Conclusions
It is possible, using the most up to date tools that are available, to protect against virtually every type of threat that is currently known about. Unfortunately, new threats and security holes in some software package or another are being discovered on a daily basis.
It is important in any environment to know what types of threats you might be facing. Be aware of any potential security holes in your system, and take care to prevent attacks against these. For example, a web server that is connected to the internet and placed behind a firewall may be reasonably secure against most packet based attacks, but a CGI program on the server might expose a vulnerability. Pay special attention to ensuring that CGI programs correctly bounds check all arrays and validates input data before processing. An intrusion detection program between the firewall and the web server could be configured to throw out any accesses that are suspicious.
Click on image for larger view
Which Tools?
We have discussed a number of different types of tools in this technology overview, all with different functions. To keep your environments as secure as possible, it is important to choose tools from across the range of functions. Each of the tools forms an extra layer of protection in case the others are defeated. So, your first layer of protection should be a firewall. Behind that, a network based intrusion detection system will catch any breaches of the firewall. Behind that again, a set of tools that monitor connection attempts, which will form an extra layer of protection. Finally, if all else fails, tools to catch an actual break-in form the final layer of defense.
Please call 0870 421 4023 to find out how developing an intrusion detection strategy will benefit your company, or e-mail sales@whitehelm.com requesting more information.