Link to home
Start Free TrialLog in
Avatar of al4629740
al4629740Flag for United States of America

asked on

Implementing Encryption on a network

So here is a broad topic, which is encryption.  When looking at the security controls of a network, it seems that encryption is a must.  My question is what things should be encrypted on a network?  Are we talking encryption on a intranet?  Email? File sharing?  What are some of the suggested practices in terms of what items need to be encrypted and HOW can that be implemented?  Does it happen at the firewall level?  Is it configured on the switch?  This is a broad question, but it will give me some direction when seeing the replies.


Thanks
ASKER CERTIFIED SOLUTION
Avatar of Dr. Klahn
Dr. Klahn

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
You asked, "My question is what things should be encrypted on a network?"

My rule is... encrypt everything... meaning, no plain text protocols running at all.

For me, any protocol connecting any local machine to any other machine (Internet or Intranet), I encrypt using a SSL/TLS cert or SSH/SFTP.
Avatar of al4629740

ASKER

David, in practical terms how do you accomplish that?  What are you using to accomplish that?
Ultimately, it is back to asking what is your security action plan and principles as encryption on network is just one of the many puzzle pieces to the organisation cyber defence plan.

The Security Action Plan covers Governance,  Policy & Standards, Stakeholder and Operational management aspects. The encryption mandate will come closely with the data classification and sensitively. These will be mandated the organisation security policy (under guidance on the principles). The Security Principle covers Security By Design (Risk measured approach), Secure By default (Configuration) and Secure Deployment. With the two clear in mind, you can better chart your strategy to focus on specific areas from application to system to network to devices handling the organisation data that need to be secured

https://www.experts-exchange.com/articles/17367/What-is-a-good-Security-Action-Plan.html
https://www.experts-exchange.com/articles/31709/Making-The-RIGHT-Security.html
Good point. I need to sit down and come up with what really needs encryption if anything.
To protect network communication:
• Ensure that local and network firewall rules are in place. If possible, check for this within the application before any sensitive data is communicated.
• Do not transmit sensitive data, files, passwords, or settings on the network without strong encryption. Sensitive information sent via network without any form of data encryption, which is vulnerable to being read by an attacker monitoring network communications.
• A major consideration is choosing the right encryption protocol for a given task.
• Understand methods of encryption, such as IPsec, SSL/TLS, SFTP, and SSH, that can secure data in storage and in transit.
Example: You can get more details at:
http://www.howtogeek.com/194740/what-is-the-difference-between-ftps-and-sftp/