Ransomware Countermeasures – Networking and Zero-Trust Access
As I mentioned in the first chapter, most ransomware attacks either start with a compromised device or a vulnerable service that is externally available, such as a VPN or VDI, which attackers then exploit.
Regardless, most of these attacks provide the attacker with a foot in the door and then give them a way to gain further access to the infrastructure.
Most of these attacks are prevented if the end user device does not have access to the infrastructure or the service is not externally available.
Therefore, in this chapter, using a zero-trust-based access model, we will go through the alternatives for how we can ensure that users and administrators can securely access services externally but without the same risks.
We will also explore some best practices regarding network segmentation and security for Windows-based workloads and how we can secure our external web services from Distributed Denial-of-Service...