The document provides an introduction to network diagramming. It discusses the importance of network topology diagrams for incident response. The document outlines common network architecture principles and designs. It also categorizes the general steps to create network topology diagrams, which include identifying network components, sketching the diagram, choosing a diagramming application, building the diagram, creating a legend, and maintaining the diagram. Additional resources on the topic are also provided.
1. C I S A | C YB E R S E C U R I T Y A N D I N F R A S T R U C T U R E S E C U R I T Y A G E N C Y
INTRODUCTION TO NETWORK DIAGRAMMING
2. Notice
Commercial Endorsement Disclaimer: The United States Government through the
Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security
(DHS) does not endorse any commercial product or service. Any reference to specific commercial
products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not
constitute or imply their endorsement, recommendation, or favoring by CISA or DHS.
Simulated Non-Production Data Disclaimer: No production data was used in this demonstration.
Sensitive Information Disclaimer: Be aware that this event is live! Events such as these are
attended by people from many different federal agencies. As a student, PLEASE DO NOT
DISCLOSE ANY AGENCY SENSITIVE INFORMATION DURING THIS EVENT.
CISA Comment Policy: This course abides by the CISA Comment Policy (www.cisa.gov/comment-
policy).
DISCLAIMER: This webinar is being recorded and may be made public for the benefit of other
students. While you are encouraged to engage with the speaker, you are advised against
disclosing personally identifiable information (PII) on the recording. Please contact
licensing@cisa.dhs.gov with any questions or comments.
2
4. Course Learning Objectives
Terminal Objective
Enable you to visualize where your network’s physical and logical devices and
connections are by creating or reviewing network topology diagrams.
Enabling Objectives:
▪ Define what a network topology
diagram is
▪ Explain how network topology
diagrams can help organizations
during incident response
▪ Describe the common network
architecture security principles and
designs
▪ Categorize the general steps used
to create network topology
diagrams
Photo source: library.techsmith.com
4
14. Asset Discovery & Mapping – Complex vs Simple
https://www.solarwinds.com
Sample of small network diagram in PowerPoint
14
15. Data Flow and Storage
Data Flow
The movementof data through a
system composed of
software, hardware, or a combination
of both.
Also known as data-in-transit or
data-in-motion.
https://www.techuseful.com/how-to-protect-data-in-motion-through-managed-file-transer
15
16. Network Entry and Exit Points
Consider:
▪ Access
authorization
▪ Wired or
Wireless
▪ External
connections
▪ Data transfer
rules
16
17. Segmented
Networks
17
Helps to limit direct access to
information such as databases,
sensitive information, and
unauthorized applications by a
malicious actor.
28. Summary
✓ Defined what a network topology diagram is
✓ Explained importance of network topology diagrams during
incident response
✓ Described the common network architecture security
principles and designs
✓ Categorized the general steps used to create network
topology diagrams
28
29. Additional Resources
29
NIST Framework for Improving Critical Infrastructure Cybersecurity
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
NIST Special Publication 1800-5 IT Asset Management
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-5.pdf
CISALayering Network Security Through Segmentation
https://www.cisa.gov/sites/default/files/publications/layering-network-security-
segmentation_infographic_508_0.pdf
Trusted Internet Connections 3.0
https://www.cisa.gov/sites/default/files/publications/CISA%20TIC%203.0%20Reference%20
Architecture%20v1.1.pdf
Computer Security Incident Handling Guide
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
Security and Privacy Controls for Information Systems and Organizations
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf