Page 38 - ITGC_Audit Guides
P. 38

Figure 14: Web Application Firewall Placement Example








                    End Users                     Web Application   Web Servers
                                                      Firewall

                    Source: The Institute of Internal Auditors.


                   Additional security can be implemented through configuration to reject destinations with
                   questionable reputations. Security tools, such as firewalls, can intercept packets, inspect header
                   information, or even reconstruct the original data from up the stack to inspect it for security
                   threats.
                   IDS/IPS

                   Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are devices or software
                   applications that monitor network traffic for indications of compromise or attempted compromise
                   of a system. IDS and IPS rule sets can be very large and each rule may require calibration and
                   threshold setting to ensure system integrity, such as preventing false positives. Well-calibrated
                   and well-monitored IDS and IPS applications can greatly increase an organization’s ability to
                   detect and stop attacks.

                   Alerts generated by an IDS are usually collected in a security information and event management
                   (SIEM) system. Alerts can be correlated with network traffic flow information (net flows) and
                   perimeter security tools such as firewalls. IDS alerts are compared against IPS rules; if there is a
                   match, the IPS and/or the data/information leakage prevention (DLP/ILP), software designed to
                   detect potential data breaches will execute a rule to stop an activity from taking place.

                   Wireless Access Points (APs)
                   A wireless access point (AP) provides wireless access to a network. Modern APs provide options
                   for encryption, or scrambling and securing data transmitted, but because the technological world
                   is advancing so rapidly, systems often fail to keep up with bad actors who attempt to override
                   encryption features for their own ― usually (or often) criminal or malicious ― purposes.

                   Corporate environments achieve wireless network access by broadcasting radio signals between
                   hosts and access points. An AP provides a range of options for the Layer 1 architecture of
                   wireless service. Depending on the age of equipment used, several types of encryption may be
                   used, or an organization may choose not to use encryption. However, this can expose the
                   organization to additional risk, and it is a relatively inexpensive cost to upgrade wireless network
                   components, in order to increase security.
                   Upgrading equipment or configuration of the entire user base to use newer encryption protocols
                   can be a very large task. Here is a brief list of various wireless encryption protocols, from least
                   encryption to most.






                   30 — theiia.org
   33   34   35   36   37   38   39   40   41   42   43