This week’s network security tip focuses on controlling access… after all firewalls either allow you to enable connectivity or block network traffic flows. Vasilis, a security engineer out of the US suggests the following to limit access in the following way…
“If you need to allow internal clients access to public DNS and NTP servers (or any other protocol that matches your environment), make sure you limit these connections to known trusted DNS and NTP hosts. Otherwise, you are likely to open up remote access to select employees who are using these benign protocols to tunnel their traffic via their own servers or public tunnel services on the Internet.”
Thanks for the tip Vasilis and as always if anyone else has tips to suggest, please send them our way and we’ll put in the queue to publish on our blog!
Receive notifications of new posts by email.