06. Layering Protection Exercise
Layering Protection Exercise
Jill & Roy's Accounting - Case Study
You should be familiar with this case study from an earlier lesson. We'll be reusing it throughout this one.
Jill and Roy provide accounting services throughout their area. They employ 7 full-time workers: 4 accountants, 1 office administrator, and themselves. They also have about a dozen seasonal workers during tax season.
They use Microsoft 365 (aka Office 365) for all of their office applications (email, word processing, spreadsheets, etc.). For their accounting, they use Intuit's Quickbooks and ProConnect online versions. They have a single office with a network router to their ISP, a Linksys LGS116P Ethernet Switch and a Linksys AC1900 WiFi Router.
The full-time accountants each have a Lenovo ThinkPad T490 and the office administrator has a Lenovo desktop. All company workstation computers use Windows 10, Google Chrome for their standard web browser, and all users have administrator access on their PC. They also have one internal Windows 10 Lenovo desktop that they use as a centralized print and file server that sits in the main office area. Only Roy, Jill, and the office admin have an account on it. They recently allowed Remote Desktop Protocol (RDP) into it to allow employees to access files from home. The temporary workers use their own laptops, which are a mixture of Windows and Macs.
The office has a Bring Your Own Device (BYOD) Policy for all cell phones (a mix of Apple iPhones and Android). They have a contract with a local IT company to provide services, which includes a weekly backup of the file/print server, monthly updating of all computers, and maintenance of the network equipment.
Answer the questions below based on this case study.
Matching Layers
QUIZ QUESTION::
Match the Layer with the technology used by Jill & Roys.
ANSWER CHOICES:
Layer |
Asset |
---|---|
Application |
|
Operating System |
|
Network |
|
Mobile |
|
Human |
|
Data |
SOLUTION:
Layer |
Asset |
---|---|
Application |
|
Network |
|
Mobile |
|
Operating System |
|
Human |
|
Data |
Applying CIS Baselines
SOLUTION:
- Microsoft Office
- Microsoft Windows Desktop
- Print Devices
- Google Chrome
Reflection on layering of security
QUESTION:
Based on what you've learned so far, provide 1-2 sentences to Jill & Roy about how they are layering security and any potential recommendations. You'll build on this in future lessons.
ANSWER:
Jill & Roys have a satisfactory layering of security by using a network switch as their firewall and by using cloud services for many of their applications. Most of their critical data is stored in the Intuit cloud.
By opening their Windows 10 File Server to the Internet, they are potentially by-passing the layering and allowing direct access into their work environment.