Mr singh task3
Project Proposal: Secure and Scalable Network Upgrade for
SkyLink Financial Systems Ltd
1.0 Executive Summary
This proposal outlines a comprehensive plan to address the
critical network connectivity and cyber security issues at SkyLink Financial
Systems Ltd. The current network is unfit for purpose, suffering from
performance bottlenecks, severe security vulnerabilities, and an inability to
support planned growth. Our solution involves migrating key services to a
cloud-based Microsoft 365 platform, segmenting the network, implementing a
robust firewall, and enforcing strict security policies. This will resolve immediate
connectivity problems, mitigate insider and external threats, and create a
scalable, resilient infrastructure for future expansion. The total estimated
initial investment is £11,500 with an ongoing annual
subscription cost of £10,800.
2.0 Analysis of Network Connectivity Issues
The current network suffers from several critical issues
that impact performance and security:
- Inadequate
DHCP Scope: The DHCP scope (192.168.1.2-192.168.1.201) only
provides 200 addresses for 220+ devices, leading to IP address exhaustion
and connection failures for employees.
- Underpowered
Network Hardware: The domestic ISP router is a major bottleneck,
unable to handle the traffic of a 220-user company, causing slow network
performance and dropped connections.
- Unsecured
and Misconfigured VPN:
- The
VPN server has a maximum of 12 connections, which is insufficient for the
15 Drone Display teams, creating a connectivity lottery.
- The
use of a shared administrator account (Admin) with a weak password
(12345678) and no encryption requirement is a severe security risk.
- Table
1 shows multiple unauthorised devices (e.g., Becky’s
iPhone, Tom’s iPhone) using the Admin account to connect,
indicating credential sharing and a complete lack of access control.
- Poor
Wireless Security: The open WiFi network (192.168.2.1) with no
password provides a potential entry point for attackers to launch attacks
against the company network or compromise guest devices.
- Outdated
Server Operating System: The File and Print Server running
Windows Server 2008 is end-of-life, receiving no security updates, making
it highly vulnerable to exploitation.
- Lack
of Network Segmentation: All devices (servers, HR PCs, Display
Creation PCs) are on a single, flat network (192.168.1.0/24). This means
if one device is compromised, an attacker can move laterally to access
critical servers like the Display Information Server.
3.0 Proposed Solutions to Resolve Issues and Meet
Business Needs
Our proposal is centred on a "Zero Trust" model,
where nothing inside or outside the network is trusted without verification.
1. Migrate to Microsoft 365 Cloud Platform:
- Solution: Replace
the on-premises File/Print and VPN servers with Microsoft 365 E3 licenses.
- Justification:
- Resolves
Connectivity: Provides seamless, secure remote access via Azure
Active Directory and Conditional Access policies, eliminating the VPN
bottleneck. Users can access files and applications from any device,
anywhere.
- Addresses
Business Needs: SharePoint Online replaces the file server;
Microsoft Teams facilitates collaborative communications; OneDrive
provides personal cloud storage. This supports a growing and potentially
remote workforce.
- Enhances
Security: Includes always-up-to-date Office apps, advanced
threat protection, and data loss prevention, mitigating risks from
outdated software.
2. Implement a Professional Firewall and Network
Segmentation:
- Solution: Replace
the domestic router with a business-grade firewall (e.g., FortiGate 60F).
- Justification:
- Resolves
Connectivity: A powerful firewall can handle the traffic of 220+
users without performance issues.
- Addresses
Business Needs: We will create segmented Virtual LANs (VLANs):
- VLAN
10 - Corporate Users: For HR and general staff.
- VLAN
20 - Development & Display Creation: For the Display
Creation team.
- VLAN
30 - Servers: For the remaining on-premises servers.
- VLAN
40 - Guest WiFi: Isolated from the corporate network.
- Firewall
rules will strictly control traffic between VLANs, ensuring users only
access what they need for their role.
3. Secure Remote Access for Drone Display Teams:
- Solution: Implement
Always On VPN or leverage Microsoft Defender for Endpoint for the
corporate mobile devices used by Drone Display teams.
- Justification: This
provides a dedicated, secure, and always-on connection for authorised
corporate devices only, replacing the flawed VPN system. Access will be
conditional on device compliance (e.g., encrypted, up-to-date).
4. Infrastructure Hardening:
- Solution:
- Decommission
the Windows Server 2008 machine.
- Configure
the WAP with a separate password for a guest network.
- Implement
a formal process for assigning static IPs only to critical
infrastructure.
- Expand
the DHCP scope to 192.168.1.2-192.168.1.254.
4.0 Equipment, Software, and Cost Justification
|
Item |
Type |
Quantity |
Justification |
Cost (One-Time/Annual) |
|
Microsoft 365 E3 |
Cloud Subscription |
220 User Licenses |
Replaces on-premises
file server, VPN, and provides email, collaboration, and advanced security
features. Essential for secure remote work. |
£10,800 per year (£41.40/user/year est.) |
|
FortiGate 60F |
Hardware
(Firewall) |
1 |
Provides the
processing power for 220+ users, enforces network segmentation, and includes
advanced security services (IPS, Anti-Virus). |
£700
(one-time) |
|
New Switch |
Hardware |
1 |
A managed switch is
required to properly configure the proposed VLANs for network segmentation. |
£500 (one-time) |
|
Staff Training |
Service |
1 Program me |
Critical for
mitigating insider threats. Regular, mandatory security awareness training to
educate staff on phishing, social engineering, and secure practices. |
£500
(one-time) |
|
Total Initial
Investment |
£1,700 |
|||
|
Total Ongoing Annual Cost |
£10,800 |
Costings are estimates for budgeting purposes.
5.0 Cyber Security Issues and Mitigations
|
Cyber Security Issue |
Proposed Mitigation |
|
Insider Threat
& Weak Access Controls |
Mitigation: Implement Principle
of Least Privilege via Azure AD. Enforce Multi-Factor Authentication
(MFA) for all users. Regular access reviews will be conducted. |
|
Unauthorised Remote Access |
Mitigation: Decommission
the old VPN. Use Azure AD Conditional Access policies to
only allow remote access from compliant, corporate-owned devices (the
Drone Display team laptops). This blocks access from personal phones and
unauthorised devices. |
|
Outdated Software
& OS |
Mitigation: Migrating to Microsoft
365 ensures all Office apps and Windows 10/11 are kept automatically
updated. A formal patch management policy will be implemented for the
remaining Display Information Server. |
|
Lack of Network Segmentation |
Mitigation: The
new firewall and VLAN configuration will segment the network. If the HR VLAN
is compromised, the attacker cannot directly access the Development VLAN or
Servers. |
|
Unsecured WiFi |
Mitigation: The guest WiFi will be
placed on a separate VLAN with a password and a firewall policy that only
permits internet access, blocking all traffic to the corporate network. |
6.0 Annotated Network Topology Diagram
[Below would be a professionally drawn diagram. This is a
detailed textual description of that diagram.]
Proposed Network Topology Description:
- Internet
Connection: Terminates into the new FortiGate 60F
Firewall.
- Core
Switch: A managed switch connected to the firewall.
- Network
Segments (VLANs):
- VLAN
10 (Corporate - 192.168.10.0/24): Connects HR and general staff
PCs. Firewall rules allow internet access and access only to specific
shares on the cloud (SharePoint).
- VLAN
20 (Development - 192.168.20.0/24): Connects the Display
Creation team PCs. Firewall rules allow internet access and strictly
controlled access to the Display Information Server in the Server VLAN.
- VLAN
30 (Servers - 192.168.30.0/24): Contains the Display
Information Server (with a static IP). Highly restricted
firewall rules dictate which VLANs can communicate with it and on which
ports.
- VLAN
40 (Guest WiFi - 192.168.40.0/24): The Wireless Access Point is
connected here. A firewall rule allows guest devices to access the
internet but blocks all traffic to VLANs 10, 20, and 30.
- Cloud
Services (Microsoft 365): Depicted as a cloud symbol, showing
connections from all corporate VLANs and remote Drone Display teams via
secure, encrypted sessions.
- Remote
Access: Drone Display teams' corporate laptops connect directly
to Microsoft 365 services via a secure connection,
authenticated and authorised by Azure AD Conditional Access policies. The
old VPN server is removed from the diagram.
Comments
Post a Comment