Best-practice-for-network-segmentation Logo

Best-practice-for-network-segmentation

0
Free
Visit Website

Best practices for segmentation of the corporate network of any company. Graphic diagrams are available in the Release page. The schema sources are located in the repository. Elements used in network diagrams: Crossing the border of the rectangle means crossing the firewall. Level 1 of network segmentation: basic segmentation. Advantages: Basic segmentation to protect against basic targeted attacks that make it difficult for an attacker to advance on the network. Basic isolation of the productive environment from the corporate one. Disadvantages: The default corporate network should be considered potentially compromised. Potentially compromised workstations of ordinary workers, as well as workstations of administrators, have basic and administrative access to the production network. In this regard, the compromise of any workstation can theoretically lead to the exploitation of the following attack vector. An attacker compromises a workstation in the corporate network. Further, the attacker can move laterally within the network, potentially accessing sensitive data and systems.

FEATURES

ALTERNATIVES

An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.

edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.

Free online class for web security and hacking

A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.

A collection of write-ups from Capture The Flag hacking competitions

A documentation template library for implementing industrial information security management systems.

A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.

Cybersecurity training platform with courses, certifications, and study guides.