IPS signature management
• You determine what happens when unwanted traffic
appears
• Block, allow, send an alert, etc.
• Thousands of rules - Or more
Device hardening
• Hardening guides are specific to the software or
platform
• Get feedback from the manufacturer or Internet
interest group
• Other general-purpose guides are available online
The native VLAN
• This is different than the “default VLAN”
• The default VLAN is the VLAN assigned to an
interface by default
• Change the native VLAN number (e.g., VLAN 999)
• Management protocols will continue to use VLAN 1
(even if it’s not formally configured on the trunk)
• Non-trunked traffic will use the native VLAN number
(VLAN 999)
Privileged accounts
• Complete access to the system
• Often used to manage hardware, drivers, and
software installation
• User accounts should have limited control
• Role separation with different access rights
• More difficult for a single limited account to breach
security
FIM (File Integrity Monitoring)
• Monitor important operating system &
application files
• Identify when changes occur
Restricting access via ACLs
Use device ACLs to limit access to important
infrastructure devices
• Only admins should be able to login
Honeypots
• Constant battle to discern the real from the fake
Penetration testing
• National Institute of Standards and Technology
Technical Guide to Information Security Testing and
Assessment