Securing your infrastructure is a huge part of your overall cybersecurity strategy and it directly contributes to your current security posture. So what exactly does infrastructure security include? Let's take a look.
Infrastructure security is all about securing your organization's infrastructure. That infrastructure certainly can include permanent assets like real estate, but "infrastructure security" is most commonly used to refer to technology assets, including:
The concept of infrastructure security includes not only protection from a traditional cyberattack, but also protection from natural disasters and other calamities. It concerns the topic of resilience, which considers how an enterprise recovers from an attack or other disruption. The ultimate goal of infrastructure security is to:
Fundamentally, infrastructure security describes a high-level way of thinking about the protection of the entirety of the organization’s technology perimeter. More tactical security plans — how will we protect the data on our workers’ laptops — may be developed as subsets beneath that overarching strategy.
In this blog post, we will discuss the various components of infrastructure and infrastructure security, the most common threats and ways to protect against them.
There is no universal definition of the various levels or categories of infrastructure security, but in the enterprise, one common way to look at security includes securing the following four levels:
(If these sound familiar, it's because they related directly to the OSI networking model.)
Infrastructure security, which includes critical infrastructure security, is critical both for preventing damage to technology assets and data due to attack or disaster. It’s also necessary for minimizing the amount of damage in the event of a successful attack or if a disaster occurs. Similarly, the primary goal of infrastructure security is to lower the overall risk level that the organization faces, which in turn minimizes the chance of a significant operational disruption and/or financial impact to the business. Risk management includes cybersecurity risk, financial risk and even third-party risk management.
Today’s enterprise has IT infrastructure that is far more complex than ever before, which typically includes:
Many of these devices were never designed with security in mind or have had a patchwork of security fixes applied to them after the fact. Ultimately, the duty to secure all of these systems falls on the managing organization.
Infrastructure stands at the core of every business’s technology operations, and as such, infrastructure security is the lynchpin of their overall security strategy. It is perhaps easiest to think of infrastructure security as the master security plan for the organization, underpinning tactical strategies and everything else that is developed around it.
In most enterprises, network-level infrastructure security consumes the bulk of resources in an infrastructure security program. The network level is generally considered the largest and most vulnerable of the enterprise when it comes to security risk. Helpfully, an abundance of tools are available to protect the network level.
Network infrastructure is complex: networks normally comprise a vast number of hardware and software components. These include physical devices such as routers, switches, servers, wireless access points and even cabling. Vulnerabilities, however, are primarily attributed to the software and firmware that operate the network infrastructure, including server operating systems, network management, network communications systems, firewalls and other security application configurations, and routing software.
It is in the network infrastructure where the enterprise must maintain the highest level of diligence. Administrators must apply patches when they are released, double-check configurations to ensure they are correct, and develop and adhere to policies to ensure the network is kept as secure as possible.
The function of network infrastructure security is to mitigate all of the above issues. Network infrastructure security is designed to monitor hardware and software, to protect the network infrastructure against malicious attacks, to enforce access control rules and to ensure that only authorized users are able to use network resources, to detect and remove malware, and to provide secure channels — such as a virtual private network (VPN) — for remote users.
Cloud infrastructure security, as the name implies, involves the protection of assets based in the cloud. Rather than existing as one of the distinct levels of infrastructure security outlined above, cloud infrastructure security spans a multitude of security levels, including the network, application and data levels. Only the physical security level, by definition, is exempted.
Cloud infrastructure security can be complex because many organizations fail to properly understand where the provider’s responsibility ends and their own responsibility begins. In general, many cloud providers are responsible for security “of” the cloud, meaning that they must ensure cloud infrastructure — which incorporates security of storage, compute and network layers — is inherently secure and reliable. Cloud providers outline these responsibilities in great detail in their terms of service, yet these environments are often so nebulous that confusion about who is responsible for what often persists — especially if an attack is detected.
While responsibilities vary from one provider to another, in general, the customer is always responsible for a number of cloud security tasks, including user management and access control, data encryption in the cloud, proper configuration of vendor-provided security tools, and adherence to relevant privacy laws. This is known as the shared responsibility model.
With the cloud everywhere, cloud security is of critical importance — largely due to the rise in attacks against cloud infrastructure. But securing cloud infrastructure is difficult for many reasons:
OK, now that we know what infrastructure security is, what exactly is the threat to your infrastructure? Some of the most common infrastructure threats in the market today include:
Phishing remains one of the most pervasive and damaging threats to individuals and enterprises alike, growing in both quantity and complexity while no longer easy to detect. The goal of phishing attacks, however, remains the same: to separate users from their login credentials, which attackers then use to:
Phishing attacks skyrocketed throughout the pandemic, ranging from COVID-19 relief scams and impersonating the CDC, to the lure of small business loans and tax extensions.
This type of attack involves the threat actor installing malware on the corporate network, which then encrypts targeted data. The threat actor thenholds that data for ransom, waiting for you, the victim, to pay up. If the ransom is not paid, attackers will prevent the victim from accessing their files. Even if the ransom is paid, there is no guarantee that system functionality will be restored.
Ransomware attacks are becoming more common and widespread: in June 2021 a ransomware attack crippled the networks of hundreds of businesses by targeting a software supplier and using it as a conduit to spread through cloud-service providers.
Botnets have historically been used to launch distributed denial of service (DDoS) attacks. In more recent years, botnets have been used for surreptitiously mining cryptocurrencies and targeting IoT infrastructure. Enterprises that have fallen victim to this type of attack are often unaware that their resources are being exploited, sometimes for years. Cloud-based resources are particularly vulnerable to botnet attacks.
(Not all bots are bad! Learn about the different types of bots.)
It doesn’t matter how secure your infrastructure is from cyber threats if it is not effectively protected by physical barriers such as locked doors, fences, alarm systems and security guards. To that end, a stolen laptop belonging to a medical facility exposed and potentially compromised the personal information and health data of 650,000 patients.
Naturally, the biggest benefit of infrastructure security is simply that it protects all of your business’s technology assets from attack. For most enterprises, infrastructure security is the first line of defense against cyberattacks or other types of exploits.
Of course, there are numerous benefits to the enterprise. With proper infrastructure security, you will:
Most malware doesn’t end up on the corporate network because an internal user intentionally put it there (although insider attacks like these do happen). More often, this happens because a user unthinkingly clicks on an email attachment or a malicious link. Infrastructure security systems and protocols help to mitigate risk when these mistakes inevitably occur.
IT security solutions are the key tools used to protect infrastructure. It is not a question of whether you can protect your infrastructure with cybersecurity solutions --- it's a question of how you best protect your infrastructure with them. Cybersecurity solutions can be used to:
Put together, all of these solutions provide the building blocks of a strong infrastructure protection program.
On a national scale, infrastructure security takes on a whole new dimension that is far more complex than at the enterprise level.
National infrastructure, which is often referred to as critical infrastructure, includes both physical and electronic systems, networks, data and digital assets that underpin society. National infrastructure also includes the internet itself, roadways and railways, pipelines and power plants, bridges and tunnels, drinking water systems, and a variety of physical structures. Even non-terrestrial systems, such as GPS satellites, are included.
In the U.S., critical infrastructure security falls under the purview of the Department of Homeland Security. In 2013, government officials developed a broad strategy dubbed the National Infrastructure Protection Plan (NIPP) to secure these sectors. The plan’s stated goals include:
The security of national technology assets is just one of the critical infrastructure sectors that the NIPP is designed to protect. The Cybersecurity and Infrastructure Security Convergence Action Guide outlines a converged plan to protect both cyber and physical assets, connecting internet security to the physical protection of healthcare, transportation, energy and industrial control systems. In the wake of incidents such as the May 2021 Colonial Pipeline ransomware attack, which shut down 45% of the petroleum supply to the East Coast, it is easy to see why this type of physical cybersecurity is increasingly critical.
(Know what the SEC's new cybersecurity rules mean for infrastructure security.)
There are a number of recommended best practices that should be incorporated into an organization's security policies that protect infrastructure, including:
Pay attention to password security. All logins must be protected by strong passwords (i.e. long passwords that use a hard-to-remember combination of uppercase and lowercase letters, numbers and symbols, passwords that don’t spell a word, etc..) as well as two-factor authentication when possible.
Audit user permissions frequently. To avoid unauthorized access, remove permissions to services when users no longer need them as well as immediately when they leave the organization.
Apply patches regularly. Patches should generally be installed the day they are released, particularly if they include a security fix.
Ensure internet-based assets use secure protocols like Secure Shell (SSH) and Secure Socket Layer (SSL). These protocols provide a secure channel for communication, even over an insecure network.
Remove unused services and software. These idle but active systems can create an unnecessary security risk. This is part of the process known as network hardening.
Properly configure firewalls. A misconfigured firewall is just as dangerous as having no firewall at all.
Make sure code adheres to secure development practices. Shift left and DevSecOps approaches can be useful in instilling a security-focused mindset within the development team.
Encrypt wherever possible. Encrypted files are largely useless to attackers who successfully enter the system but don’t hold the keys.
Regularly backup all systems. Offsite backups are the best defense against ransomware attacks.
Stress-test systems regularly. Run security scans and penetration tests to hunt down vulnerabilities.
To protect your infrastructure data, consider implementing these types of tools and security controls to protect the business’s infrastructure, including:
Attackers have long targeted infrastructure because it represents a potential gold mine for their efforts. Unfortunately, because of its expansive size and complexity, it also presents a challenge for security operations teams to secure.
With the rise of IoT devices and the proliferation of cloud services, the typical enterprise now finds itself with a daunting attack surface that is increasingly vulnerable to both organized attackers and the threat of natural disaster. Only through careful infrastructure protection can you truly mitigate threats and keep your infrastructure environment — and data — safe from attack.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.