{"id":2535,"date":"2020-07-28T09:05:57","date_gmt":"2020-07-28T13:05:57","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2535"},"modified":"2020-07-28T09:05:57","modified_gmt":"2020-07-28T13:05:57","slug":"security-for-all-sizes-whats-on-my-network","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2535","title":{"rendered":"Security for All Sizes: What&#8217;s on My Network?"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/peerlyst\/image\/upload\/c_limit,dpr_2.0,f_auto,fl_lossy,h_225,q_auto,w_400\/v1\/post-attachments\/beeker-what-is-this-i-dont-even_qalism\" alt=\"\"\/><\/figure>\n\n\n\n<p>There is so much more to security than:<\/p>\n\n\n\n<p>1. Find the hackers.<\/p>\n\n\n\n<p>2. Shut them down.<\/p>\n\n\n\n<p>First of all, we need to know what, exactly, is on the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/network\">network<\/a>&nbsp;and what it does and whether or not it should be doing that function while connected without restriction to the rest of the network.<\/p>\n\n\n\n<p>But before we tackle the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/question\">question<\/a>&nbsp;of what should be on the network, we need to go about discovering what is on the network, and this can be a journey full of surprises.<\/p>\n\n\n\n<p>Typically, the start of this&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/investigation\">investigation<\/a>&nbsp;will involve someone saying that everything that is connected to the network are phones, PCs,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/access-points\">access points<\/a>, and the printers. Oh, and also the badge readers. And the security cameras. But that&#8217;s it. Besides the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/barcode\">barcode<\/a>&nbsp;readers. That&#8217;s all, though. Hang on, we also have some&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/digital\">digital<\/a>&nbsp;signage&#8230;<\/p>\n\n\n\n<p>At this point, you may now take what anyone has to say about what&#8217;s on the network with a grain of salt. It&#8217;s time to answer this question for yourself.<\/p>\n\n\n\n<p>In a small company, you may be able to&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/track\">track<\/a>&nbsp;down all the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/devices\">devices<\/a>&nbsp;by hand during an off hour or two. It&#8217;s a great exercise and will prove invaluable for doing troubleshooting.<\/p>\n\n\n\n<p>In a medium-sized company, this cannot be done alone. You&#8217;ll need a few other people to help out. That, or you&#8217;ll just do it all over a much longer period of time&#8230; however it&#8217;s done, you&#8217;ll likely also need some form of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/automation\">automation<\/a>&nbsp;of tasks to get all that data collected in a usable way.<\/p>\n\n\n\n<p>For a large company, this cannot be done alone. You will need tools. You will need a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/project\">project<\/a>&nbsp;manager. You will also need cross-team cooperation.<\/p>\n\n\n\n<p>For all of these investigations, you will also need to talk to people that don&#8217;t usually talk to folks in IT. You will need to talk to them because they have connected things to the network, the likes of which you have never seen on a network ever before&#8230;<\/p>\n\n\n\n<p>&#8230; and watch me talk about those things without once using a catch-all phrase that describes all of them&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/peerlyst\/image\/upload\/c_limit,dpr_2.0,f_auto,fl_lossy,h_337,q_auto,w_600\/v1\/post-attachments\/say_iot_sm90ov\" alt=\"\"\/><\/figure>\n\n\n\n<p>In the small company, especially one that&#8217;s going through initial growing pains, there aren&#8217;t enough&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ethernet\">ethernet<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ports\">ports<\/a>&nbsp;in wall outlets. That means, most likely, a cascade of cheap, unmanaged&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/switches\">switches<\/a>, also known as &#8220;cockroach switches&#8221; because when you see one of them, there&#8217;s a thousand more, hiding in the dark places of the office.<\/p>\n\n\n\n<p>Because the switches are unmanaged, finding out what&#8217;s connected to them can be a chore. It can be done, but it may involve tracing cables up through holes in the ceiling and then dropping down into a room next door. You might also find the switches themselves in the ceiling space, acting as repeaters so the 100m cable from the main switch can extend into the nearby&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/office\">office<\/a>&nbsp;space that was recently leased out.<\/p>\n\n\n\n<p>In medium and large companies, even those with plenty of accessible wall ports available, people will bring in their cockroach switches and plug &#8217;em in. Why? Maybe you should ask the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/developers\">developers<\/a>&nbsp;who want to run 7 boxes in their cubicles and who don&#8217;t know they can requisition an old Cisco 3750 that&#8217;s still good, but was decommissioned last year. It could also be a boss that wants to have an extra laptop running or an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/app\">app<\/a>&nbsp;team that wants to have a concentration of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/monitoring\">monitoring<\/a>&nbsp;devices for a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/war\">war<\/a>&nbsp;room or something similar.<\/p>\n\n\n\n<p>But switches you can expect. I mentioned the unexpected, and I will now deliver on that promise.<\/p>\n\n\n\n<p>Small companies have it lucky. Once the odd things are found &#8211; be they cameras, badge readers, printers, industrial devices, barcode&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/scanners\">scanners<\/a>,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/automated\">automated<\/a>&nbsp;fryers, refrigeration units, glucometers, or environmental controls, the person doing the discovery is not far away from the person responsible for those devices. And by &#8220;not far away&#8221;, I mean that both in the sense of both physical and organizational distance. The company is still small enough to have a familial feel to it, where everyone can walk up to everyone else.<\/p>\n\n\n\n<p>Once you meet the person responsible for the unusual device, you&#8217;ll get a story behind it that&#8217;s likely to contain the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/business\">business<\/a>&nbsp;reason to have the device on the network. That, or a promise to get it off the network if it&#8217;s causing a problem.<\/p>\n\n\n\n<p>In the medium-sized company, it&#8217;s a longer walk to have that kind of chat, and maybe you also have to go through a manager in order to have permission to engage in that kind of talk. You might even have difficulty finding out who you need to talk to about the serial-to-ethernet devices, the USB-to-ethernet devices, and the parallel-to-ethernet devices.<\/p>\n\n\n\n<p>Also, you&#8217;re now more at&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/risk\">risk<\/a>&nbsp;to find ancient history still connected to your network. The small companies also tend to be *new* companies, so they tend to have new gear. Medium companies have likely been around for a while, and that means they could have devices that the company forgot about&#8230; devices that are now no longer supported by their&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vendors\">vendors<\/a>&nbsp;and which will need replacement in order to not be the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/security-threat\">security threat<\/a>&nbsp;which they now constitute.<\/p>\n\n\n\n<p>But for&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/diversity-1\">diversity<\/a>&nbsp;and legacy, nothing beats the large company. The bigger it is, the crazier the scenario can get. Time for my disclaimer &#8211; I work for a company that makes a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/product\">product<\/a>&nbsp;designed to discover devices on the network and then classify them (among other things), and I have lots of large companies for my clients. With that disclaimer out of the way, I was recently at a client where, in the space of one hour, we reviewed a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/proof-of-concept-1\">proof of concept<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/deployment\">deployment<\/a>&nbsp;and found the following things on the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/wired\">wired<\/a>&nbsp;network:<\/p>\n\n\n\n<p>1. A cockroach switch.<br>2. A Nintendo.<br>3. A&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/windows\">Windows<\/a>&nbsp;98SE PC. (Also connected through a cockroach switch, just for good measure.)<br>4. A network range used in more than one place.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.peerlyst.com\/tags\/oops\">Oops<\/a>, forget to mention that fourth thing in my previous paragraphs. But, it&#8217;s a sad fact of physics or biology or some kind of science that, as companies&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/grow\">grow<\/a>, growing with them is the chance that some self-proclaimed techie will set up a network using an address space already operational somewhere else. The worst case of this was where a site that had a large number of guest&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/wireless\">wireless<\/a>&nbsp;devices utilized the entire 10.0.0.0\/8 range for it. We found it about a month after it was created, in the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/course\">course<\/a>&nbsp;of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/tracking\">tracking<\/a>&nbsp;down intermittent and unpredictable network timeouts and connection refused errors&#8230;<\/p>\n\n\n\n<p>But I&#8217;ve seen earth movers, cows, ATMs, lightbulbs, drug pumps,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/silicon\">silicon<\/a>&nbsp;wafer fabs, vending machines, cash registers, information kiosks, ovens, refrigerators, pneumatic drills, scales, televisions, cars, personal&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/health\">health<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/monitors\">monitors<\/a>, vacuum cleaners, and baby monitors all on customer networks. It&#8217;s not just that if there&#8217;s a thing, there&#8217;s both porn of it as well as an Internet-enabled version of it. It&#8217;s that those internet-enabled things will show up on your&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/networks\">networks<\/a>&nbsp;because either they were purchased and connected by the organization, or because people who work at that organization decided to bring them in and connect them up.<\/p>\n\n\n\n<p>Some of those things are just fine, if they stay on guest networks. Some of those things are just fine, provided they are on segmented networks with limited or no access to the rest of the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/corporate-networks\">corporate networks<\/a>&nbsp;and\/or the Internet. And some of those things don&#8217;t belong anywhere on any network. The final say on which devices go where is up to the organization&#8217;s mission, values, and overall security posture.<\/p>\n\n\n\n<p>But, before you can decide what should or should not be on the network, you need to know what *is* on the network.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/peerlyst\/image\/upload\/c_limit,dpr_2.0,f_auto,fl_lossy,h_302,q_auto,w_334\/v1\/post-attachments\/no_s_in_iot_pmmqrm\" alt=\"\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>There is so much more to security than: 1. Find the hackers. 2. Shut them down. First of all, we need to know what, exactly, is on the&nbsp;network&nbsp;and what it does and whether or not it should be doing that function while connected without restriction to the rest of the network. But before we tackle [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2535","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2535"}],"version-history":[{"count":1,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2535\/revisions"}],"predecessor-version":[{"id":2536,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2535\/revisions\/2536"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}