Secure Protocols - CompTIA Security +
Hola!
Here is the second part on protocol list Did a missed one? Discuss this post: Bluesky
| Protocol | Port(s) | Main Use | Risks / Insecurity | Secure Alternative |
|---|---|---|---|---|
| HTTPS | TCP 443 | Secure web browsing | - | - |
| SSH | TCP 22 | Secure remote access (replaces Telnet) | - | - |
| SFTP | TCP 22 | Secure file transfer (via SSH) | - | - |
| SCP | TCP 22 | Secure copy for UNIX/Linux systems | - | - |
| IMAPS | TCP 993 | Secure IMAP email access | - | - |
| POP3S | TCP 995 | Secure POP3 email retrieval | - | - |
| SMTPS | TCP 587 | Secure email sending | - | - |
| SNMPv3 | UDP 162 | Secure monitoring and device reporting | Older versions (v1/v2) use plaintext | SNMPv3 (already secure) |
| LDAPS | TCP 636 | Secure access to directory services | LDAP is insecure without encryption | LDAPS (already secure) |
| TLS/SSL | TCP 443 | Secure transport layer | Older SSL versions have vulnerabilities | TLS 1.2+ |
| SMB | TCP 445 | File and printer sharing | If exposed to internet, can be exploited | Use with strong authentication |
| IPSec | UDP 500 | Secure VPN or host-to-host sessions | Misconfiguration, outdated algorithms | Properly configured IPSec |
| FTPS | TCP 989/990 | Secure large file transfers | Complex to configure correctly | FTPS (properly configured) |
| RDP | TCP 3389 | Remote desktop access (Windows) | Exposed RDP can be brute-forced or exploited | Use VPN, MFA, and monitoring |
| SIP | TCP/UDP 5060/61 | Internet-based call initiation | If not encrypted, vulnerable to interception | Use SIP with TLS |
| SRTP | UDP 5061 | Secure voice traffic | - | - |
| DNSSEC | TCP/UDP 53 | Secure DNS traffic | DNS without DNSSEC is vulnerable to spoofing | DNSSEC (already secure) |
| Kerberos | TCP 88 | Secure authentication using tickets | Time desynchronization, ticket theft | Use with NTP, hardened configs |
| Other Secure Practices | Description | Recommendation |
|---|---|---|
| Protocol selection | Choose appropriate secure protocols based on use case | Understand purpose and scope before deployment |
| Port selection | Open only necessary ports to minimize attack surface | Follow least privilege principle |
| Transport method | Techniques like TLS or IPSec to protect data in transit | Use modern versions (TLS 1.2+) |
| Tunneling (TLS, IPSec) | Encapsulates traffic to securely cross insecure networks | Use with strong encryption and authentication |