The OSI Model's Role In Building A Secure Network Architecture

Brought to you by Renelis Mulyandari    
  
The Open Systems Interconnection (OSI) model is a framework that is commonly cited in computer networking and cybersecurity discussions. Interestingly, it was developed by the International Standards Organization (ISO).

It serves as a guide for troubleshooting network problems, as well as in understanding and implementing security measures related to network communication.

While the OSI model is not an essential factor in the operation of networking protocols nowadays, it serves as an important tool in understanding and identifying security risks. It also helps in meaningfully analyzing the capabilities of cybersecurity solutions. The OSI model and cybersecurity share a strong affinity, and this relationship is something organizations should consider exploring as they aim to build secure network architecture.

Layer-by-layer Approach To Security

Before discussing the role of the OSI model in building a secure architecture, it’s important to get acquainted with its layers. Network stacks are not as straightforward as they may seem. They are complex and involve multiple layers. The OSI model pierces into this complexity by providing an abstraction to facilitate a better understanding of the network communication process and its impact on the emergence of security risks, the troubleshooting of problems, and the dynamics of network-layer attacks.

There are seven layers under the OSI model, namely the physical, data link, network, transport, session, presentation, and application layers. These layers present the structure by which data moves regardless of the protocol used. 

As the name suggests, the physical layer is the point where the physical transmission of raw data happens over a physical medium. The data link layer is where raw data is transmitted into frames to be transmitted at the physical layer. The network layer is responsible for routing traffic to its intended destination according to the indicated IP addresses. 

Meanwhile, the transport layer, the first of the so-called host layers, is responsible for managing data transmission between nodes. The session layer, another host layer, is where sessions between nodes are managed and protocol data units (PDU) are handled. Next, the presentation layer translates data from network data into formats that are usable for the destination applications. Lastly, the application layer is where data is served to end users, including the exchange of data between a web server and a client app.

These layers enable network connections in a systematic and standardized manner. They facilitate interoperability for protocols and various network devices. Being familiar with these layers supports the formulation of comprehensive network security solutions.

When More Is Better

The seven layers of the OSI model are notably more than the four (application, transport, internet, and network access) in the TCP/IP model, an older model that approximates the flow of networking protocols. This may appear counterintuitive given the trend of simplification in cybersecurity and tighter technology stacks, but having more layers has the benefit of a better representation of all the functions involved in network communications.

The OSI model provides a more intuitive way of examining network operations, which makes it easier to resolve issues affecting network protocols. The seven layers provide a clearer way to discuss different network-level attacks. Also, it allows the security team to have a more thorough scrutiny of the security of networking protocols. 

The TCP/IP model is a practical representation of the network stack because it presents the layers in a way that is more structurally similar to the network protocols in real-world settings. In contrast, the OSI model is largely an abstraction of actual network protocols. It is a theoretical model that presents descriptions of the different tasks undertaken to enable data transmission.

How The OSI Model Fosters Security

The OSI model serves as a good basis for building a secure network infrastructure. Here’s a quick rundown of how the model influences security considerations.

Layer 1 or the physical layer is viewed as the soft underbelly of cybersecurity. This is because of the various attacks aimed at the hardware or physical devices of a network. These attacks are often overlooked because security strategies often focus on the software side. The OSI model makes it clear that ample attention should be given to defending the physical layer.

On the other hand, the processes at the data link and network layers highlight man-in-the-middle attacks (MiTM). These layers are responsible for routing, addressing, and detecting errors, which can be the subject of eavesdropping or attempts to alter the communication between two parties. As such, it is important to implement security measures such as firewalls, network segmentation, and the use of secure protocols such as IPsec.

When it comes to the transport layer, the biggest concern is the handling of sensitive information. If the data that reaches this layer is not encrypted, it can be easily sniffed or tampered with. That’s why it is crucial to implement encryption here. The use of encryption protocols like Transport Layer Security (TLS) is a must to ensure data confidentiality and integrity while it is in transit.

Layers 5 and 6 or the session and presentation layers are not directly related to security protocols. However, they also demonstrate the importance of indirect security mechanisms. The session layer involves session management tasks such as setup, termination, and reconnections. The presentation layer is about making data usable to the next layer (application). There are no direct security solutions that can be applied to these layers but organizations need to ensure the establishment of properly managed sessions and correct data formatting to prevent attacks that may exploit vulnerabilities involving session and presentation functions.

Lastly, the application layer is the point where user interactions take place. Hence, it is the top priority for security solutions. This is the layer where security mechanisms such as user authentication and authorization are implemented. Also, development teams should pay attention to the code security of the application to make sure that it does not contain weaknesses that threat actors can exploit. 

In-depth Defense

The OSI model encourages the establishment of a security strategy that is robust, comprehensive, and in-depth. By incorporating direct and indirect security tools, measures, and solutions across the seven layers of OSI, organizations can ensure that threat actors will have a hard time spotting opportunities for an attack. 

In a way, the OSI model serves as a foundational framework for network operation and security. Every layer contributes something towards a thorough understanding of network threats and the formulation of suitable and viable solutions.

The cyber threat landscape may evolve ceaselessly, but data transmission and network operation tend to abide by a relatively standardized framework in the long run, so it helps to refer to the OSI model in building a secure network architecture.

Image: bru-no

You Might Also Read

Why DNS Protection Should Be A Crucial Part In Building Cyber Defense:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Trouble At Three
The End Of Crypto Currency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

LRQA Nettitude

LRQA Nettitude

LRQA Nettitude is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Keepnet Labs

Keepnet Labs

Keepnet Labs is a phishing defence platform that provides a holistic approach to people, processes and technology to reduce breaches and data loss and presents anti-phishing solutions.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.