Cisco Security Agent (CSA) Network Admission Control (NAC)



Similar documents
UNDERSTANDING AND DEPLOYING HOST-BASED INTRUSION PREVENTION TECHNOLOGY

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

SELF-DEFENDING NETWORKS

Sygate Secure Enterprise and Alcatel

Network Access Control ProCurve and Microsoft NAP Integration

Securing the University Network

Towards End-to-End Security

The Challenge of a Comprehensive Network Protection. Introduction

Integrated Protection for Systems. João Batista Territory Manager

Security Information Management Systems Cyril

Secure Cloud-Ready Data Centers Juniper Networks

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Industrial Security for Process Automation

1. Server Microsoft FEP Instalation

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Deep Security Vulnerability Protection Summary

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

INTRUSION DETECTION SYSTEMS and Network Security

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Bypassing Network Access Control Systems

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Symantec Critical System Protection (SCSP) Overview. February 2010

INTRODUCTION TO FIREWALL SECURITY

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

CiscoWorks SIMS(Netforensics)

Avaya Modular Messaging 5.x

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

Desktop Release Notes. Desktop Release Notes 5.2.1

Secure Your Mobile Workplace

Ovation Security Center Data Sheet

Network Access Security It's Broke, Now What? June 15, 2010

Kaseya IT Automation Framework

Patch Management Marvin Christensen /CIAC

End-user Security Analytics Strengthens Protection with ArcSight

Ovation Security Center Data Sheet

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

RSA SecurID Ready Implementation Guide

McAfee MOVE / VMware Collaboration Best Practices

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

OfficeScan Corporate Edition 6.5

Architecture Overview

Implementing Security Update Management

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Securing Networks with PIX and ASA

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

NETWORK ACCESS CONTROL

Total Protection for Enterprise-Advanced

National Information Assurance Partnership

Securing Cisco Network Devices (SND)

Symantec Endpoint Protection Datasheet

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Host Checker. Configuration Guide

Innovative Defense Strategies for Securing SCADA & Control Systems

Nessus and Antivirus. January 31, 2014 (Revision 4)

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

Symantec Security Information Manager Version 4.7

Unprecedented Malware Growth

Endpoint protection for physical and virtual desktops

Symantec Client Management Suite 8.0

ontune SPA - Server Performance Monitor and Analysis Tool

This chapter covers the following topics:

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

CTS2134 Introduction to Networking. Module Network Security

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Managing Enterprise Security with Cisco Security Manager

How To Protect A Network From Attack From A Hacker (Hbss)

FISMA / NIST REVISION 3 COMPLIANCE

NCP Secure Enterprise Management Next Generation Network Access Technology

By Jascha Wanger

Endpoint protection for physical and virtual desktops

F-Secure Client Security. Administrator's Guide

USM IT Security Council Guide for Security Event Logging. Version 1.1

McAfee VirusScan and epolicy Orchestrator Administration Course

Virtualization Journey Stages

Mapping EventTracker Reports and Alerts To The SANS 20 Critical Controls Consensus Audit Guidelines v3.1 Prism Microsystems, October 2012

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Configure Posture. Note. Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.1 1

Layered Tech Cloud Data Center Service Guide

Deploying Cisco ASA VPN Solutions Exam.

Total Defense Endpoint Premium r12

Information Technology Solutions

SANS Top 20 Critical Controls for Effective Cyber Defense

Tenable Tools for Security Compliance The Antivirus Challenge

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Microsoft Windows Server System White Paper

5 Steps to Advanced Threat Protection

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Transcription:

Cisco Security Agent (CSA) Network Admission Control (NAC) Pascal Delprat Security Consultant Cisco France Vincent Bieri Marketing Manager, Security EMEA Technology Marketing Organisation 1

Agenda CSA and NAC Presentation (30 ) vincent bieri CSA Demo (20 ) pascal delprat Q&A / Discussions (10 ) all 2

Cisco Security Agent (CSA) 3

Agenda CSA Overview of Cisco Security Agent Management Model CSA Implementation and Architecture Security Functions Performance Impact Integration with Other Security Technologies Roadmap CSA 4.5 4

What is Cisco Security Agent? A security software for desktop, laptop, & server computers that minimizes patch and security problems with behavior-based OS kernel wrappers Centrally administered, with distributed, autonomous policy enforcement Scales well & also works with intermittently connected hosts Can also adapt defenses based upon correlation of events from different hosts Effective against existing & previously unseen attacks Stopped nimda, code red, slammer, blaster with out-of-the-box policies 5

JPEG (GDI+) OVERFLOW 6

Cisco Security Agent (CSA) Components Management Server deploys Security Policies, Receives and Stores Events in SQL Database, Alerts Administrators, Deploys Software, Part of Cisco VPN and Security Management System Cisco Security Agents Enforce Security Policy Received from Management Server, Sends Events Immediately, Interacts with User (If Necessary), Protects Itself, Poll for Policy Updates, Run on Windows and Solaris CSA Management Console Web Browser Interface, Policy Configuration Tool, Event Views 7

Management Architecture Remote Users or Branch Offices Management Server Events are pushed to it Configuration is pulled from it DMZ Campus 8

Hosts are Attached to a Group that includes a set of Policies defined by Rules GROUP Web Servers HOSTS Web1.cisco.com Web2.cisco.com POLICIES IIS Module Windows Module 9

Groups Used to Organize Logical Collections of Hosts e.g. IIS Servers, Executive Desktops, or SQL Servers 10

Policies Are attached to zero or more groups Are composed of logical collections of rules 11

Rules Are attached to policies Are where security functions are specified May enable specific heuristics 12

CSA Security Functions System hardening Syn-flood protection Malformed packet protection Restart of failed services Resource protection File access control Network access control Registry access control COM component access control Control of executable content Protection against email worms Protection against automatic execution of downloaded files or ActiveX controls Application-related Application run control Executable file version control Protection against code injection Protection of process memory Protection against buffer overflows Protection against keystroke logging Detection Packet sniffers and unauthorized protocols Network scans Monitoring of OS event logs Network firewalling 13

CSA Implementation Approaches Call Interception Intercept system calls between applications and the operating system Security policy Pre-defined rules Heuristics Combination of methods System state monitoring Application behavior What are the running applications doing? 14

CSA Architecture Overview Application File system Network Configuration Execution space interceptor interceptor interceptor interceptor Rules engine State Rules & policies Correlation Kernel Allowed request engine Blocked request 15

Performance Impact Windows CPU usage: 1-5% Solaris CPU usage: 3-10% Memory usage: 7 10MB, up to 20 Network impact: Policy download: 35-70k Event: ~3k Poll: ~2.5k Polling interval change: ~3k Software update: Varies Transactions per second is a very good way to measure latency 16

Performance: Transactions per Second Note: Performed on W2K SP3 Running IIS 5.0; Single 2Ghz P4 CPU, 1Gbps NIC, Non-hyperthreaded, 533Mhz System Bus 17

CSA Integration other Security Technologies VPN Are You There Requires version 4.0 of Cisco VPN client and concentrator Also supported in Checkpoint VPN-1 Network Admission Control (NAC) Complement NIDS and AV Combining signature detection and behavioral protection Need AV to eradicate a virus, worm, or trojan Log Collectors and Correlators Windows Event Viewer and AV logs into CSA events 18

Cisco Security Agent Roadmap New Features version 4.5 New Features MC Scalable to 100,000 agents Antivirus DAT version checking Application/patch tracking Location-based policies User-based profiles Agent Internationalization & Localization Policies based on NAC status Security Enhancements Apr May Jun Jul Aug Sep Oct Nov Dec Q1 CY05 Q2 CY05 New Agent Platforms RTM: 22 July 2004 CCO Download: 22 July 2004 FCS: 22 July 2004 New Agent Platforms ver 4.0.3 Windows 2003 Server Windows XP SP2 RTM: 13 Dec 2004 CCO Download: 13 Dec 2004 New Agent Platforms ver 4.5 Windows Clusters RedHat Enterprise Linux 3.0 Enterprise Server, Workstation Advanced Server (Stretch Goal) Windows XP Home Edition 19

Network Admission Control (NAC) 20

Agenda NAC Overview of Network Admission Control NAC Phase 1 (Current) Model and Components NAC Credentials NAC Phase 2 (Future) Model and Components 21

Network Admission Control (NAC) preventing non-compliant host Client attempts connection Authentication and policy check of client Desktop Si Corporate Net Cisco Trust Agent Quarantine VLAN Access Granted Access Denied Quarantine Remediation 22

NAC Phase 1 Logical Components June 2004 Host Network Access Device AAA Server Vendor Server Security App Plug-ins CTA EAPoUDP RADIUS HCAP CTA CTA Cisco Security Agent McAfee VirusScan Symantec SAV & SCS (EDAP customers only) Trend Micro OfficeScan Cisco Trust Agent (NT, 2000, XP) Routers (83x-72xx) CiscoWorks SIMS Monitoring & Reporting Cisco Secure ACS Trend Micro Control Manager 23

Credentials Available NAC credentials characterize the state of an asset, and compliment ID credentials for the asset and user Credentials form the basis for policy expressions for network admission control Below are most of the initial credentials available at NAC phase 1 ship Vendors will add new credentials often and at any time FROM CISCO AGENTS CTA 1.0 CTA version Operating system name Operating system version CSA 4.0.2 Installed Service Packs Installed hotfixes CSA version CSA enabled or disabled FQDN of CSA-MC (VMS) CSA status Last poll of CSA-MC (VMS) FROM VENDORS Anti-Virus AV software name or identifier Software version Scan engine version DAT/pattern file version AV enabled or not On-access scan enabled DAT/pattern file release date Other Software Varies by vendor E.g. SYMC SCS 2.0 includes FW and HIDS 24

NAC Phase 2 Logical Components Host Security App Plug-ins CTA Network Access Device EAPoUDP EAPo802.1x RADIUS AAA Server Non-responsive Audit Server Vendor Server HCAP CTA CTA Main AV Vendors Phase 1 NT, XP, 2000 EAPoUDP Routers (83x-72xx) RADIUS Cisco Secure ACS Main AV Vendors Phase 2 Linux, Solaris, 2003 Switches (2900-6500) VPN 3000 Build NR System & API Broad API License IOS Switches Broad API License EAPo802.1x Broad API License 25