skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Defensible Networks

Defensible Networks

/ 7 min read

Defensible Networks

Introduction to Richard Bejtlich

Richard Bejtlich is a prominent figure in the cybersecurity field, known for his expertise in network security monitoring and defense strategies. A former Air Force intelligence officer, Bejtlich has dedicated his career to understanding and combating cyber threats. His military background provided him with a unique perspective on security, emphasizing the importance of intelligence gathering and proactive defense measures. Bejtlich’s contributions to cybersecurity literature, including several influential books, have made him a respected authority among security professionals.

Defensible Networks Concept

In his seminal work, “The Tao of Network Security Monitoring” published in 2004, Bejtlich introduced the concept of Defensible Networks. This framework advocates for designing and managing networks in a way that not only protects against intrusions but also enhances the ability to detect and respond to threats effectively. The core idea is to build networks that are inherently secure, manageable, and capable of providing actionable intelligence to security teams.

Key Principles of Defensible Networks

Bejtlich outlines several fundamental principles that define a Defensible Network:

  • Defensible Networks Can Be Watched

  • Visibility is paramount. A network must be designed to allow comprehensive monitoring of all activities. This means implementing systems that can log, analyze, and report on network traffic and user behaviors. By ensuring that every segment of the network is observable, security teams can detect anomalies and respond to incidents promptly.

  • Defensible Networks Limit an Intruder’s Freedom to Maneuver

  • Controlling access and movement within the network is essential to limiting the potential damage from an intrusion. By segmenting the network and enforcing strict access controls, organizations can prevent attackers from easily navigating through systems and accessing sensitive data. This includes using firewalls, intrusion prevention systems, and network segmentation strategies to create barriers against lateral movement.

  • Defensible Networks Offer a Minimum Number of Services

  • Simplification reduces risk. By limiting the number of services and applications running on a network, the attack surface is minimized. This means disabling unnecessary services, removing redundant systems, and consolidating functions where possible. A lean network is easier to manage and less susceptible to exploitation due to fewer potential vulnerabilities.

  • Defensible Networks Can Be Kept Current

  • Staying up-to-date with the latest security patches, software updates, and threat intelligence is crucial. Defensible Networks are designed to be maintainable, allowing for regular updates without significant disruption. This proactive approach ensures that known vulnerabilities are addressed promptly, reducing the window of opportunity for attackers.

Additional Contributions by Richard Bejtlich

Beyond introducing the Defensible Networks concept, Bejtlich has authored other influential books that have become staples for cybersecurity professionals, particularly blue teams responsible for defense:

The Practice of Network Security Monitoring

In this book, Bejtlich delves deeper into the methodologies and tools necessary for effective network security monitoring. He provides practical guidance on how to implement monitoring solutions, interpret data, and respond to security incidents. The focus is on developing skills and processes that enable continuous vigilance and rapid reaction to threats.

Extrusion Detection: Security Monitoring for Internal Intrusions

Here, Bejtlich explores the detection of internal threats and the importance of monitoring outbound traffic. He emphasizes that while many security measures focus on preventing external intrusions, organizations must also be vigilant against internal threats, whether from malicious insiders or compromised internal systems attempting to communicate with external malicious entities.

Defensible Network Architecture 2.0 – MICCMAC

Richard Bejtlich later refined his concept of defensible networks with the introduction of Defensible Network Architecture 2.0, which is characterized by a set of core principles summarized in the acronym MICCMAC: Monitored, Inventoried, Controlled, Claimed, Minimized, Assessed, and Current. These principles reflect a holistic approach to network security, emphasizing continuous monitoring and active defense strategies to better resist intrusions. Let’s explore each component of MICCMAC in more detail:

Monitored: A defensible network must be continuously monitored to detect anomalies and potential threats. Visibility into network traffic and system activities is critical to identifying malicious behavior before it escalates.

Inventoried: All assets within the network should be cataloged and accounted for. Knowing what devices, systems, and services exist is essential for managing and securing the environment effectively.

Controlled: Strict access controls must be implemented to limit who can access systems and resources. This ensures that only authorized users have the appropriate permissions, reducing the risk of unauthorized access or insider threats.

Claimed: Every asset on the network should have a clearly defined owner or custodian responsible for its security and maintenance. Ownership promotes accountability and ensures that each component is properly managed.

Minimized: The attack surface should be minimized by reducing unnecessary services, applications, and devices. This limits potential entry points for attackers, making the network more resilient to threats.

Assessed: Regular security assessments and audits should be conducted to evaluate the network’s defenses. This includes vulnerability scans, penetration testing, and reviewing configurations to identify weaknesses and areas for improvement.

Current: Keeping systems and software up to date with the latest patches and security updates is essential. Ensuring the network remains current reduces the risk of exploitation due to known vulnerabilities.

In his blog, Bejtlich discussed the evolution of these ideas, explaining how they build on the original concept of a defensible network. He writes:

Four years ago when I wrote The Tao of Network Security Monitoring I introduced the term defensible network architecture. I expanded on the concept in my second book, Extrusion Detection. When I first presented the idea, I said that a defensible network is an information architecture that is monitored, controlled, minimized, and current. In my opinion, a defensible network architecture gives you the best chance to resist intrusion, since perfect intrusion prevention is impossible.

I’d like to expand on that idea with Defensible Network Architecture 2.0. I believe these themes would be suitable for a strategic, multi-year program at any organization that commits itself to better security.

For further details, you can read more about Defensible Network Architecture 2.0 on Richard Bejtlich’s blog.

This refined approach offers a strategic framework for organizations to enhance their security posture in the face of evolving cyber threats, encouraging proactive defense and continuous improvement.

The Mindset of Defensible Security Architecture

The mindset of Defensible Security Architecture is not at odds with traditional network architecture approaches that prioritize operational efficiency—it is entirely complementary. While many organizations focus primarily on ensuring that their networks function optimally, security can and should be seamlessly integrated into these operations. When done correctly, security doesn’t hinder performance; it enhances it. The guiding principle of this mindset is to “build it once, build it right.” Security Enhances Operations

At its core, defensible security architecture emphasizes that security and operations are not opposing forces. In fact, integrating security from the very beginning allows networks to perform their functions both securely and efficiently. This synergy means fewer disruptions, smoother workflows, and a more resilient infrastructure. Security becomes an enabler, supporting the business’s operational goals while protecting critical assets.

Retrofitting security into an existing architecture is not only costly but also less effective. When security is tacked on as an afterthought, it often introduces complexity and inefficiencies that can lead to operational bottlenecks. By contrast, baking security into the design from the outset creates a more streamlined and manageable system. It allows for security measures to be aligned with the network’s operational requirements, ensuring that both objectives are met harmoniously. Build It Once, Build It Right

The principle of “build it once, build it right” underscores the importance of designing networks with security in mind from the very beginning. This approach is far more efficient than attempting to retrofit security later, which often leads to patchwork solutions that are difficult to maintain.

By building a defensible network architecture from the ground up, organizations can:

  • Anticipate security risks early in the design process, reducing the need for costly overhauls later.
  • Simplify operations, as security measures that are integrated into the core architecture are easier to manage and maintain.
  • Reduce attack surfaces by implementing controls that are designed to complement operational workflows, rather than disrupting them.
  • Increase resilience by ensuring that the network can both defend against and recover from potential threats without compromising its ability to operate effectively.

Ultimately, the mindset of defensible security architecture is about creating a balance between operational excellence and robust security. It is a proactive approach that aligns security strategies with operational goals, resulting in a network that is both functional and secure. This mindset helps to prevent the common pitfalls of retrofitting security and fosters a more sustainable and scalable approach to network management.


Continue with Zero Trust series Prevention Eventually Fails

Check out what's latest