After reading chapter 4, reviewing the PowerPoint slides, and watching the videos (and other readings if present) discuss the following:
Documenting a network is essential in troubleshooting and support. Discuss the security implications in keeping such documentation. How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?
General guidelines for all class discussions:
Additional requirements:
responsible to post (A)
A- The biggest security implication is if someone gains access to your documentation, they know almost everything about your network. If a hacker had your IP and server list this will allow them to target an attack on the important pieces of equipment on your network. Also if you include a security diagram this could help them bypass your security equipment and protocols. “The standard Layer 3 diagram includes firewalls, but the security diagram needs to also include any special security probes, IDS/IPS devices and passive or active taps.” I think that only employees that are working in the IT department should have access to these documents, and even then should only have access to the ones that pertain to their duties. There should also only be certain people that are allowed to update information to prevent incorrect data being entered.
Reference: https://www.auvik.com/franklyit/blog/network-documentation-best-practices/
responsible to post (B)
When it comes to network documentation, it can be difficult to keep outside users away from seeing the network setup. A company would only like a select few to see the documentation to a network and keep unauthorized users away from the structure. Posey (2003) described network documentation protection by creating a security operations guide, as “creating a security operations guide allows you to document every element of your security policies for both users and administrators” (para. 1). By creating a user guide to the network, limiting physical access to documentation, implementing firewalls to keep hackers away, and making sure security templates are in place even in the workplace, “you remain vigilant on all fronts—and a good security operations guide will help you do just that” (para. 2-26).
Source:
Posey, B. (2003, October 28). Network documentation must include a security operations guide. Retrieved from https://www.techrepublic.com/article/network-documentation-must-include-a-security-operations-guide/.
Place an order in 3 easy steps. Takes less than 5 mins.