straightforward to implement and manage. Complex systems can lead to misconfigurations and longer downtimes.

Architectural Models & Paradigms

Infrastructure Models

  • On-Premises: The organization's data and applications run on servers physically located on its property.
    • Pros: Complete control over infrastructure and data.
    • Cons: High capital investment, requires skilled personnel for management.
  • Cloud: Data and applications are stored on servers managed by a third-party provider (e.g., AWS, Azure, GCP).
    • Pros: Scalability, flexibility, cost-effective.
    • Cons: Relies on the provider's security, potential data sovereignty concerns.
  • Hybrid: A combination of on-premises infrastructure with public or private cloud services, offering a balance of control and flexibility.

Modern Application Architectures

  • Microservices: Applications are built as a collection of small, independent services. This improves agility and fault isolation but adds complexity to securing inter-service communication.
  • Serverless Computing: The cloud provider manages all server infrastructure. This reduces operational overhead but introduces new security challenges, such as securing function code and managing access controls in a distributed environment.

Virtualization & Containerization

  • Virtualization: Creates virtual instances of physical hardware (virtual machines or VMs). This maximizes resource use and isolates environments, which can improve security if the hypervisor (the software that runs the VMs) is properly secured.
  • Containerization: Packages an application and its dependencies into a lightweight, portable container. Containers are more efficient than VMs because they share the host OS kernel, but this shared kernel can become a single point of failure if a vulnerability is exploited.

Network Design & Segmentation

Security Zones

Network segmentation divides a network into zones based on security requirements and trust levels. This is a core principle of Defense in Depth.

  • Demilitarized Zone (DMZ): A buffer network between your internal network and the untrusted internet. It's where you place public-facing servers (like web or email servers) to prevent a compromise of those servers from directly affecting your internal network.
  • Internal Zones: The trusted network is further segmented based on department or data sensitivity. For example, the Finance department's network segment would have stricter access controls than the Marketing segment.
  • Restricted/Critical Zones: High-risk systems, such as industrial control systems (ICS) or databases with critical data, are placed in highly isolated zones with the most stringent security controls.

Isolation Techniques

  • Physical Isolation: Physically separating sensitive systems from all other networks. The hardware is not connected to any other network.
  • Air-Gapped Systems: An extreme form of physical isolation where a computer or network has no connections to the internet or any other network, including wireless interfaces. Data is transferred via physical media (like a USB drive), which itself is a vector for attack (e.g., Stuxnet).
  • Logical Segmentation: Creating virtual boundaries within a single physical network using technologies like VLANs (Virtual Local Area Networks) and firewall rules. This is more flexible and cost-effective than physical isolation.

Minimizing the Attack Surface

This is the practice of reducing the number of potential entry points for attackers.

  • Disable Unnecessary Services: Every running service or open port is a potential vulnerability.
  • Enforce Least Privilege: Users and applications should only have the minimum permissions necessary to perform their functions.
  • Keep Systems Patched: Regularly apply security updates to close known vulnerabilities.
  • Secure Configurations: Harden systems by changing default passwords and disabling insecure features.

Security Appliances & Services

Firewalls

Firewalls are the primary tool for creating security zones and controlling network traffic.

  • Packet-Filtering (Layer 3/4): The most basic type. Makes decisions based on IP addresses and port numbers. Fast but offers limited security.
  • Stateful Inspection (Layer 4): Tracks the state of active connections, making it more secure than simple packet filtering because it understands the context of the traffic.
  • Proxy / Application-Level Gateway (Layer 7): Acts as an intermediary for requests. It provides deep content inspection but can introduce latency.
  • Next-Generation Firewall (NGFW): A modern firewall that combines stateful inspection with application awareness, deep packet inspection (DPI), and an integrated Intrusion Prevention System (IPS).
  • Web Application Firewall (WAF): A specialized firewall that protects web applications from common attacks like SQL injection and cross-site scripting (XSS).

Intrusion Detection & Prevention Systems (IDS/IPS)

  • IDS (Intrusion Detection System): A passive system that monitors the network for signs of malicious activity and sends an alert if a threat is detected. It's like a security camera that alerts a guard.
  • IPS (Intrusion Prevention System): An active system that is placed inline with traffic. It not only detects threats but also automatically takes action to block them. It's like a security guard who can tackle an intruder.

Modern Networking Services

  • SD-WAN (Software-Defined Wide Area Network): A technology that uses software to manage and optimize traffic across a wide area network (WAN). It simplifies management, reduces costs, and often includes integrated security features like encryption and firewalls.
  • SASE (Secure Access Service Edge): A modern, cloud-native architecture that combines networking capabilities (like SD-WAN) with a full suite of security services (like firewalls, secure web gateways, and Zero Trust access). It provides consistent security for all users and devices, regardless of their location.

Secure Communication & Access

Virtual Private Networks (VPNs)

A VPN creates an encrypted "tunnel" over a public network (like the internet), allowing for secure communication and remote access to private resources.

  • Remote Access VPN: Allows individual users (e.g., a remote employee) to connect securely to a corporate network.
  • Site-to-Site VPN: Connects two entire networks together, such as linking a branch office network to the main headquarters network.
  • Clientless VPN: A browser-based VPN that provides secure access to specific web applications without requiring special client software.

Key Protocols for Secure Access

  • TLS (Transport Layer Security): The standard protocol for encrypting web traffic (HTTPS). It ensures confidentiality, integrity, and authentication through a process called the TLS handshake, which uses digital certificates to verify server identity.
  • SSH (Secure Shell): A protocol used for secure remote command-line access, file transfers, and tunneling other network protocols.
  • RDP (Remote Desktop Protocol): A Microsoft protocol that allows a user to connect to another computer with a full graphical interface.
  • IPSec (Internet Protocol Security): A suite of protocols used to secure IP communications, often used in conjunction with VPNs, especially for site-to-site connections.

Port Security & Authentication

  • Port Security: A feature on network switches that restricts access to a port based on the MAC address of the device. This prevents unauthorized devices from simply plugging into an open network jack.
  • 802.1X Authentication: A standard for Port-Based Network Access Control (PNAC). Before a device is granted access to the network, it must authenticate against a central server (like RADIUS). This provides a much stronger layer of security than static port security.

Fill in the Blank Questions

True/False Questions

Multiple Choice Questions