Secure Enterprise Network Architecture

Part of the CompTIA Security+ SY0-701 Study Guide

🔌 Secure Network Designs

Designing a secure network architecture begins with understanding the roles and functions of core devices:

Design with redundancy, separation of services, and secure administrative access in mind. Use layered defenses and avoid single points of failure.

🧱 Network Segmentation and Topology

Segmenting a network limits the spread of threats and isolates sensitive systems. Techniques include:

Monitor both north-south (in/out of network) and east-west (internal lateral) traffic for full visibility.

📍 Device Placement & Traffic Control

Placing devices correctly is critical to maintaining secure, efficient traffic flow:

🛜 Secure Routing and Switching

Securing routing protocols prevents attackers from manipulating network paths:

Switches should use port security, disable unused ports, and implement VLANs with ACLs.

🔐 Secure Protocols

Disable legacy and insecure protocols (e.g., Telnet, FTP, HTTP) wherever possible.

🛡️ Attack Surface Reduction

Reduce potential attack vectors by removing unnecessary services, patching regularly, and applying the principle of least privilege (PoLP):

🌐 Remote Access Architecture

Remote access is essential but increases risk. Secure solutions include: