TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSA Network Infrastructure Security Guidance [pdf]

130 pointsby slackaabout 3 years ago

7 comments

FourthProtocolabout 3 years ago
I have some experience here, not with the NSA though. BYOD is forbidden, and checked when you enter the building. There is only wired hardware - and wireless is, well, jammed. Any software introduced into such networks is vetted before introduction&#x2F;deployment. It takes time. 3rd party apps don&#x27;t auto update - Microsoft for example provide updates that can be vetted before being allowed onto the network.<p>And this is only some bleedingly obvious stuff...<p>The document does not describe SECRET or TOP SECRET environments. Not even RESTRICTED. R, S and TS policies are themselves marked with protective markings, which this PDF lacks.<p>Governments have a lower level of protection called PROTECTED or similar that is closer to what the document describes, but even that would be protectively marked...<p>Looks to me like NSA is sharing some of their lesser sensitive stuff to possibly help their vendors, businesses partners and public at large. Kind of like &quot;we recommend Joe Public do it like so...&quot;
评论 #30576042 未加载
评论 #30577347 未加载
评论 #30576505 未加载
评论 #30575959 未加载
dhxabout 3 years ago
Use of firewalls in series from multiple vendors sounds like a good idea in theory but in practice, does it not make it easier for an attacker to exploit the network? Instead of the attacker having to find a vulnerability in a single product, they can instead find a vulnerability in one of multiple products (a much easier task). Given that every network device communicates with a central authentication&#x2F;authorisation system, a central logging system and likely central patching, configuration deployment, etc systems, all it takes is to find a vulnerability in one of multiple firewall products, then find a vulnerability in one of the central systems used to mange the network.<p>I&#x27;m also perplexed why there is mention of &quot;traffic inspector&quot; and &quot;full-packet capture device&quot; given that almost all traffic traversing a network nowadays is encrypted. Perhaps more useful today would be creating a good understanding of the <i>normal</i> traffic flows so that alarms can be configured for abnormal traffic. For example, perhaps no more than 100 requests to an authentication server occur per device per day. Or patches for a system are no more than 1GB so seeing 1.1GB or more transferred across the management network per day per device would be abnormal.
评论 #30574922 未加载
评论 #30575066 未加载
评论 #30574971 未加载
评论 #30574930 未加载
评论 #30580664 未加载
评论 #30574901 未加载
javajoshabout 3 years ago
What, no threat model? I&#x27;m really not sure who this is for. If you&#x27;re actually in charge of network and&#x2F;or security architecture most of this is too simplistic. But if you&#x27;re a newbie it leaves out the the most important context (particularly, the threat model) that drives the entire process of securing something. And personally, I&#x27;m just not comfortable doing things unless I know <i>why</i> I&#x27;m doing it, and that&#x27;s what the threat model provides.
rapjr9about 3 years ago
What do you all see as missing from this document? How about the security of apps and of 3rd party update services? Every app that has internet access is a potential vulnerability for the whole network, a direct route to the inside. And we&#x27;ve also seen recently that 3rd party software update services can compromise everything. Are those not considered part of &quot;Network Infrastructure Security&quot;? If you&#x27;re talking about defense in depth you can&#x27;t limit the discussion to just the wired network hardware itself because there are all sorts of other things that can compromise the network (insider attacks, BYOD, compromised hardware, phishing, blackmail). You could follow every single step in this document perfectly and your network may still be easily compromised. There&#x27;s no mention of wireless networks either. Your network could be compromised via an open Bluetooth interface. This also seems like a very Cisco oriented document.
评论 #30575564 未加载
jablabout 3 years ago
Slightly related, is there any analytical writing on the human side of security? How to build organizations that are resistant to intrusion in various forms?<p>From reading books and watching movies as well as applying a bit of common sense, organizations like spy agencies or terrorist networks with more or less independently operating cells work with a strict least-privilege type model such that a mole in one part of the organization doesn&#x27;t compromise the organization as a whole. And, I&#x27;d guess, at least in more formalized organizations, strict logging on who does what etc.<p>All this obviously adds a lot of overhead and friction in communications, which, say, a business operating in a competitive environment can ill afford. I&#x27;m quite sure there&#x27;s no &quot;magic pill&quot;, but rather a bunch of choices with tradeoffs (like security vs. ease of cross-team communication I touched on above).
评论 #30577695 未加载
sandworm101about 3 years ago
Cool. Defense in depth. But how many vendors&#x2F;products are now on the table? What will always matter is the most external firewall because once inside that line each subsiquent internal firewall will have a harder time viewing good traffic from bad. And the most inner firewalls between devices inside the home network will have so many holes punched in them to barely be useful. Defense in depth isnt about having multiple layers that repeat the same protections. Defense in depth is about having other layers of non-firewall products to catch the stuff the firewalls miss. If your outside wall is 8&#x27; adding more and more 8&#x27; walls behind the first does nothing if the army has 9&#x27; ladders. You need something different than another wall.
评论 #30575251 未加载
based2about 3 years ago
?<p>- No full static addresses requirement<p>- No double WAF vendors requirements
评论 #30577360 未加载