没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
美国国家安全局网络安全技术报告,《网络基础设施安全指南》2022年3月发布,随着新的漏洞被对手利用,新的安全特性被实施,以及保护设备的新方法被识别,保护网络的指导方针继续发展。不正确的配置、不正确的配置处理和较弱的加密密钥可能暴露整个网络的漏洞。所有的网络都有妥协的风险,特别是如果设备没有正确地配置和维护。管理员角色对于保护网络免受对抗技术的影响至关重要,需要专职人员保护网络上的设备、应用程序和信息。
资源详情
资源评论
资源推荐
National Security Agency
Cybersecurity Technical Report
Network Infrastructure
Security Guidance
March 2022
PP-22-0266
Version 1.0
PP-22-0266 | MAR 2022 Ver. 1.0
ii
National Security Agency | Cybersecurity Technical Report
Network Infrastructure Security Guidance
Notices and history
Disclaimer of warranties and endorsement
The information and opinions contained in this document are provided "as is" and without any warranties
or guarantees. Reference herein to any specific commercial products, process, or service by trade name,
trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government, and this guidance shall not be used for
advertising or product endorsement purposes.
Trademark recognition
Cisco
®
and Cisco IOS
®
are registered trademarks of Cisco Systems, Inc.
Publication information
Author(s)
National Security Agency
Cybersecurity Directorate
Contact information
Client Requirements / General Cybersecurity Inquiries:
Cybersecurity Requirements Center, 410-854-4200, Cybersecurity_Requests@nsa.gov
Media inquiries / Press Desk:
Media Relations, 443-634-0721, MediaRelations@nsa.gov
Defense Industrial Base Inquiries for Cybersecurity Services:
DIB Cybersecurity Program, DIB_Defense@cyber.nsa.gov
Purpose
This document was developed in furtherance of NSA’s cybersecurity missions. This includes its
responsibilities to identify and disseminate threats to National Security Systems, Department of Defense
information systems, and the Defense Industrial Base, and to develop and issue cybersecurity
specifications and mitigations. This information may be shared broadly to reach all appropriate
stakeholders.
PP-22-0266 | MAR 2022 Ver. 1.0
iii
National Security Agency | Cybersecurity Technical Report
Network Infrastructure Security Guidance
Contents
Network Infrastructure Security Guidance ......................................................................i
Contents ......................................................................................................................................iii
1. Introduction ............................................................................................................................... 1
1.1 Regarding Zero Trust ........................................................................................................................................ 1
2. Network architecture and design ............................................................................................ 2
2.1 Install perimeter and internal defense devices ....................................................................................... 2
2.2 Group similar network systems ..................................................................................................................... 3
2.3 Remove backdoor connections .................................................................................................................... 4
2.4 Utilize strict perimeter access controls ...................................................................................................... 4
2.5 Implement a network access control (NAC) solution ........................................................................... 5
2.6 Limit and encrypt virtual private networks (VPNs) ................................................................................ 5
3. Security maintenance............................................................................................................... 8
3.1 Verify software and configuration integrity ............................................................................................... 8
3.2 Maintain proper file system and boot management ............................................................................. 9
3.3 Maintain up-to-date software and operating systems ........................................................................ 10
3.4 Stay current with vendor-supported hardware ...................................................................................... 10
4. Authentication, authorization, and accounting (AAA) ....................................................... 11
4.1 Implement centralized servers .................................................................................................................... 11
4.2 Configure authentication ................................................................................................................................ 12
4.3 Configure authorization .................................................................................................................................. 13
4.4 Configure accounting ...................................................................................................................................... 14
4.5 Apply principle of least privilege ................................................................................................................. 15
4.6 Limit authentication attempts ....................................................................................................................... 16
5. Administrator accounts and passwords .............................................................................. 17
5.1 Use unique usernames and account settings ....................................................................................... 17
5.2 Change default passwords ........................................................................................................................... 17
5.3 Remove unnecessary accounts ................................................................................................................. 18
5.4 Employ individual accounts .......................................................................................................................... 18
5.5 Store passwords with secure algorithms ................................................................................................ 19
5.6 Create strong passwords .............................................................................................................................. 21
5.7 Utilize unique passwords ............................................................................................................................... 22
5.8 Change passwords as needed ................................................................................................................... 22
6. Remote logging and monitoring ........................................................................................... 24
6.1 Enable logging ................................................................................................................................................... 24
6.2 Establish centralized remote log servers ................................................................................................ 25
6.3 Capture necessary log information ............................................................................................................ 25
6.4 Synchronize clocks .......................................................................................................................................... 26
7. Remote administration and network services .................................................................... 28
7.1 Disable clear text administration services .............................................................................................. 28
7.2 Ensure adequate encryption strength ...................................................................................................... 29
7.3 Utilize secure protocols .................................................................................................................................. 30
7.4 Limit access to services ................................................................................................................................. 31
PP-22-0266 | MAR 2022 Ver. 1.0
iv
National Security Agency | Cybersecurity Technical Report
Network Infrastructure Security Guidance
7.5 Set acceptable timeout period ..................................................................................................................... 31
7.6 Enable Transmission Control Protocol (TCP) keep-alive ................................................................. 32
7.7 Disable outbound connections .................................................................................................................... 32
7.8 Remove SNMP read-write community strings ...................................................................................... 33
7.9 Disable unnecessary network services ................................................................................................... 34
7.10 Disable discovery protocols on specific interfaces ........................................................................... 35
7.11 Network service configurations ................................................................................................................ 35
7.11.1 SSH ............................................................................................................................................................. 36
7.11.2 HTTP .......................................................................................................................................................... 38
7.11.3 SNMP ......................................................................................................................................................... 39
8. Routing ..................................................................................................................................... 39
8.1 Disable IP source routing .............................................................................................................................. 40
8.2 Enable unicast reverse-path forwarding (uRPF).................................................................................. 40
8.3 Enable routing authentication ...................................................................................................................... 41
9. Interface ports ......................................................................................................................... 42
9.1 Disable dynamic trunking .............................................................................................................................. 42
9.2 Enable port security ......................................................................................................................................... 43
9.3 Disable default VLAN ...................................................................................................................................... 44
9.4 Disable unused ports ...................................................................................................................................... 46
9.5 Disable port monitoring .................................................................................................................................. 47
9.6 Disable proxy Address Resolution Protocol (ARP) ............................................................................. 48
10. Notification banners ............................................................................................................. 48
10.1 Present a notification banner .................................................................................................................... 49
11. Conclusion ............................................................................................................................ 50
Acronyms ..................................................................................................................................... 51
References ................................................................................................................................... 53
Works cited ................................................................................................................................................................. 53
Related guidance ..................................................................................................................................................... 54
Figure 1: Network perimeter with firewalls and a DMZ.................................................................................... 3
PP-22-0266 | MAR 2022 Ver. 1.0
1
National Security Agency | Cybersecurity Technical Report
Network Infrastructure Security Guidance
1. Introduction
Guidance for securing networks continues to evolve as new vulnerabilities are exploited
by adversaries, new security features are implemented, and new methods of securing
devices are identified. Improper configuration,
incorrect handling of configurations, and weak
encryption keys can expose vulnerabilities in the
entire network. All networks are at risk of
compromise, especially if devices are not
properly configured and maintained. An
administrator’s role is critical to securing the
network against adversarial techniques and requires dedicated people to secure the
devices, applications, and information on the network.
This report presents best practices for overall network security and protection of
individual network devices, and will assist administrators in preventing an adversary
from exploiting their network. While the guidance presented here is generic and can be
applied to many types of network devices, sample commands for Cisco Internetwork
Operating System (IOS) devices are provided which can be executed to implement the
recommendations.
1.1 Regarding Zero Trust
Zero Trust is a security model, a set of system design principles, and a coordinated
cybersecurity and system management strategy based on an acknowledgement that
threats exist both inside and outside traditional network boundaries. The National
Security Agency (NSA) fully supports the Zero Trust security model, and much of the
guidance in this report can be applied at different boundaries as recommended in Zero
Trust guidance. However, this report is focused on providing guidance to mitigate
common vulnerabilities and weaknesses on existing networks. As system owners
introduce new network designs intended to achieve more mature Zero Trust principles,
this guidance may need to be modified.
An administrator’s
role is critical in
securing networks.
剩余57页未读,继续阅读
sdywgwlf2830
- 粉丝: 0
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 基于强化学习的多目标跟踪器Matlab代码.rar
- 基于线的扩展卡尔曼滤波器用于机器人在V-Rep上的定位Matlab代码.rar
- 基于有限差分法计算固结过程中单层和双层排水的孔隙水压力随时间的变化Matlab实现.rar
- 基于通信的无人机集群任务Matlab代码.rar
- 基于最大最小特征值(CMME)组合的认知无线电频谱感知 matlab代码.rar
- 计算高斯光束束腰半径调节Matlab代码.rar
- 计算无人机航程和续航力的matlab项目 matlab代码.rar
- 建立了连续时间EKF、混合EKF和离散时间EKF的性能比较Matlab程序.rar
- 卡尔曼滤波器设计与Matlab仿真。考虑了静态和时变卡尔曼滤波器.rar
- 卡尔曼滤波器 EKF 和 SLAM附Matlab代码.rar
- 考虑表面形貌对研究的影响时,模拟出生高斯或非高斯表面 matlab代码.rar
- 扩展卡尔曼滤波器Matlab代码.rar
- 开发计算扭矩控制器、计算扭矩控制器以及具有恒定、抛物线和正弦参考的 EKF 和 Li-Slotine 控制器.rar
- 离散E的电容式设施选址问题的深度强化学习Matlab代码.rar
- 扩展卡尔曼滤波器同步本地化方法的情感评价模块(ECF-SAEM)Matlab代码.rar
- 田螺去尾巴机3D图纸和工程图机械结构设计图纸和其它技术资料和技术方案非常好100%好用.zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0