C700 PerformanceAssessment
C700 PerformanceAssessment
Joshua Farrow
Ron Mendell
September 8, 2022
2
Contents
Company A’s Network Problems........................................................................................4
Integration Problems............................................................................................................3
References............................................................................................................................5
3
First, starting with the organizational chart, it is recommended to add a Compliance and
Risk Management department. If the merger is going to move the position of IT director to Chief
Information Officer (CIO), it would also make sense to create a Chief Information Security
Officer (CISO) role. If money does not permit another C-level position, the recommendation
would be to create a Corporate Information Systems Manager (CISM) position underneath the
CIO. This would provide the company with resources capable of directing corporate security
The current structure does not provide much in the way of a Security Operations Center,
and this merger will give the best opportunity to establish one. The recommendation is to
incorporate the Help Desk and Network Operations Center into an overarching Security
Operations Center. Assuming that the CISM route above is chosen, this position would be placed
within the SOC, with a Security Administrator position also added to this area. It is also
recommended to provide cross-training to the networking and security teams so that they are
each familiar with the basics of the other’s department. The help desk technicians should also
receive basic-level security training to ensure that the main, front-line defense is trained
Moving on to the components that make up the network, several issues need to be
remediated immediately:
4
Networking Devices:
3) Cisco PIX 515E firewalls were retired and reached EOL on May 25,
Operating Systems:
different brand.
1) Open common ports on several workstations utilized for remote desktop capability.
is being utilized to explicitly list what sources can access these devices remotely.
a. Inactive accounts pose a security threat by providing the potential for former
a. Password retirement and refreshing should occur regularly. This ensures password
reuse is avoided, and any credentials an attacker may have stolen will eventually
be made unusable.
VLANs is recommended.
6
Figure 1
Company B’s current topology can be seen above in Figure 1. The WinXP, Win7, and
Ubuntu18 machines appear in a DMZ, with all core servers placed behind the OPNsense
firewall. It did not appear that any of the “DMZ” machines were able to reach the servers behind
the firewall. This seems to be due to a missing route on the router in front of the firewall. Due to
this, an external scan of the “DMZ” was chosen as the preferred scanning method. From this
scan, two significant security impacts were found on Company B’s network:
Official support for Windows XP ended on April 8, 2014 (Microsoft Inc., n.d.). Besides
an emergency patch release for XP SP3 in 2017 regarding the WannaCry exploit (Horowitz,
8
2017), there has been no other support for Windows XP. Due to this, it has been highly
recommended that organizations upgrade all existing XP machines to Windows 10. Continuing
to utilize Windows XP in the merged environment will bring significant risks in the inability to
The Nmap scan results revealed that Telnet was in use via the OPNsense firewall. Upon
further examination, it was determined that the firewall currently port-forwards all Telnet traffic
to 192.168.25.4 (see Figure 2 below), which corresponds to the Windows 2008 R2 server. A
connection was established from the external Kali machine to this server, and utilizing the admin
Figure 2
9
Windows XP Machine
Windows 10 machine. Care would need to be taken to ensure that any software running on the
device is upgraded accordingly. This would only be important if the machine were hosting
software that had the potential to negatively impact the company should it be made unavailable.
Otherwise, simply replacing the machine will suffice. If the device is not needed, the suggestion
would be eliminating it. This solution will ensure that all machines on the network are capable of
It is best practice to replace Telnet connections with the SSH protocol. This ensures that
all data is encrypted, including any passwords passed to the machine. Suppose there is software
that is dependent on the Telnet protocol. In that case, it is recommended to find a replacement,
especially if the device hosting the connection will be publicly accessible in any way. This
solution ensures that only encrypted tunneling options exist within the network.
1
``
2
Components Retained
Switches. It was determined that the current switches (4 x Cisco 2960 48-port, 3 x Cisco
2960 24-port) were far past their end-of-life date and needed to be replaced. Four 48-port, full-
POE, and four 24-port, full-POE FortiSwitches were chosen to replace the Cisco switches. These
are layer-3 switches and thus incorporate the capability for routing. The reason for selecting
Fortinet switches was purely due to personal preference. As it stands, any current model and
brand would create a more robust security posture than what the Cisco 2960s were previously
providing. The FortiSwitches have been paired up with a three-year, 24x7 FortiCare warranty.
Firewall. It was determined that the current firewall (Cisco PIX 515E) was already far
past its end-of-life date. A FortiGate 80F was chosen to replace the Cisco firewall. Due to its
features and capabilities, the 80F will provide substantially better security performance than the
PIX 515E. The FortiGate has been paired up with a three-year, 24x7 FortiCare warranty.
Servers. Both Windows 2008 R2 servers have been upgraded to Windows Server 2016.
This ensures that none of the servers are without official Windows support.
1
Components Removed
Border Router. The decision was made to remove the border router, as the new
FortiGate 80F will be able to fill this role without issue. It includes two SPF ports if a fiber
connection is needed. It will also be able to facilitate a DMZ, as well as an internal LAN. Both
network zones will be physically segregated by interfaces, as well as logically, via firewall
policy on the 80F. The 80F will also act as a VPN headend for employees to access specific
Components Added
DMZ Switch. A DMZ switch was added to the topology to allow for future scalability of
the DMZ. The switch will not play a substantial part in the network’s security but will provide
better functionality in the future, should more resources be needed within the DMZ.
Network Segmentation
The merged network will include network segmentation physically and virtually.
interface on FortiGate 80F. This ensures that traffic between the DMZ and all other interfaces
different VLANs. As shown in the topology diagram, three VLANs have been created: users,
printers, and servers. Security policy will be applied to the FortiSwitches to filter which traffic is
Defense-in-Depth
Initially, six PCs had remote access open to the public internet. This created a significant
security hole by allowing an attacker direct access to the corporate network. The need for
employees to remotely access their workstations still exists, so a VPN has been created to enable
employees to connect to the corporate network in a much safer and more secure manner. The
VPN is facilitated by the FortiGate 80F and requires the use of the FortiClient VPN software on
any device the employee wants to use to connect to the VPN. Should an attacker attempt to break
into the network, they would first need to be able to sign in to the VPN as an authorized
employee. Any attacks they perform would then need to get past the network and operating
system firewalls on the workstations and servers. Since all the machines are now at current
operating systems, the attacker would have to find an unpatched machine to take over. The
chances of this occurring have dropped significantly with the new network design.
2
Hardware Component
FortiGate 80F Firewall. The new FortiGate 80F firewall provides security in the
form of firewall policies, as an intrusion protection system, web filtering, SSL certificate
inspection, and antivirus. Being set up as a border device, the firewall will be the first line of
defense against attacks, so it must have multiple capabilities to defend the network adequately.
Software Component
Windows Server 2016. As a current operating system, Windows Server 2016 has
a built-in, host-based firewall (Windows Advanced Firewall) and built-in antivirus software
(Windows Defender). This gives the organization a much more robust security posture as it
relates to the various servers utilized in the environment. This will reduce the number of attack
With the merger of Company B, the organization will be required to comply with the
Gramm-Leach-Bliley Act (GLBA). The merged network topology specifically complies with
(i) Authenticate and permit access only to authorized users to protect against the
(ii) Limit authorized users' access only to customer information that they need to
perform their duties and functions or, in the case of customers, access their data.
This is accomplished in several ways. First, access to the internal network from external
connections is facilitated by the firewall. Any external access requires a corresponding policy to
be in place for access to be granted. The only type of data that is publicly accessible is that which
a firewall policy has defined. Secondly, only authorized, intra-VLAN network traffic is allowed
due to network segmentation. This is accomplished via ACLs on the FortiSwitches, which can
dictate what source subnets and IP addresses can access specific destination VLANs and hosts.
Third, using a domain controller ensures that role-based access controls are implemented. The
domain controller will utilize some form of the LDAP protocol, allowing limited resource access
to only those users who require it. This provides a least-privilege security principle as well.
Integration Problems
The current Windows Server 2012 server will reach end-of-life on October 13, 2026
(Microsoft, Inc., n.d.). This is when the final security update extension expires. Therefore, this
operating system will be obsolete within four years. Once this occurs, the server will no longer
receive security updates and may end up causing adverse effects on the network, thereby creating
a network problem.
At present, there is no policy provided for employee security training. Even with all the
new additions to the network, the users remain the best protection for the environment. With no
user education planned, a widening security threat will emerge as employees become relaxed in
The simplest way to mitigate the expiration of the 2012 server would be to create an
operating system migration schedule for it and implement this within a year from the end-of-life
4
date. Adequate funding should also be set aside for purchasing the new operating system. This
would ensure that the server is migrated to the most current operating system and that plenty of
time is provided to mitigate any adverse issues. It would also offer plenty of time to test out the
new operating system on a test machine to ensure no negative impacts on the environment from
Some sort of employee training program must be implemented. This can come from daily
security tip emails, required compliance training, or educational videos. NINJIO is one
training to organizations and their employees. Regardless of the method used, an option must be
determined and made routine. This will ensure that cybersecurity best practices remain fresh in
employees’ minds and provide education for new scams and attacks that are becoming more
References
Cisco Systems, Inc. (2016, November 2). End-of-Sale and End-of-Life Announcement for the
Cisco Catalyst 2960 and 3750 Series Switches Accessories. Retrieved from Cisco:
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-2960-series-
switches/eos-eol-notice-c51-738149.html
Cisco Systems, Inc. (n.d.). Cisco 2811 Integrated Services Router - Retirement Notification.
integrated-services-router.html
Cisco Systems, Inc. (n.d.). Cisco PIX 515 Firewall - Retirement Notification. Retrieved from
Cisco: https://www.cisco.com/c/en/us/obsolete/security/cisco-pix-515-firewall.html
Federal Trade Commission. (2002, May 23). PART 314 - STANDARDS FOR SAFEGUARDING
https://www.ecfr.gov/current/title-16/chapter-I/subchapter-C/part-314#p-314.4(c)(1)
Horowitz, M. (2017, May 14). Patching Windows XP against WannaCry ransomware. Retrieved
windows-xp-against-wannacry-ransomware.html
https://docs.microsoft.com/en-us/lifecycle/products/windows-xp
Microsoft, Inc. (2022, February 7). Extended Security Updates for Windows Server Overview.
started/extended-security-updates-overview
6
Microsoft, Inc. (n.d.). Windows 7 support ended on January 14, 2020. Retrieved from Microsoft
Support: https://support.microsoft.com/en-us/windows/windows-7-support-ended-on-
january-14-2020-b75d4580-2cc7-895a-2c9c-1466d9a53962
Microsoft, Inc. (n.d.). Windows Server 2012. Retrieved from Microsoft Learn:
https://learn.microsoft.com/en-us/lifecycle/products/windows-server-2012