Securely configuring your network hardware and configurations will ensure that you have an effective and secure communication infrastructure. Bear in mind the following principles and guidelines:
- Ports, protocols, and services:
- Ensure that you extend the concepts of least privilege and least functionality to the network.
- Block any outbound traffic that is not required as this can be used to exfiltrate data from your network.
- The same goes for inbound traffic. If you do not need a port, protocol, or service to be open, close it.
- Traffic monitoring:
- Ensure that you are monitoring the outbound ports that you allow with a full packet capture and analysis capability to ensure that the traffic that is leaving your network is legitimate.
- For encrypted traffic, add an SSL decrypter to your network. Run this traffic through your security tool suite, including your...