Files
gh-phaezer-claude-mkt-plugi…/commands/review-network-security.md
2025-11-30 08:47:18 +08:00

13 KiB

description, argument-hint
description argument-hint
Review network security based on NIST standards Optional network architecture or config files

You are initiating a comprehensive network security review using a structured workflow based on NIST (National Institute of Standards and Technology) standards and industry security best practices.

Workflow Steps

1. Gather Security Review Requirements

If the user provides specific information, use that directly. Otherwise, ask the user for:

Network Information:

  • Network architecture diagrams or descriptions
  • Configuration files (FRR, interfaces, netplan, SONiC, firewall configs)
  • Network topology (data center, campus, branch, cloud, hybrid)
  • Critical assets and data flows

Environment Context:

  • Criticality level (mission-critical, business-critical, standard)
  • Exposure (internet-facing, internal, DMZ, management)
  • Industry and compliance requirements (PCI-DSS, HIPAA, SOC 2, FEDRAMP)
  • Specific NIST frameworks to align with

Security Concerns:

  • Known vulnerabilities or weaknesses
  • Recent security incidents
  • Specific threats or attack vectors of concern
  • Third-party security audit findings

Scope:

  • Full infrastructure review or specific components
  • Focus areas (access control, encryption, routing, etc.)
  • Depth of review (high-level vs deep technical)

2. Launch network-security-reviewer Agent

Use the Task tool to launch the network-security-reviewer agent with a comprehensive prompt:

Perform a comprehensive NIST-based security review of the following network:

Network Type: [data center/campus/branch/etc.]
Criticality: [mission-critical/business-critical/standard]
Exposure: [internet-facing/internal/DMZ]
Compliance Requirements: [PCI-DSS/HIPAA/SOC 2/NIST CSF/etc.]

Network Architecture and Configurations:
[Provide diagrams, descriptions, and configuration files]

Specific Concerns (if any):
[User-specified security concerns]

Please perform a comprehensive security review based on NIST standards covering:

1. Network Segmentation and Isolation (NIST SP 800-41, 800-125B)
   - Trust zone separation
   - DMZ implementation
   - VLAN/VRF isolation
   - Micro-segmentation for critical assets
   - East-west traffic control

2. Access Control and Authentication (NIST SP 800-53 AC Family)
   - Management access security
   - Authentication mechanisms (MFA, SSH keys, TACACS+)
   - Authorization and privilege escalation
   - Session management
   - Role-based access control

3. Encryption and Data Protection (NIST SP 800-52, 800-77, 800-113)
   - Management protocol encryption (SSH vs Telnet)
   - Routing protocol security
   - VPN configuration and cipher suites
   - SNMP security (SNMPv3)
   - WiFi security (WPA3/WPA2 Enterprise)

4. Routing Security (Industry Best Practices + NIST)
   - BGP security (authentication, filtering, RPKI)
   - OSPF/IS-IS authentication
   - Route filtering and validation
   - Prevention of route hijacking
   - Bogon filtering

5. Denial of Service Protection (NIST Principles)
   - Rate limiting and CoPP
   - SYN flood protection
   - ICMP rate limiting
   - Broadcast storm control
   - Resource limits

6. Logging, Monitoring, and Auditing (NIST SP 800-53 AU Family)
   - Centralized logging
   - Log integrity
   - NTP synchronization
   - SNMP monitoring security
   - NetFlow/sFlow analysis
   - Retention policies

7. Interface and Service Security (Attack Surface Reduction)
   - Unused interfaces shutdown
   - Unnecessary services disabled
   - Port security
   - DHCP snooping
   - Dynamic ARP Inspection

8. Management Plane Security (NIST Principles)
   - Out-of-band management
   - Management network isolation
   - Encrypted protocols only
   - Jump host/bastion architecture
   - Console security

9. Firmware and Configuration Management (NIST SP 800-53 CM Family)
   - Patch management
   - Configuration baselines
   - Change control
   - Vulnerability scanning
   - CIS benchmark compliance

10. NIST Compliance Mapping (CSF or SP 800-53)
    - Map controls to NIST framework
    - Identify compliance gaps
    - Document deviations
    - Provide remediation roadmap

Provide output in the following format:
- Executive summary with overall risk assessment
- Critical/High/Medium/Low findings with NIST references
- Compliance matrix
- Remediation roadmap with priorities
- Validation commands

3. Analyze Security Review Output

When the agent returns the review, organize by:

  • Critical Findings: Immediate security risks requiring urgent action
  • High Findings: Significant vulnerabilities to fix soon
  • Medium Findings: Security improvements needed
  • Low Findings: Best practice enhancements

4. Create Security Assessment Report

Structure the security findings in a comprehensive report:

Executive Summary:

  • Overall Security Posture (Critical Risk / High Risk / Medium Risk / Low Risk)
  • Number of findings by severity
  • Top 5 critical security gaps
  • NIST compliance status
  • Key recommendations

Risk Assessment Matrix:

| Finding | Severity | NIST Control | Likelihood | Impact | Risk Score |
|---------|----------|--------------|------------|--------|------------|
| ...     | Critical | AC-2         | High       | High   | 9/10       |

Detailed Findings: For each security issue:

[SEVERITY] Category: Finding Title

NIST Reference: SP 800-53 XX-Y / CSF Category

Location: <device/config section>

Vulnerability:
<Description of the security issue>

Risk:
<Potential impact and exploitation scenario>

Evidence:
<Configuration excerpt or observation>

Attack Vector:
<How this could be exploited>

Recommendation:
<Specific remediation steps with examples>

NIST Compliance:
<How remediation addresses NIST requirements>

Priority: [Immediate/30 days/90 days]

5. Map to NIST Cybersecurity Framework

Create CSF compliance matrix:

Identify (ID):

  • Asset Management (ID.AM)
  • Risk Assessment (ID.RA)
  • Findings and gaps

Protect (PR):

  • Access Control (PR.AC)
  • Data Security (PR.DS)
  • Findings and gaps

Detect (DE):

  • Anomalies and Events (DE.AE)
  • Continuous Monitoring (DE.CM)
  • Findings and gaps

Respond (RS):

  • Response Planning (RS.RP)
  • Communications (RS.CO)
  • Findings and gaps

Recover (RC):

  • Recovery Planning (RC.RP)
  • Improvements (RC.IM)
  • Findings and gaps

6. Create Remediation Roadmap

Provide prioritized remediation plan:

Phase 1: Immediate (0-30 days) - Critical Vulnerabilities

  1. Finding: Unencrypted management protocols

    • Action: Disable Telnet/HTTP, enable SSH/HTTPS only
    • Owner: Network Security Team
    • Effort: 2 days
    • NIST: SC-8, SC-13
  2. Finding: No BGP authentication

    • Action: Implement MD5 authentication on all BGP sessions
    • Owner: Network Engineering
    • Effort: 1 week
    • NIST: SC-8

Phase 2: Short-term (1-3 months) - High Priority [Continue with high priority items]

Phase 3: Medium-term (3-6 months) - Medium Priority [Continue with medium priority items]

Phase 4: Long-term (6-12 months) - Enhancements [Continue with improvements]

7. Provide Validation Commands

Include commands to verify security controls:

Authentication and Access Control:

# Verify SSH only (no Telnet)
show line vty 0 4 | include "transport input"
netstat -tuln | grep :23  # Should show no Telnet listener

# Check AAA configuration
show running-config | section aaa
show tacacs
show radius

# Verify session timeouts
show line vty 0 4 | include "exec-timeout"

Encryption Verification:

# Check routing protocol authentication
show running-config | section "router bgp"
show ip ospf interface | include "authentication"

# Verify VPN encryption
show crypto ipsec sa
show crypto isakmp sa

# Check SNMPv3
show snmp user
show running-config | include "snmp-server"

Network Segmentation:

# Verify VLAN configuration
show vlan brief
show vlan id 100

# Check ACLs
show ip access-lists
show running-config | include "access-list"

# Verify firewall rules (if applicable)
iptables -L -n -v
nft list ruleset

Logging and Monitoring:

# Check syslog configuration
show logging
show running-config | include logging

# Verify NTP
show ntp status
show ntp associations

# Check SNMP (should be v3 only)
show snmp community  # Should be empty or not exist
show snmp user

Routing Security:

# BGP prefix filtering
show ip bgp neighbors <peer> | include "prefix-list"
show ip prefix-list

# Route authentication
show ip bgp neighbors <peer> | include password
show ip ospf interface | include auth

# Check for bogon filtering
show ip access-lists | include "deny.*10\.0\.0\.0"

8. Document Compliance Mapping

Create NIST SP 800-53 compliance matrix:

Control Family Control Status Evidence Gaps Remediation
AC (Access Control) AC-2 Account Management Partial TACACS+ configured No MFA Implement MFA
AC-3 Access Enforcement Non-Compliant None No ACLs Implement ACLs
SC (System Communications) SC-8 Transmission Confidentiality Compliant SSH only - -
SC-13 Cryptographic Protection Partial Strong ciphers Weak BGP auth Update to BGP-TCP-AO
AU (Audit and Accountability) AU-2 Audit Events Compliant Syslog configured - -
AU-6 Audit Review Partial Logs collected No analysis Implement SIEM

Common Security Vulnerabilities

Critical Security Issues

Unencrypted Management Protocols:

Vulnerability: Telnet, HTTP, SNMPv1/v2c in use
Risk: Credential theft, man-in-the-middle attacks
NIST: SC-8, SC-13
Fix: Use SSH, HTTPS, SNMPv3 exclusively

Default or Weak Passwords:

Vulnerability: Default credentials or weak passwords
Risk: Unauthorized access, privilege escalation
NIST: IA-5
Fix: Strong password policy, key-based authentication

No Routing Protocol Authentication:

Vulnerability: BGP/OSPF without authentication
Risk: Route hijacking, traffic interception
NIST: SC-8
Fix: Implement MD5 or stronger authentication

No Network Segmentation:

Vulnerability: Flat network design
Risk: Lateral movement, widespread compromise
NIST: SC-7
Fix: Implement VLANs, firewalls, ACLs

High-Risk Security Issues

Missing Logging and Monitoring:

Vulnerability: Inadequate logging
Risk: Inability to detect/respond to incidents
NIST: AU-2, AU-6, SI-4
Fix: Centralized syslog, SNMP, NetFlow

No Rate Limiting or DoS Protection:

Vulnerability: No control plane protection
Risk: Denial of service attacks
NIST: SC-5
Fix: Implement CoPP, rate limiting

Weak BGP Security:

Vulnerability: No prefix filtering, no ROV
Risk: Route leaks, prefix hijacking
NIST: Best practices
Fix: Prefix lists, RPKI validation

Security Best Practices

Defense in Depth

Layer 1: Physical Security

  • Console port security
  • Secure rack access
  • Environmental controls

Layer 2: Network Segmentation

  • VLANs and VRFs
  • Firewalls between zones
  • DMZ for public services
  • Micro-segmentation

Layer 3: Access Control

  • Strong authentication (MFA)
  • Least privilege access
  • Role-based access control
  • Regular access reviews

Layer 4: Encryption

  • Management traffic encryption
  • VPN for remote access
  • Routing protocol authentication
  • SNMPv3 only

Layer 5: Monitoring and Detection

  • Centralized logging
  • Anomaly detection
  • Traffic analysis
  • Security event correlation

Layer 6: Incident Response

  • Response procedures
  • Escalation paths
  • Forensics capability
  • Recovery procedures

Security Hardening Checklist

  • Disable Telnet, enable SSH only
  • Disable HTTP, enable HTTPS only
  • Use SNMPv3 with encryption
  • Configure routing protocol authentication
  • Implement BGP prefix filtering
  • Configure control plane protection
  • Enable logging to central server
  • Configure NTP for time sync
  • Shutdown unused interfaces
  • Disable unnecessary services
  • Implement AAA (TACACS+/RADIUS)
  • Configure session timeouts
  • Use strong passwords or keys
  • Implement network segmentation
  • Configure ACLs for traffic control
  • Enable port security on switches
  • Configure DHCP snooping
  • Enable Dynamic ARP Inspection
  • Implement management VLAN/VRF
  • Regular firmware updates

Notes

  • Security is a continuous process, not a one-time check
  • Risk tolerance varies by organization - work with security team
  • Balance security with operational requirements
  • Document all security decisions and accepted risks
  • Revalidate security after any network changes
  • Keep up with evolving threats and NIST updates
  • Test security controls regularly

Example Task Invocation

review-network-security Please review security of our data center network with 10 leaf-spine switches running BGP. We're preparing for SOC 2 audit and need NIST SP 800-53 compliance assessment. Main concerns are BGP security and encryption of management protocols. Configuration files attached.