Natsar Cybersecurity Insights
- Feb 17, 2025
Network Security Fundamentals: Firewalls, IDPS, and Zero Trust
- Josh Moulin
- Cybersecurity
- 0 comments
Subscribe To Get Notified of New Content!
Your information stays with Natsar—we never sell it or share it.
Intended Audience: Beginner cybersecurity professionals, IT leaders, and anyone seeking to understand key network security controls and best practices.
Network security is the backbone of a strong cybersecurity posture. Without proper controls in place, attackers can move laterally, access sensitive data, and exploit vulnerabilities across an organization. Yet, too often, security teams rely on a single layer of defense, assuming that firewalls alone will keep them safe.
In reality, effective network security requires multiple layers, each serving a distinct purpose in blocking, detecting, and responding to threats. This is the principle behind Defense in Depth (see my overview here), and in this post we will look at three specific parts:
Firewalls – The gatekeepers that control what traffic enters and exits your network.
Intrusion Detection and Prevention Systems (IDPS) – The surveillance system that monitors for suspicious activity and potential intrusions.
Zero Trust Network Access (ZTNA) – A security model that assumes no user or device should be trusted by default, even if they are inside the network.
Let’s break down each of these pillars and explore how they work together to create a robust defense.
Firewalls: The First Line of Network Defense
Firewalls act as the bouncers of the network, controlling inbound and outbound traffic based on security rules. They analyze network packets, decide whether to allow or block them, and serve as the first layer of defense against unauthorized access.
Types of Firewalls and Their Roles
1. Traditional Firewalls (Packet Filtering)
The most basic type of firewall, analyzing packet headers (source/destination IP, port numbers, protocols) to allow or block traffic.
Fast and efficient but lacks deep inspection capabilities.
2. Stateful Inspection Firewalls
Keep track of active connections and contextually analyze packet flow.
More secure than packet filtering firewalls but require more resources.
3. Next-Generation Firewalls (NGFWs)
Combine traditional firewall functions with deep packet inspection, application awareness, intrusion prevention, and threat intelligence integration.
Critical for defending against advanced threats such as malware, zero-day exploits, and encrypted attacks.
4. Web Application Firewalls (WAFs)
Specifically designed to protect web applications from attacks like SQL injection, cross-site scripting (XSS), and API exploitation.
Essential for businesses that rely on customer-facing applications.
Firewall Best Practices
Implement a default deny policy: Only allow explicitly approved traffic.
Regularly review firewall rules and remove outdated ones.
Enable logging and monitoring to detect suspicious traffic.
Ensure firewalls are updated to patch vulnerabilities and apply new threat intelligence.
While firewalls provide a critical barrier, they are not enough on their own. Attackers constantly evolve, and relying solely on perimeter security leaves organizations vulnerable. This is where Intrusion Detection and Prevention Systems (IDPS) come into play.
Intrusion Detection and Prevention Systems (IDS/IPS)
Firewalls control access, but IDPS serve as security cameras for your network, analyzing traffic to detect anomalies, malicious activity, and known attack patterns. Some organizations will implement just an intrusion detection system (IDS) to only alert on anomalous traffic where others will implement an intrusion detection and prevention system (IDPS) which not only identifies and alerts on traffic, but also blocks it depending on how it is configured.
Key Differences Between IDS and IPS
While both Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) play a critical role in network security, they serve distinct functions. Here’s a breakdown of their key differences:
-
Function
IDS: Monitors network traffic and alerts security teams about suspicious activity but does not take action to block threats.
IPS: Actively blocks or mitigates threats by automatically taking action when malicious activity is detected.
-
Placement
IDS: Typically placed out-of-band, meaning it passively monitors traffic without impacting network flow.
IPS: Positioned inline, directly in the traffic path to inspect and filter packets in real time.
-
Response to Threats
IDS: Generates alerts and logs events for security teams to investigate and respond manually.
IPS: Takes automatic action, such as dropping malicious packets, resetting connections, or blocking IP addresses and still generates alerts and logs.
-
Impact on Network Traffic
IDS: Does not disrupt network traffic, making it useful for monitoring without introducing latency.
IPS: Can potentially introduce slight latency since it must inspect, analyze, and act on packets in real time. It can also cause network problems when false positives or other issues occur that in which the IPS begins to block legitimate traffic.
IDPS Best Practices
Use signature-based detection for known threats and behavior-based detection for unknown anomalies (if your IDPS allows for this).
Regularly tune IDS/IPS rules to reduce false positives and negatives.
Deploy multiple sensors across different network segments to monitor traffic comprehensively.
Integrate with Security Information and Event Management (SIEM) solutions to enhance threat visibility.
IDPS Challenges and Limitations
While Intrusion Detection and Prevention Systems (IDPS) are essential for identifying and mitigating cyber threats, they are not without limitations. Understanding these challenges can help organizations design a more effective and realistic security strategy.
Encrypted Traffic Challenges
One of the biggest hurdles for IDPS solutions is the increasing use of encrypted traffic across networks. Many modern applications, websites, and services use TLS/SSL encryption to protect data in transit. While encryption enhances security, it also prevents traditional IDPS from inspecting the contents of network packets.
Without deep visibility into encrypted traffic, malicious activity can go undetected, allowing attackers to bypass security measures. Threats that leverage encrypted channels include:
Malware delivery through encrypted web traffic
Command and control (C2) communication between compromised hosts and attackers
Data exfiltration via encrypted tunnels
Deep Packet Inspection (DPI) Considerations
Organizations looking to inspect encrypted traffic may turn to Deep Packet Inspection (DPI), which allows security tools to analyze packet contents beyond just headers. However, DPI comes with significant challenges:
Performance Overhead – DPI is computationally expensive, often leading to increased latency and potential bottlenecks.
Legal and Privacy Issues – Decrypting network traffic raises ethical and regulatory concerns, particularly in industries dealing with sensitive or personal data.
Infrastructure Maturity – Effective DPI requires a well-managed PKI (Public Key Infrastructure), strong key management policies, and advanced security personnel capable of maintaining and troubleshooting decryption technologies.
Because of these factors, many organizations take a selective approach to decryption, applying it only in high-risk areas, such as inspecting outbound traffic for data exfiltration or scanning inbound traffic from untrusted sources.
False Positives and Alert Fatigue
IDPS solutions generate a large volume of alerts, many of which turn out to be false positives. Over time, security teams may experience alert fatigue, where the high volume of warnings leads to missed or delayed responses to real threats. This is particularly challenging for signature-based detection, which relies on predefined attack patterns but struggles to identify new or evolving threats.
To reduce false positives:
Fine-tune rules and signatures to better fit the organization’s environment.
Use behavioral-based detection alongside signature-based methods to identify anomalous activity whenever possible.
Implement SIEM solutions (Security Information and Event Management) to correlate alerts and prioritize real threats.
Evasion Techniques Used by Attackers
Cybercriminals actively develop techniques to bypass IDPS systems, including:
Traffic Fragmentation – Breaking attack payloads into small packets to evade detection.
Polymorphic Malware – Modifying malware signatures to avoid known detection rules.
Tunneling Attacks – Embedding malicious payloads inside seemingly legitimate traffic (e.g., DNS tunneling, ICMP tunneling).
SSL/TLS Encrypted Payloads – Using encryption to conceal malicious activity.
Organizations must regularly update their IDPS rules, conduct red team testing, and leverage threat intelligence to stay ahead of adversary tactics.
While IDS/IPS helps mitigate network-based threats, modern cyberattacks often originate from inside the network. This is why organizations need Zero Trust Network Access (ZTNA) to eliminate implicit trust and enforce strict access controls.
Zero Trust: Shifting from Implicit Trust to Verified Access
Traditional network security operates on an outdated assumption: “If you’re inside the network, you must be trusted.”
Zero Trust challenges this mindset by enforcing the “Never Trust, Always Verify” principle. Instead of assuming internal users and devices are safe, Zero Trust requires continuous verification, strict access controls, and segmentation. The name “Zero Trust” isn’t great, it is more of a mindset than it is a technology - it really is “Zero Implicit Trust”.
Zero Trust Key Principles
Least Privilege Access
Users and devices only get access to the specific resources they need—nothing more.
Limits lateral movement within a network, preventing attackers from accessing sensitive data.
Microsegmentation
Instead of one big “flat” network, Zero Trust divides resources into secure zones with strict access controls.
Prevents an attacker from compromising an entire network if they breach one segment.
Continuous Authentication and Monitoring
Access is not granted indefinitely—users must reauthenticate periodically.
Behavioral analytics detect anomalies and enforce risk-based authentication.
Implementing Zero Trust in Your Network
You cannot simply ask a vendor “I’ll take your ZTNA solution, please.” As mentioned before, this is more a mindset than a technology and it requires a lot of administrative and technical policies and controls to implement. At a high-level, you can start on your ZTNA journey with these initial steps:
Enforce multi-factor authentication (MFA) for all users, even inside the network.
Use role-based access control (RBAC) to define permissions based on job functions.
Continuously monitor user activity and revoke access if suspicious behavior is detected.
Deploy software-defined perimeters (SDP) to dynamically grant access based on trust level.
Zero Trust significantly reduces the risk of insider threats, credential theft, and lateral movement, making it a key strategy in modern cybersecurity frameworks.
Bottom Line
Firewalls, IDPS, and Zero Trust are fundamental building blocks of network security. A firewall acts as the gatekeeper, IDS/IPS provide real-time monitoring and threat prevention, and Zero Trust ensures that only authorized users and devices can access critical resources. By implementing these security layers together, organizations can reduce attack surfaces, prevent unauthorized access, and detect threats before they escalate.
Learn More About Defense in Depth and Earn a Continuing Education Certificate
For a deeper dive into implementing Defense in Depth strategies, watch our no-cost training video, Introduction to Defense in Depth, available on YouTube or through Natsar’s website. Completing the training on Natsar’s website allows you to earn a certification for Continuing Professional Education (CPE) credits—ideal for cybersecurity professionals looking to enhance their expertise.
How Natsar Can Help
Natsar provides expert-led training and consulting services to help organizations implement Defense in Depth strategies effectively. Whether you need assistance with network security, zero trust, endpoint protection, or compliance, we offer customized solutions to strengthen your security posture.
Visit Natsar’s website to explore our training, cybersecurity assessments, and risk management solutions.