Software Defined Perimeter



Similar documents
CSA SDP Working Group

Is Your SSL Website and Mobile App Really Secure?

SSL BEST PRACTICES OVERVIEW

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols/Standards

Public Key Infrastructure (PKI)

The Seven Habits of State-of-the-Art Mobile App Security

Chapter 7 Transport-Level Security

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Software Defined Perimeter: Securing the Cloud to the Internet of Things

SSL/TLS: The Ugly Truth

Analyzing the Security Schemes of Various Cloud Storage Services

Network Security Essentials Chapter 5

Web Security. Mahalingam Ramkumar

A tutorial on how you can host mul$ple SSL Cer$ficates on a single IP address without losing any backward compa6bility

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

SSL Report: ebfl.srpskabanka.rs ( )

Bit Chat: A Peer-to-Peer Instant Messenger

Vidder PrecisionAccess

Transport Level Security

SAP Single Sign-On 2.0 Overview Presentation

Managing IPv4 scarcity when using SSL Cer7ficates Mul7ple SSL Cer7ficates on a single IP address

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

SSL GOOD PRACTICE GUIDE

Information Security

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

TLS/SSL in distributed systems. Eugen Babinciuc

Secure Sockets Layer

What is network security?

CS5008: Internet Computing

Strong Authentication for Future Web Applications

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

, ) I Transport Layer Security

SSL Server Rating Guide

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Web Security Considerations

SSL implementieren aber sicher!

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Implementation Vulnerabilities in SSL/TLS

Chapter 7: Network security

TLS and SRTP for Skype Connect. Technical Datasheet

Chapter 17. Transport-Level Security

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Authenticity of Public Keys

Computer and Network Security. Outline

True Key by Intel Security

SSL Protect your users, start with yourself

Applying Cryptography as a Service to Mobile Applications

Dashlane Security Whitepaper

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

NetScaler. Web Service Availability and Security

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Client Server Registration Protocol

Communication Systems SSL

Einführung in SSL mit Wireshark

Security Guide. BES12 Cloud

Security vulnerabilities in the Internet and possible solutions

EXAM questions for the course TTM Information Security May Part 1

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

An Overview of Communication Manager Transport and Storage Encryption Algorithms

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Savitribai Phule Pune University

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Introduction. Purpose. Background. Details

Network Security Part II: Standards

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Criteria for web application security check. Version

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

SDP Hackathon #4 Analysis & Report

DRAFT Standard Statement Encryption

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Privileged Administra0on Best Prac0ces :: September 1, 2015

Lecture 10: Communications Security

Chapter 10. Cloud Security Mechanisms

Secure Identity in Cloud Computing

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Protocol Rollback and Network Security

ViSolve Open Source Solutions

Apache Milagro (incubating) An Introduction ApacheCon North America

Practical Invalid Curve Attacks on TLS-ECDH

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

Proposed Documents for JOSE: JSON Web Signature (JWS) JSON Web Encryp6on (JWE) JSON Web Key (JWK)

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CRYPTOGRAPHY AS A SERVICE

Transcription:

So#ware Defined Perimeter Software Defined Perimeter A new approach to access control Junaid Islam, Co Chair

Before we start, two ideas we believe strongly Complexity is the primary reason security systems fail (Junaid said this) The ideal security solu?on should just work (what Bob wants) 2 Internet 2 Technology Exchange 2015

600+ U.S. Vic<ms of Chinese Cyber Espionage 3

Fundamental Problem: AOacks Server exploita?on Creden?al the# Connec?on hijacking Connec?on- oriented protocol DNS Client connects to server before authen?ca?on Vulnerability is unauthen?cated connec?vity & visibility IP addr of finance server? Alice p@ssw0rd Alice 10.0.0.1 Hello 10.0.0.1, I d like some data Who are you? Alice, p@ssw0rd You re authorized. 10.0.0.2 10.0.0.1 10.0.0.3 4

Connec<vity & Visibility: Not a New Problem Wall off the enterprise Hide the applica?ons Tightly manage the computers Enterprise Alice Internet Bob This worked in the Business model of the 1990 s 5

Business 2.0: The Perimeter Crumbled Phishing, BYOD, SaaS, IaaS, Contractors, subject maoer experts, outsourced so#ware and IT, channel partner, ERP professional Remove visibility Remove connec?vity Cloud & BYOD friendly Enterprise IaaS SaaS 479729cec9a2187c914df2b3078e320f Alice Bob The world needs a new security model!!! 6

How SDP Started: Big companies with BIG problems Connec?ng 200,000 users to data center- cloud apps Monitoring and upda?ng vehicle so#ware Enabling "customer controlled" services 7 Internet 2 Technology Exchange 2015

Current Connec<vity Model Connect to Application Provide Credentials Multifactor Token Denial of Service Creden@al TheA Server Exploita@on Connec@on Hijacking APT/Lateral Movement 8 Internet 2 Technology Exchange 2015

Solu<on Requirements Insider Threat Mobile Devices Cloud Migration No secrets Highly scalable Any infrastructure 9 Internet 2 Technology Exchange 2015

SoYware Defined Perimeter Mul?factor Token Provide Creden?als Connect to Applica?on 10 Internet 2 Technology Exchange 2015

SDP Architecture 0. One?me on- boarding Client root of trust Digital ar?facts & thin client 1. Device Authen?ca?on & Authoriza?on SPA: an? DDoS, defeats SSL aoacks mtls & fingerprint: an? creden?al the# Issuing CA Gateway Client Crypto IP s SDP Controller SAML IdP 2. User Authen?ca?on & Authoriza?on Enterprise iden?ty: separa?on of trust SAML IdP integrated with LDAP groups 3. Dynamically Provisioned Connec?ons Applica?ons isolated and protected Usability: portal page of applica?ons 3. Dynamic Connec<on SDP Gateways Hos<ng & IaaS SDP 3. Dynamic Connec<on DMZ & Data Center 11 Internet 2 Technology Exchange 2015

Key SDP Features 64 bit id is not secret (can be listed) SPA can carry payload for Auto/IoT applica?ons AOacks can be detected in the first packet 12 Internet 2 Technology Exchange 2015

Defea<ng A^acks on the Extended Enterprise Server Isola<on SPA, Dynamic FW Transparent MFA mtls, Fingerprint Encryp<on, Pinned Certs, No DNS Server exploita?on: constant aoacks Misconfigura?ons Vulnerabili?es Injec?ons Denial of Service Creden?al the#: ⅔ of Verizon DBIR Phishing Keyloggers Brute force Connec?on hijacking: stealthiest Man- in- the- Middle Cer?ficate forgery DNS poisoning User name Password Internet 2 Technology Exchange 2015

SDP Provides Real Time Threat Detec<on 14 Internet 2 Technology Exchange 2015

15 SDP Cryptography Profile ECDHE- RSA- AES256- GCM- SHA384 TLS suite ECDHE: Ellip?c Curve Diffie Hellman Ephemeral Ellip?c curve pre- master keys Generate the four symmetric keys of the TLS Ephemeral keys per session Perfect Forward Secrecy But not client or server authen?ca?on RSA: Public/private key pair with an X.509 cer?ficate Client and server authen?ca?on Vidder s implementa?on: Cer?ficates pinned to a trusted root cer?ficate Not the hundreds of (possibly compromised) roots browsers trust Employs OCSP stapling (RFC 6066) Forwards the OCSP response with TLS Server hello Reduces the load on the OCSP responder Mi?gates a DoS of the OCSP responder AES256- GCM: Advanced Encryp?on Standard (NIST FIPS 197) Symmetric key encryp?on 256 bit cipher block size Galois/Counter Mode Block cipher that simultaneously computes encryp?on and integrity PC s and servers implement GCM in hardware Negligible performance impact due to encryp?on of the data SHA384: Secure Hash Algorithms (and member of SHA- 2) Generates a 384 bit hash Verifies integrity of the clear text Client/Server handshake Single Packet Authoriza?on (SPA) History: Invented >10 years ago Commonly used for super user ssh access to servers Mi?gates aoacks by unauthorized users Algorithm Based on RFC 4226, "HOTP HMAC- based One- Time Password Used for hardware/so#ware one?me password tokens 128- bit random number seed 128- bit non- secret counter So#ware Defined Perimeter: SPA occurs before TLS (SSL) connec?on Mi?gates aoacks on TLS by unauthorized users See AOacks on SSL/TLS SPA = UID, OTP, CTR, GMAC UID = Universal ID of SDP Client OTP = HMAC[seed CTR] GMAC = E client private key [HMAC[UID OTP CTR]] Each client has an id, seed, and counter Counter is incremented, appended to seed, and hashed UID, OTP, CTR, & and the counter are sent as clear text. The counter is increment to mi?gate playback aoacks. The packet is also signed to provide integrity checking.

A^acks on SSL/TLS Name Date A^ack Unauthorized Authorized Users SSLstrip Feb 2009 hop to hops SPA No hop DigiNotar Sept 2011 MitM forged certs SPA Pinned certs BEAST Apr 2012 Java Applet oracle SPA Client- based CRIME Sept 2012 MitM SPDY compressing oracle SPA No compression Lucky 13 Feb 2013 MitM CBC padding oracle SPA GCM TIME Mar 2013 Browser JavaScript?ming oracle SPA Client- based RC4 biases Mar 2013 MitM RC4 oracle SPA No cypher nego?a?on BREACH Aug 2013 Website redirect, compression SPA No redirect or compression goto fail Feb 2014 MitM counterfeit key via coding error SPA Pinned dedicated cert Triple Handshake Mar 2014 Server MitM on client cert SPA Pinned dedicated cert Heartbleed Apr 2014 OpenSSL bug SPA Not single- ended SSL BERserk Sept 2014 MitM PKCS#1.5 padding SPA Not Mozilla NSS Poodle Oct 2014 MitM SSLv3 oracle SPA No cypher nego?a?on Poodle++ Dec 2014 MitM JavaScript?ming oracle SPA Client- based FREAK Mar 2015 MitM nego?a?on 512 bit key SPA No key nego?a?on Bar- mitzvah Mar 2015 View RC4 SPA No RC4 logjam May 2015 MitM downgrade to 512 bit key SPA No suite nego?a?on 16

Current SDP Workgroup Ac<vi<es Suppor?ng DHS contract for Terabit scale DDoS solu?on Coordina?ng development efforts of commercial partners Beginning efforts of Version 2 looking for volunteers!!! 17 Internet 2 Technology Exchange 2015

Typical Denial of Service (DoS) A^acks Applica?on layer SQL statements that DoS the database Many false posi?ves punish legi?mate users PrecisionAccess defeats this with no false posi?ves User name/password Compromise or DoS each user Cannot be stopped with tradi?onal tools PrecisionAccess defeats this with no users compromised SSL nego?a?on Single laptop can DoS a server Very expensive to stop with tradi?onal tools PrecisionAccess defeats this with very liole effort Bandwidth consump?on > 100 s Gbps Cannot be stopped by do it yourself tools SDP scale out at AWS mi?gates Tbps DIY: WAF & Load Balancer DoS Protec?on Service PA 18

Na<onal Cyber Security Framework Device Attacks Internet Attacks Server Attacks File & Memory Protection Software Defined Perimeter Behavior Profiling Server FW+VPN Data Theft RAM Scraping Credential Theft Connection Hijacking Denial of Service Insider Threats Server Exploits 19 SDP Workshop Tuesday Sept 29 2015

Global Beverage Company Business Objec<ve: Minimize opera?onal costs and maximize flexibility Vidder SDP Solu<on: ü Secures partner employee access to the required apps ü Protects against DDOS and server vulnerability aoacks ü Brings visibility into which individuals are accessing which applica?ons, from where, and when ü Mi?gates creden?al the# and eases password management with transparent MFA ü Delivers a single solu?on for both web- based and fat applica?ons SDP Controller AWS SDP Gateway ERP Apps (SAP) Browser Supply Chain Partners Data Center SDP Workshop Tuesday Sept 29 2015

Chip Design Company Business Objec<ve: Accelerate chip design process by leveraging public clouds Vidder SDP Solu<on: ü Secures design engineers access to cloud- based environment at customer sites ü Single tenant SDP federates to each IAM ü Customer VPC enclaves not reachable from Internet ü Flexible SDP deployment enables dynamic customer use SDP Controller AWS VPC Enclave C VPC Enclave B Browser App App SDP Gateway Company B Company A VPC Enclave A Company C 21 SDP Workshop Tuesday Sept 29 2015

Global Automo<ve Company Business Objec<ve: Enable in field vehicle upgrades to retain customers and "sell" new features Vidder SDP Solu<on: ü Vehicle status delivered in a single SPA packet ü Provides a common access plaorm for apps regardless of where they are deployed: in internal data center or (mul?ple) cloud sites ü Op?mizes packet path to op?mize user experience SDPController AWS SDPGateway SDP Gateway SDP Workshop Tuesday Sept 29 2015

Closing comments SDP is really simple SDP supports a wide range of applica?ons SDP is a collabora?ve effort so join the team! 23 Internet 2 Technology Exchange 2015

Contact Informa<on Junaid Islam CTO Vidder junaid@vidder.com 24