Trend Micro Research, News and Perspectives 2024年07月06日
NCSC Says Newer Threats Need Network Defense Strategy
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

随着网络攻击手段的不断进化,传统的网络安全策略已经不再足以应对当今的网络威胁。攻击者开始绕过外围防御,直接攻击用户终端设备。因此,网络安全防御需要从传统的“信任但验证”转变为“不信任直到彻底验证”。

🤔 **防御重点转向终端设备:** 攻击者开始绕过传统的网络安全防御,直接攻击用户终端设备,例如浏览器、办公软件等。因此,网络安全防御需要重点关注终端设备的安全性,例如使用沙盒技术、移除高风险功能等。

🛡️ **加强网络安全产品设计:** 由于攻击者开始攻击网络外围产品,例如防火墙、VPN等,因此需要加强这些产品的安全设计,确保它们能够抵御最新的攻击手段。

☁️ **采用云优先的安全策略:** 云计算的普及为网络安全提供了新的机遇。采用云优先的安全策略,可以更容易地进行软件更新、实施强认证措施,并进行漏洞评估。

🚨 **积极监控和响应威胁:** 网络安全防御需要积极监控网络流量,及时发现和响应潜在的威胁。可以使用入侵检测和防御系统(IDPS)来帮助监测网络流量,并阻止潜在的恶意流量。

👨‍💻 **开发者负起安全责任:** 开发人员需要确保其开发的应用程序符合安全设计标准,并使用云托管和无服务器技术来减少潜在的攻击风险。

The adage to 'trust but verify' has morphed into a more ominous refrain for IT professionals and network administrators—'distrust until thoroughly proven.' The days when a firewall was your impenetrable bastion and an antivirus, your digital prophylaxis, are long behind us. In the present, standing resolute on the digital frontier means endless vigilance, skepticism towards unknown threats, and a relentless pursuit of security that matches the innovation of would-be attackers.However, as organizations shifted online, defenders improved perimeter security, conducted vulnerability scans, and patched systems. Attackers discovered that targeting user devices directly granted instant access to files and resources.Consequently, many attackers bypassed the perimeter and focused on exploiting client software and phishing emails. Browsers and other endpoint software were vulnerable. It was assumed that Office Macros were present in most targets.According to the UK's National Cyber Security Centre (NCSC), this resulted in many compromises.In recent years, security advancements have made it harder for attackers to compromise endpoints via phishing. Software vendors now use defense-in-depth strategies, removing risky features and using sandboxes.Changes in Microsoft's macro settings have also deterred traditional phishing. Attackers now target vulnerabilities in network perimeter products like firewalls and VPNs, which lack sufficient security measures. By exploiting known vulnerabilities, attackers find it easier to breach these products than popular client software.Sadly, attackers continue to exploit vulnerabilities in internet-reachable products to infiltrate networks. But the UK government recommends network defenders take several actions, such as:Demand security evidence: Insist on proof of secure product design from vendors. It's a crucial part of procurement and network perimeter product assessment.Avoid unverified products: Don't allow products onto the network perimeter without proof of secure design. Consider using cloud-hosted products (SaaS) for easier maintenance, but ensure vendors show evidence of secure design.Reduce risk in self-hosted solutions: For self-hosted services that are not ready for SaaS migration, lower risks can be achieved by turning off unnecessary interfaces or services in internet-facing software.Ensure developer accountability: Make sure in-house services meet secure design standards. Use cloud hosting and serverless tech to minimize potential damage from compromises.The NCSC has also recommended having a cloud-first approach to security, emphasizing monitoring and quickly responding to potential threats. This includes regularly updating software, implementing strong authentication measures, and conducting regular vulnerability assessments.Additionally, network defenders can implement intrusion detection and prevention systems (IDPS) to monitor network traffic for suspicious activity. IDPS can also block potentially harmful traffic in real time, helping to prevent a breach before it occurs.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

网络安全 终端设备安全 云安全 入侵检测 安全设计
相关文章