Regional Insurance Group: Enterprise Network Redesign¶
Author: Brayden Mitchell Project Type: Networking Capstone Organization: Regional Insurance Group Focus Areas: Network Security, Architecture Design, SIEM, VPN Deployment
Note
This project builds on previous portfolio entries:
Overview¶
This capstone project presents a comprehensive redesign of an enterprise network for a mid-sized organization, Regional Insurance Group. The goal of the project was to analyze an existing insecure and inefficient network architecture and develop a scalable, secure, and modernized solution aligned with industry best practices.
The redesign emphasizes segmentation, layered security, secure remote access, and centralized monitoring to improve both cybersecurity posture and operational efficiency.
Problem Statement¶
The original network infrastructure suffered from several critical weaknesses:
Lack of internal network segmentation
Reliance on a single perimeter firewall
Limited monitoring and visibility into network activity
No secure remote access solution
High risk of lateral movement in the event of a breach
These issues increased the organization’s exposure to cyber threats and limited its ability to detect and respond to incidents effectively.
Objectives¶
The primary objectives of this project were:
Improve network security through segmentation and layered defenses
Reduce attack surface and prevent lateral movement
Implement secure remote access for distributed users
Introduce centralized logging and monitoring
Ensure scalability for future organizational growth
Solution Architecture¶
The redesigned network introduces a defense-in-depth strategy built on multiple key components:
- 1. VLAN Segmentation
Accounting (VLAN 10)
Sales (VLAN 20)
Server Network (VLAN 30)
Authentication Network (VLAN 40)
DMZ (VLAN 50)
This logical separation isolates departments and critical systems, reducing unauthorized access and improving traffic control.
- 2. Layered Firewall Design
Perimeter firewall (pfSense)
Internal segmentation firewall (OPNsense)
Host-based firewalls (Windows Defender)
This approach ensures multiple inspection points and follows the principle of defense in depth.
- 3. DMZ Implementation
Public-facing web server isolated from internal network
Strict firewall rules limiting inbound and outbound traffic
This prevents external threats from directly reaching sensitive internal systems.
- 4. Active Directory Authentication
Centralized identity management
Role-based access control (RBAC)
Enforcement of least privilege
Authentication services are isolated within a dedicated VLAN to enhance security.
SIEM Implementation¶
A Security Information and Event Management (SIEM) solution was introduced using Splunk Enterprise Security.
Key Capabilities:
Centralized log aggregation
Real-time monitoring and alerting
Event correlation and threat detection
Incident investigation support
Data Sources Integrated:
Firewall logs
VPN logs
Server and endpoint logs
Active Directory logs
Network device logs
Example Detection Rules:
Multiple failed login attempts (brute force detection)
Suspicious VPN activity
Unusual outbound traffic patterns
Privileged account misuse
This significantly improves visibility and reduces incident response time.
VPN Deployment¶
To support secure remote work, an SSL/TLS VPN solution was implemented.
Advantages:
Browser-based access (no client required)
Strong encryption using TLS
High firewall compatibility (HTTPS-based)
Granular access control
Additional Security Enhancements:
Multi-factor authentication (MFA)
Zero Trust Network Access (ZTNA) principles
Endpoint compliance checks
This enables secure, scalable remote connectivity without exposing internal systems.
Implementation Strategy¶
The deployment follows a phased approach:
Planning & Design - Finalize architecture and tools - Conduct risk assessment
Network Deployment - Configure VLANs and routing - Implement firewall rules
SIEM Integration - Connect log sources - Tune detection rules
VPN Rollout - Configure secure access - Train users
Validation & Optimization - Perform testing and audits - Refine configurations
This structured approach minimizes disruption and ensures system stability.
Results and Impact¶
The redesigned network delivers several measurable improvements:
Reduced risk of lateral movement
Faster detection and response to threats
Improved network performance and reliability
Secure remote access for employees
Enhanced audit and compliance readiness
These changes position the organization for long-term growth while maintaining a strong security posture.
Official Report¶
Key Takeaways¶
This project demonstrates practical application of core networking and security concepts, including:
Network segmentation using VLANs
Defense-in-depth architecture
SIEM deployment and log analysis
Secure remote access design
Enterprise-level network planning
It highlights the importance of aligning technical solutions with business needs while adhering to cybersecurity best practices.
Future Enhancements¶
Potential future improvements include:
Intrusion Detection/Prevention Systems (IDS/IPS)
Network Access Control (NAC)
Automated incident response (SOAR integration)
Cloud-based infrastructure integration
These additions would further strengthen the organization’s security maturity.