The OSI Model's Role In Building A Secure Network Architecture

Brought to you by Renelis Mulyandari    
  
The Open Systems Interconnection (OSI) model is a framework that is commonly cited in computer networking and cybersecurity discussions. Interestingly, it was developed by the International Standards Organization (ISO).

It serves as a guide for troubleshooting network problems, as well as in understanding and implementing security measures related to network communication.

While the OSI model is not an essential factor in the operation of networking protocols nowadays, it serves as an important tool in understanding and identifying security risks. It also helps in meaningfully analyzing the capabilities of cybersecurity solutions. The OSI model and cybersecurity share a strong affinity, and this relationship is something organizations should consider exploring as they aim to build secure network architecture.

Layer-by-layer Approach To Security

Before discussing the role of the OSI model in building a secure architecture, it’s important to get acquainted with its layers. Network stacks are not as straightforward as they may seem. They are complex and involve multiple layers. The OSI model pierces into this complexity by providing an abstraction to facilitate a better understanding of the network communication process and its impact on the emergence of security risks, the troubleshooting of problems, and the dynamics of network-layer attacks.

There are seven layers under the OSI model, namely the physical, data link, network, transport, session, presentation, and application layers. These layers present the structure by which data moves regardless of the protocol used. 

As the name suggests, the physical layer is the point where the physical transmission of raw data happens over a physical medium. The data link layer is where raw data is transmitted into frames to be transmitted at the physical layer. The network layer is responsible for routing traffic to its intended destination according to the indicated IP addresses. 

Meanwhile, the transport layer, the first of the so-called host layers, is responsible for managing data transmission between nodes. The session layer, another host layer, is where sessions between nodes are managed and protocol data units (PDU) are handled. Next, the presentation layer translates data from network data into formats that are usable for the destination applications. Lastly, the application layer is where data is served to end users, including the exchange of data between a web server and a client app.

These layers enable network connections in a systematic and standardized manner. They facilitate interoperability for protocols and various network devices. Being familiar with these layers supports the formulation of comprehensive network security solutions.

When More Is Better

The seven layers of the OSI model are notably more than the four (application, transport, internet, and network access) in the TCP/IP model, an older model that approximates the flow of networking protocols. This may appear counterintuitive given the trend of simplification in cybersecurity and tighter technology stacks, but having more layers has the benefit of a better representation of all the functions involved in network communications.

The OSI model provides a more intuitive way of examining network operations, which makes it easier to resolve issues affecting network protocols. The seven layers provide a clearer way to discuss different network-level attacks. Also, it allows the security team to have a more thorough scrutiny of the security of networking protocols. 

The TCP/IP model is a practical representation of the network stack because it presents the layers in a way that is more structurally similar to the network protocols in real-world settings. In contrast, the OSI model is largely an abstraction of actual network protocols. It is a theoretical model that presents descriptions of the different tasks undertaken to enable data transmission.

How The OSI Model Fosters Security

The OSI model serves as a good basis for building a secure network infrastructure. Here’s a quick rundown of how the model influences security considerations.

Layer 1 or the physical layer is viewed as the soft underbelly of cybersecurity. This is because of the various attacks aimed at the hardware or physical devices of a network. These attacks are often overlooked because security strategies often focus on the software side. The OSI model makes it clear that ample attention should be given to defending the physical layer.

On the other hand, the processes at the data link and network layers highlight man-in-the-middle attacks (MiTM). These layers are responsible for routing, addressing, and detecting errors, which can be the subject of eavesdropping or attempts to alter the communication between two parties. As such, it is important to implement security measures such as firewalls, network segmentation, and the use of secure protocols such as IPsec.

When it comes to the transport layer, the biggest concern is the handling of sensitive information. If the data that reaches this layer is not encrypted, it can be easily sniffed or tampered with. That’s why it is crucial to implement encryption here. The use of encryption protocols like Transport Layer Security (TLS) is a must to ensure data confidentiality and integrity while it is in transit.

Layers 5 and 6 or the session and presentation layers are not directly related to security protocols. However, they also demonstrate the importance of indirect security mechanisms. The session layer involves session management tasks such as setup, termination, and reconnections. The presentation layer is about making data usable to the next layer (application). There are no direct security solutions that can be applied to these layers but organizations need to ensure the establishment of properly managed sessions and correct data formatting to prevent attacks that may exploit vulnerabilities involving session and presentation functions.

Lastly, the application layer is the point where user interactions take place. Hence, it is the top priority for security solutions. This is the layer where security mechanisms such as user authentication and authorization are implemented. Also, development teams should pay attention to the code security of the application to make sure that it does not contain weaknesses that threat actors can exploit. 

In-depth Defense

The OSI model encourages the establishment of a security strategy that is robust, comprehensive, and in-depth. By incorporating direct and indirect security tools, measures, and solutions across the seven layers of OSI, organizations can ensure that threat actors will have a hard time spotting opportunities for an attack. 

In a way, the OSI model serves as a foundational framework for network operation and security. Every layer contributes something towards a thorough understanding of network threats and the formulation of suitable and viable solutions.

The cyber threat landscape may evolve ceaselessly, but data transmission and network operation tend to abide by a relatively standardized framework in the long run, so it helps to refer to the OSI model in building a secure network architecture.

Image: bru-no

You Might Also Read

Why DNS Protection Should Be A Crucial Part In Building Cyber Defense:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Trouble At Three
The End Of Crypto Currency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Integris

Integris

Integris offers best-in-class services like dedicated vCIOs, specialized security and compliance advisory services, a 24/7 help desk, and more.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Codezero Technologies

Codezero Technologies

Codezero is at the forefront of microservices development, employing an identity-aware overlay network that delivers zero-trust security to DevOps.