Lab 18: Network Security Architecture Review

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Review network security architecture for segmentation gaps

  • Analyse east-west vs north-south traffic flows

  • Audit firewall rulesets for shadow and redundant rules

  • Build a Python firewall rule conflict detector


Step 1: Network Security Architecture Layers

Internet

    ▼ north-south traffic (external → internal)
┌─────────────────────────────────────────────┐
│  Perimeter Layer                             │
│  DDoS Protection → WAF → Firewall → DMZ     │
└──────────────────┬──────────────────────────┘

┌──────────────────▼──────────────────────────┐
│  Core Network                                │
│  ┌───────────┐  ┌───────────┐  ┌─────────┐ │
│  │  Internet │  │  Corp     │  │   DMZ   │ │
│  │  Edge     │  │  Network  │  │         │ │
│  └───────────┘  └─────┬─────┘  └─────────┘ │
│                       │                     │
│             east-west (internal)            │
│   ┌──────────────────────────────────────┐  │
│   │  Microsegmentation                   │  │
│   │ Finance│HR│Dev│PCI Zone│Server Zone  │  │
│   └──────────────────────────────────────┘  │
└─────────────────────────────────────────────┘

North-South vs East-West:

Direction
Description
Security Challenge

North-South

Internet ↔ Internal

Traditional perimeter defence

East-West

Internal ↔ Internal

Lateral movement; often uninspected

💡 Modern attacks primarily use east-west movement after initial compromise. Most breaches involve minimal north-south traffic after initial access. East-west traffic must be inspected and segmented.


Step 2: Firewall Rule Conflict Detector

📸 Verified Output:


Step 3: Traffic Flow Analysis Methodology

Traffic flow review process:

  1. Discover — collect network diagrams, firewall configs, flow logs

  2. Map — identify all traffic flows (source, destination, port, protocol)

  3. Categorise — north-south (external), east-west (internal), management

  4. Analyse — identify unexpected flows, overly permissive rules

  5. Remediate — tighten rules, implement segmentation, remove unused rules

Flow analysis data sources:

Source
Data Provided

Firewall logs

Allow/deny decisions, rule hit counts

NetFlow/IPFIX

Traffic volumes, connection counts

VPC Flow Logs

Cloud network traffic

Zeek/Suricata

Deep packet inspection, protocol analysis

SIEM

Correlation of flow data with alerts


Step 4: Network Segmentation Design

Segmentation models:

VLAN-based segmentation:

Firewall zone design:

💡 The management zone is critical — all out-of-band management (iDRAC, ILO, IPMI, bastion) should be isolated in a dedicated network segment. Compromising the management plane gives attackers access to all systems.


Step 5: Firewall Ruleset Audit

Audit checklist:

1. Default deny:

2. Overly permissive rules:

3. Rule hygiene:

4. High-risk rules to review:


Step 6: DMZ Architecture

Screened subnet (three-legged DMZ):

DMZ security principles:

  • DMZ servers should NOT be able to initiate connections to internal

  • DMZ → Internal: only specific, required ports (DB port, LDAP for auth)

  • Internal → DMZ: limited (admin access only via jump host)

  • Internet → DMZ: WAF inspects all HTTP/HTTPS

  • No direct Internet → Internal (not in DMZ)


Step 7: Zero Trust Network Segmentation

Moving from perimeter to ZTA network:


Step 8: Capstone — Network Architecture Review

Scenario: Review network security for a 10,000-user enterprise, post-breach assessment


Summary

Concept
Key Points

North-South

Internet ↔ internal; traditional perimeter

East-West

Internal ↔ internal; lateral movement risk

Shadow rules

Earlier broader rule prevents later rule from matching

Redundant rules

Duplicate rules; clean up to reduce complexity

DMZ

Screened subnet; public servers isolated from internal

Segmentation

VLAN → SDN → microsegmentation (ZTA)

Audit cycle

Quarterly firewall rule review; disable unused rules

Last updated