Summary of CISSP Domain 4: Communication and Network Security
1. Network Architecture and Design
This section covers the principles of secure network architecture, including segmentation, defense-in-depth strategies, and security controls.
1.1 Secure Network Architecture Concepts
- Defense in Depth: Implementing multiple layers of security controls to reduce risk.
- Segmentation: DMZ (Demilitarized Zone): A buffer zone between the internal network and external threats. VLANs (Virtual Local Area Networks): Logical segmentation to restrict broadcast domains. Microsegmentation: Limits east-west traffic within a data center.
- Zero Trust Architecture (ZTA): No implicit trust; requires verification at all levels.
- Software-Defined Networking (SDN): Centralized management of network resources, enhancing security and flexibility.
- Cloud Networking: Secure cloud network designs (e.g., Virtual Private Clouds (VPCs), Security Groups, Network ACLs).
1.2 Network Topologies
- LAN (Local Area Network)
- WAN (Wide Area Network)
- MAN (Metropolitan Area Network)
- SAN (Storage Area Network)
- CAN (Campus Area Network)
1.3 Network Security Models
- OSI Model: Understand security at each of the 7 layers.
- TCP/IP Model: Secure transport and network protocols like TCP, UDP, and IPsec.
2. Secure Network Components and Devices
Understanding different network devices and their security implications.
2.1 Network Devices and Security Controls
- Firewalls: Packet-filtering, stateful inspection, next-gen firewalls (NGFW). Host-based vs. network-based firewalls.
- Intrusion Detection & Prevention Systems (IDS/IPS): IDS = Detects attacks (passive). IPS = Prevents attacks (active).
- Proxies: Forward and reverse proxies for traffic filtering.
- Load Balancers: Distribute traffic and mitigate DoS attacks.
- DDoS Mitigation Devices: Scrub malicious traffic.
2.2 Network Access Control (NAC)
- 802.1X Authentication: Uses RADIUS for device authentication.
- MAC Filtering: Restricts access based on device MAC addresses.
- Port Security: Limits devices that can connect to a switch.
3. Network Protocols and Security
Understanding secure and insecure protocols, cryptographic protections, and transmission methods.
3.1 Common Network Protocols
- Secure Protocols: HTTPS (SSL/TLS): Secure web traffic. SSH (Secure Shell): Secure remote access. IPsec (VPN security): Encrypts network traffic. SFTP (Secure File Transfer Protocol).
- Insecure Protocols: (Should be replaced with secure versions) Telnet (Use SSH instead). FTP (Use SFTP or FTPS instead). HTTP (Use HTTPS instead).
3.2 Wireless Network Security
- WPA3: Strongest encryption for Wi-Fi networks.
- WPA2-Enterprise: Uses RADIUS for authentication.
- MAC Spoofing and Evil Twin Attacks: Security risks of public Wi-Fi.
- Wi-Fi Encryption Methods: WEP (weak), WPA, WPA2, WPA3.
3.3 Virtual Private Networks (VPNs)
- Remote Access VPN: Employees connect securely to a corporate network.
- Site-to-Site VPN: Securely connects branch offices.
- SSL/TLS VPN vs. IPsec VPN: SSL VPN = Browser-based, easier deployment. IPsec VPN = Stronger encryption, requires VPN client.
4. Network Attacks and Countermeasures
Recognizing common network attacks and applying security defenses.
4.1 Common Network-Based Attacks
- Denial of Service (DoS) & Distributed DoS (DDoS): Overwhelm network resources.
- Man-in-the-Middle (MITM): Intercepting network traffic.
- Session Hijacking: Taking over a valid network session.
- ARP Spoofing: Spoofing MAC addresses to redirect traffic.
- DNS Poisoning: Redirecting users to malicious websites.
- Packet Sniffing: Capturing network traffic using tools like Wireshark.
4.2 Countermeasures
- DDoS Mitigation: Rate limiting, blackholing, and cloud-based protection.
- Network Encryption: IPsec, TLS, and VPNs to protect data in transit.
- Intrusion Detection & Prevention Systems (IDS/IPS): To detect and stop attacks.
- Network Segmentation: Reduce attack surface and limit lateral movement.
5. Secure Network Communication
Ensuring data confidentiality, integrity, and availability during transmission.
5.1 Cryptographic Protocols for Secure Communication
- TLS (Transport Layer Security): Secure web traffic.
- IPsec (Internet Protocol Security): Secure VPNs and network traffic.
- PKI (Public Key Infrastructure): Uses digital certificates for authentication.
- End-to-End Encryption (E2EE): Encrypts data between sender and receiver.
5.2 Secure Remote Access Methods
- RDP (Remote Desktop Protocol): Secure with VPN, MFA, and gateway servers.
- SSH (Secure Shell): Encrypts remote terminal access.
- Cloud-Based Remote Work Solutions: Zero Trust, endpoint security, MFA.
6. Network Monitoring and Incident Response
Monitoring network activity and responding to security incidents.
6.1 Logging & Monitoring
- SIEM (Security Information and Event Management): Aggregates logs and detects anomalies.
- NetFlow & Packet Capture: Analyze network traffic trends.
6.2 Incident Detection & Response
- Network Forensics: Investigating security breaches.
- Anomaly Detection: Identifying unusual network behavior.
- Threat Intelligence Integration: Proactive security monitoring.
Key Takeaways for CISSP Exam
- Understand secure network architecture – segmentation, DMZs, VLANs, SDN, and Zero Trust.
- Know key security protocols – TLS, IPsec, SSH, HTTPS, and SFTP.
- Recognize common network attacks – MITM, DDoS, ARP poisoning, and session hijacking.
- Understand network security devices – firewalls, IDS/IPS, proxies, load balancers.
- Be familiar with secure remote access – VPNs, RDP, and SSH.
- Know how to monitor and respond to threats – SIEM, logging, and anomaly detection.
This domain emphasizes defensive strategies to ensure secure data transmission and network protection against evolving cyber threats.