https://www.techtarget.com/searchsecurity/tip/How-security-compliance-standards-prevent-OSI-layer-vulnerabilities
The Open Systems Interconnection -- or OSI model layers -- explains the process of endpoint communication via networking, and it is divided into seven different layers based on their functionality.
Every layer in the OSI model architecture relies on the layer above and on the layer below. If the lower layer does not function correctly, the next layer will fail to be properly executed and the entire process will be stopped.
The data is sent upward from the first layer of the source computer across the network and then flows downward through the layers within the receiving computer.
The OSI model was originally established to standardize the governance and compliance of transmission data packets and was adopted by the International Organization of Standardization (ISO) as a common reference. It is of particular importance for cybersecurity personnel to understand the OSI model, because hackers can easily pivot from layer to layer when exploiting computing system vulnerabilities such as distributed denial-of-service (DDoS) attacks that almost always target OSI layer vulnerabilities.
To establish the best network cybersecurity, organizations should focus on creating an OSI security and compliance framework for each of the seven layers of the OSI model, addressing vulnerabilities by layer and developing strategies to offset these risks.
This is the bottom layer of the OSI model. Its focus is the transmission and reception of the unstructured raw bit stream over a physical medium. The physical layer covers a variety of devices and mediums, among them are cabling, connectors, receivers, transceivers and repeaters.
OSI layer vulnerabilities:
OSI security and compliance strategies
Practice defense-in-depth tactics, incorporate access controls, accountability and auditing to track and control physical assets. Arrange cables to not allow eavesdropping and restrict access to the telecommunications room to protect sensitive equipment. Additionally, shut down open wall ports and use a managed power UPS.
This is a protocol layer that transfers the data frame in between nodes of the physical layer. Its responsibility is to conduct an error-free transfer, which allows the layer above it to assume they are error-free. The layer comprises two sub-layers: The logical link control layer and the media access control (MAC) layer.
OSI layer vulnerabilities:
OSI security and compliance strategies
Advance switches can be configured to limit the number of MAC addresses, which can be learned on ports connected to end stations. Use private VLANS and static Address Resolution Protocol entries.
This layer handles the routing of data and is also responsible for switching information from one network to another. This layer specifies the right destination for all transmission data at the packet level. IP is the most common example of a network layer operating on the internet.
OSI layer vulnerabilities:
OSI security and compliance strategies
Prevention of attacks is done by rate-limiting ICMP traffic and correctly configuring ACLs, or Access Control Lists. This allows or refuses connections with equipment belonging to other networks. Implementing IPsec: the suite of protocols responsible for providing security features land activating firewalls on this layer.
Check out part two of this tip to learn compliance strategies to prevent vulnerabilities in OSI Layers 4 through 7.
24 Oct 2018