The document summarizes common network security implementations like firewalls, VPNs, jumpboxes, VDI, and cloud systems. It discusses flaws in each that could allow attackers to pivot from one network zone to another. The presentation recommends secure design patterns like clean source principles, secure access workstations, careful use of admin privileges, and avoiding exceptions to standard designs. The goal is to present a secure architecture while also providing the bad guy perspective and lessons learned.
Related topics: