没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
美国国家安全局网络安全技术报告,《网络基础设施安全指南》2022年3月发布,随着新的漏洞被对手利用,新的安全特性被实施,以及保护设备的新方法被识别,保护网络的指导方针继续发展。不正确的配置、不正确的配置处理和较弱的加密密钥可能暴露整个网络的漏洞。所有的网络都有妥协的风险,特别是如果设备没有正确地配置和维护。管理员角色对于保护网络免受对抗技术的影响至关重要,需要专职人员保护网络上的设备、应用程序和信息。
资源详情
资源评论
资源推荐
National Security Agency
Cybersecurity Technical Report
Network Infrastructure
Security Guidance
March 2022
PP-22-0266
Version 1.0
PP-22-0266 | MAR 2022 Ver. 1.0
ii
National Security Agency | Cybersecurity Technical Report
Network Infrastructure Security Guidance
Notices and history
Disclaimer of warranties and endorsement
The information and opinions contained in this document are provided "as is" and without any warranties
or guarantees. Reference herein to any specific commercial products, process, or service by trade name,
trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government, and this guidance shall not be used for
advertising or product endorsement purposes.
Trademark recognition
Cisco
®
and Cisco IOS
®
are registered trademarks of Cisco Systems, Inc.
Publication information
Author(s)
National Security Agency
Cybersecurity Directorate
Contact information
Client Requirements / General Cybersecurity Inquiries:
Cybersecurity Requirements Center, 410-854-4200, Cybersecurity_Requests@nsa.gov
Media inquiries / Press Desk:
Media Relations, 443-634-0721, MediaRelations@nsa.gov
Defense Industrial Base Inquiries for Cybersecurity Services:
DIB Cybersecurity Program, DIB_Defense@cyber.nsa.gov
Purpose
This document was developed in furtherance of NSA’s cybersecurity missions. This includes its
responsibilities to identify and disseminate threats to National Security Systems, Department of Defense
information systems, and the Defense Industrial Base, and to develop and issue cybersecurity
specifications and mitigations. This information may be shared broadly to reach all appropriate
stakeholders.
PP-22-0266 | MAR 2022 Ver. 1.0
iii
National Security Agency | Cybersecurity Technical Report
Network Infrastructure Security Guidance
Contents
Network Infrastructure Security Guidance ......................................................................i
Contents ......................................................................................................................................iii
1. Introduction ............................................................................................................................... 1
1.1 Regarding Zero Trust ........................................................................................................................................ 1
2. Network architecture and design ............................................................................................ 2
2.1 Install perimeter and internal defense devices ....................................................................................... 2
2.2 Group similar network systems ..................................................................................................................... 3
2.3 Remove backdoor connections .................................................................................................................... 4
2.4 Utilize strict perimeter access controls ...................................................................................................... 4
2.5 Implement a network access control (NAC) solution ........................................................................... 5
2.6 Limit and encrypt virtual private networks (VPNs) ................................................................................ 5
3. Security maintenance............................................................................................................... 8
3.1 Verify software and configuration integrity ............................................................................................... 8
3.2 Maintain proper file system and boot management ............................................................................. 9
3.3 Maintain up-to-date software and operating systems ........................................................................ 10
3.4 Stay current with vendor-supported hardware ...................................................................................... 10
4. Authentication, authorization, and accounting (AAA) ....................................................... 11
4.1 Implement centralized servers .................................................................................................................... 11
4.2 Configure authentication ................................................................................................................................ 12
4.3 Configure authorization .................................................................................................................................. 13
4.4 Configure accounting ...................................................................................................................................... 14
4.5 Apply principle of least privilege ................................................................................................................. 15
4.6 Limit authentication attempts ....................................................................................................................... 16
5. Administrator accounts and passwords .............................................................................. 17
5.1 Use unique usernames and account settings ....................................................................................... 17
5.2 Change default passwords ........................................................................................................................... 17
5.3 Remove unnecessary accounts ................................................................................................................. 18
5.4 Employ individual accounts .......................................................................................................................... 18
5.5 Store passwords with secure algorithms ................................................................................................ 19
5.6 Create strong passwords .............................................................................................................................. 21
5.7 Utilize unique passwords ............................................................................................................................... 22
5.8 Change passwords as needed ................................................................................................................... 22
6. Remote logging and monitoring ........................................................................................... 24
6.1 Enable logging ................................................................................................................................................... 24
6.2 Establish centralized remote log servers ................................................................................................ 25
6.3 Capture necessary log information ............................................................................................................ 25
6.4 Synchronize clocks .......................................................................................................................................... 26
7. Remote administration and network services .................................................................... 28
7.1 Disable clear text administration services .............................................................................................. 28
7.2 Ensure adequate encryption strength ...................................................................................................... 29
7.3 Utilize secure protocols .................................................................................................................................. 30
7.4 Limit access to services ................................................................................................................................. 31
PP-22-0266 | MAR 2022 Ver. 1.0
iv
National Security Agency | Cybersecurity Technical Report
Network Infrastructure Security Guidance
7.5 Set acceptable timeout period ..................................................................................................................... 31
7.6 Enable Transmission Control Protocol (TCP) keep-alive ................................................................. 32
7.7 Disable outbound connections .................................................................................................................... 32
7.8 Remove SNMP read-write community strings ...................................................................................... 33
7.9 Disable unnecessary network services ................................................................................................... 34
7.10 Disable discovery protocols on specific interfaces ........................................................................... 35
7.11 Network service configurations ................................................................................................................ 35
7.11.1 SSH ............................................................................................................................................................. 36
7.11.2 HTTP .......................................................................................................................................................... 38
7.11.3 SNMP ......................................................................................................................................................... 39
8. Routing ..................................................................................................................................... 39
8.1 Disable IP source routing .............................................................................................................................. 40
8.2 Enable unicast reverse-path forwarding (uRPF).................................................................................. 40
8.3 Enable routing authentication ...................................................................................................................... 41
9. Interface ports ......................................................................................................................... 42
9.1 Disable dynamic trunking .............................................................................................................................. 42
9.2 Enable port security ......................................................................................................................................... 43
9.3 Disable default VLAN ...................................................................................................................................... 44
9.4 Disable unused ports ...................................................................................................................................... 46
9.5 Disable port monitoring .................................................................................................................................. 47
9.6 Disable proxy Address Resolution Protocol (ARP) ............................................................................. 48
10. Notification banners ............................................................................................................. 48
10.1 Present a notification banner .................................................................................................................... 49
11. Conclusion ............................................................................................................................ 50
Acronyms ..................................................................................................................................... 51
References ................................................................................................................................... 53
Works cited ................................................................................................................................................................. 53
Related guidance ..................................................................................................................................................... 54
Figure 1: Network perimeter with firewalls and a DMZ.................................................................................... 3
PP-22-0266 | MAR 2022 Ver. 1.0
1
National Security Agency | Cybersecurity Technical Report
Network Infrastructure Security Guidance
1. Introduction
Guidance for securing networks continues to evolve as new vulnerabilities are exploited
by adversaries, new security features are implemented, and new methods of securing
devices are identified. Improper configuration,
incorrect handling of configurations, and weak
encryption keys can expose vulnerabilities in the
entire network. All networks are at risk of
compromise, especially if devices are not
properly configured and maintained. An
administrator’s role is critical to securing the
network against adversarial techniques and requires dedicated people to secure the
devices, applications, and information on the network.
This report presents best practices for overall network security and protection of
individual network devices, and will assist administrators in preventing an adversary
from exploiting their network. While the guidance presented here is generic and can be
applied to many types of network devices, sample commands for Cisco Internetwork
Operating System (IOS) devices are provided which can be executed to implement the
recommendations.
1.1 Regarding Zero Trust
Zero Trust is a security model, a set of system design principles, and a coordinated
cybersecurity and system management strategy based on an acknowledgement that
threats exist both inside and outside traditional network boundaries. The National
Security Agency (NSA) fully supports the Zero Trust security model, and much of the
guidance in this report can be applied at different boundaries as recommended in Zero
Trust guidance. However, this report is focused on providing guidance to mitigate
common vulnerabilities and weaknesses on existing networks. As system owners
introduce new network designs intended to achieve more mature Zero Trust principles,
this guidance may need to be modified.
An administrator’s
role is critical in
securing networks.
剩余57页未读,继续阅读
sdywgwlf2830
- 粉丝: 0
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 恒压供水一拖三程序 全网中这是本人原创,拿的另赠FB块 1.采用三菱FX3U CPU 加2N2AD和4DA模块; 2.触摸屏采用昆仑通态;同时串口通讯PLC和485通迅变频器; 3.PL
- cruise matlab纯电动二档实际模型,核心问题:计算最优速比和最优档策略,可以延伸到多档变速器领域 一个模型搞定纯电动车动力性经济性计算问题
- MATLAB代码:考虑安全约束及热备用的电力系统机组组合研究 关键词:机组组合 直流潮流 优化调度 仿真平台:MATLAB+CPLEX gurobi平台 优势:代码具有一定的深度和创新性,注释清晰
- 西门子PLC 和v90 伺服变频器G120通讯 2台西门子变频器G120 Profinet通讯,4台伺服V90 PN口通讯,变频器和伺服已写好FB块,非常好用,方便省事,不必再每个写梯形图浪费时间
- ethercat主站soem开发板,stm32f407 stm32h7低成本主站方案,带台达伺服电机,ls伺服电机,三洋伺服电机,汇川伺服电机,雷塞智能步进电机等支持ethercat的设备 支持DC
- 电机控制源码 电机控制源码,BLDC无刷直流电机基于stm3 2F1的有传感器和无传感驱动 直流无刷电机有传感器和无传感驱动程序识的赶紧上车 无传感的的实现是基于反电动势过零点实现的,无传感是霍尔实
- 上位机控制三菱变频器 DEMO (VB.NET), (可编辑上位机与三菱PLC,西门子PLC通讯, 数据采集,)源码带详细注释 本程序有详细步骤和超详细的中文注释,可以控制多台变频器,采用mod
- 三菱Q型pLc.QD75Mh4定位及控制.4轴伺服定位及控制,触摸屏及plc程序,三菱伺服,光纤伺服通讯,参考性强,已安全应用,4轴机械手抓拿焊接线,技术性资料
- 西门子200smart PLC与昆仑通态触摸屏所写的脉冲除尘器程序 20个仓,每个仓包含12个脉冲阀,手动和自动控制,定时延时切仓门和脉冲阀 包含PLC程序,触摸屏组态画面,工艺流程,电气原理图
- 堪比QT控件漂亮的LabVIEW俱全控件 一位老工程师,多年的经验积累的
- ESP8266生成二维码算法 OLED显示 支持各种平台移植 算法部分采用c语言,可以移植到各种平台 代码有两种,一种是arduino开发的,一种是乐鑫sdk安信可开发环境的 两种任选一种,联系
- ACS800防爆变频器设计方案,全套图纸、电路板、程序
- 机械臂视觉抓取仿真,vrep与matlab联合仿真示例,仅供学习 matlab端通过GUI控制机械臂抓不同的物体,在matlab端有简单的图像处理算法,未优化,可以自己改进 基础太差的勿用
- 三菱Q系列PLC大型程序Q01U伺服12轴 实际使用中程序 2个模块QD70P8,QD70P4控制12轴 模块QD62外接欧姆龙编码器E6C2-CWZ6C 模块QJ71C24N-R2和基恩士DL-RS
- 西门子PID程序,西门子PLC 1200和多台G120西门子变频器Modbud RTU通讯,带西门子触摸屏,带变频器参数 Modbus通讯报文详细讲解,PID自写FB块无密码可以直接应用到程序,PID
- FPGA以太网 TOE TCP IP协议栈 源码 千兆,万兆 ping,arp,igmp,udp,tcp,dhcp…… 提供k7板卡测试工程,纯hdl的,轻松移植到任意fpga
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0