Der Weg, wie die Verantwortung getragen werden kann!



Similar documents
How To Protect Your Network From Attack From A Network Security Threat

Cisco Unified Computing Remote Management Services

Cisco Remote Management Services for Financial Services

Cisco Unified Communications Remote Management Services

Cisco TelePresence Select Operate and Cisco TelePresence Remote Assistance Service

Cisco Remote Management Services for Security

Remote Management Services Portfolio Overview

Managed Services. Business Intelligence Solutions

Cisco Network Optimization Service

Managed Security Services for Data

PRESIDIO MANAGED SERVICES OVERVIEW JULY 2013

Evaluating Internal and Outsourced Models for Network Monitoring

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Cisco Video Surveillance Services

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Architecture Overview

Vistara Lifecycle Management

ITSM Process Description

Cisco ASA 5500 Series Advanced Inspection and Prevention Security Services Module

MSP Service Matrix. Servers

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

SANS Top 20 Critical Controls for Effective Cyber Defense

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Vulnerability Management

CLOUD SERVICES FOR EMS

NetAid Services NETENRICH. Service at a Glance. IT as a Service Offering from NetEnrich. Delivering IT as a Service

Cisco Security IntelliShield Alert Manager Service

SERVICE LEVEL AGREEMENT

Spyders Managed Security Services

Managed Security Services

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support.

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

Cisco Advanced Services for Network Security

Payment Card Industry Data Security Standard

Injazat s Managed Services Portfolio

Dynamic Service Desk. Unified IT Management. Solution Overview

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Security. Security consulting and Integration: Definition and Deliverables. Introduction

HP and netforensics Security Information Management solutions. Business blueprint

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Cisco Remote Management Services Delivers Large-Scale Business Outcomes for Cisco IT

Address IT costs and streamline operations with IBM service desk and asset management.

IPS AIM for Cisco Integrated Services Routers

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Guardian365. Managed IT Support Services Suite

Managed Services. Mohammad Shakeer Sales Manager. Phone: URL:

How To Manage Your Information Systems At Aerosoft.Com

mbits Network Operations Centrec

Security Information Management (SIM)

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Network Management and Defense Telos offers a full range of managed services for:

Request for Proposal Technology Services Maintenance and Support

The Importance of Information Delivery in IT Operations

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No

Ensuring IP Telephony Performance Through Remote Monitoring

Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER

Cisco Security Optimization Service

Your Infrastructure. Our Responsibility.

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

Information Technology Services

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

Information Technology Solutions

Extreme Networks Security Analytics G2 Vulnerability Manager

ITIL Roles Descriptions

Information Technology Solutions. Managed IT Services

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

Statement of Service Enterprise Services - MANAGE Microsoft IIS

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Network Infrastructure Data Center Wireless Telephone Video Network Security Surveillance

Current IBAT Endorsed Services

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

<Insert Picture Here> Oracle Advanced Customer Support Services

PULSE SECURE CARE PLUS SERVICES

CA Service Desk Manager

Data Center Colocation - SLA

Problem Management: A CA Service Management Process Map

IBM Vulnerability Management Service

Statement of Service Enterprise Services - AID Microsoft IIS

Alcatel-Lucent Services

How To Use Ibm Tivoli Monitoring Software

Accelerate Your Transition to a Unified Computing Architecture

Get what s right for your business. Technologies.

McAfee Network Security Platform Administration Course

Proven deployments across different Industry verticals; Being used by leading brands

NOS for Network Support (903)

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint

Transcription:

Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1

Agenda Enterprise Security Threats & Challenges Cisco Remote Management Services Overview Cisco Security Remote Management Services Operational Approach Based on ITIL Framework Cisco IPS Signature Management Service Conclusion Why Cisco! 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 2

Enterprise Security Threats & Challenges Increasing the Business Impact of IT Business Objectives 1 2 Increasing Revenues and Opportunity Reacting in real time to customer and market demands Driving innovative products and services to market faster Increasing Business Resiliency and Agility Greater flexibility to use resources where and when needed Greater ability to interact with customers and partners as appropriate 3 4 Improving Customer Relationships Strengthening trust and confidence Building long-term business partner relationships Increasing Productivity, Efficiency While Reducing Costs Greater process efficiency, monitoring and reporting on activity Reduce the escalating costs of IT, achieving ROI expectations 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 3

Enterprise Security Threats & Challenges Chief Security / Information Officer Challenge Protect the business from security threats Improve security staff productivity Reduce total cost of ownership for network Dollars Security Requirements Pressure on resources, security requirements, and budget Cost Budget Time 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 4

Enterprise Security Threats & Challenges Constantly Evolving Network Driven by Innovation Enterprises Home Government Data Center Cable Wireless Everything Is Global a Point of Attack Everything Internet Must Be Defended ISP/ Backbones Mobile Financial Telecom Markets Network Is Global and Interconnected 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 5

Enterprise Security Threats & Challenges Evolution of Security Challenges Target and Scope of Damage Global Infrastructure Impact Regional Networks Multiple Networks Individual Networks Individual Computer Weeks 1st Gen Boot viruses Time From Knowledge of Vulnerability to Release of Exploit Is Shrinking Days 2nd Gen Macro viruses E-mail DoS Limited hacking Minutes 3rd Gen Network DoS Blended threat (worm+virus+trojan) Turbo worms Widespread system hacking Seconds Next Gen Infrastructure hacking Flash threats Massive worm driven DDoS Damaging payload viruses and worms 1980s 1990s Today Future 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 6

Agenda Enterprise Security Threats & Challenges Cisco Remote Management Services Overview Cisco Security Remote Management Services Operational Approach Based on ITIL Framework Cisco IPS Signature Management Service Conclusion Why Cisco! 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7

Cisco Remote Management Services Overview Cisco: Lifecycle Approach to Security Services Coordinated Planning and Strategy Make sound financial decisions Prepare Operational Excellence Adapt to changing business requirements Optimize Cisco Plan Assess Readiness Can your network support the proposed system? Partner Maintain Network Health Manage, resolve, repair, replace Operate Customer Design Design the Solution Products, service, support aligned to requirements Implement Implement Solution Integrate without disruption or causing vulnerability 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 8

Cisco Remote Management Services Overview Enterprise Support Options Outsourcing Out-Tasking Do it Yourself What 3rd party performs all network security functions 3rd party performs day-today management on selected network security components Customer performs all functions How Outsource entire network security function Typical: Monitoring, MACD, incident resolution, device updates Optional: optimization, system upgrades Buy/integrate tools Develop skills and organization Develop processes and knowledge base Benefits Focus on competitive differentiation Reduces network security staffing costs Competitive differentiation 24x7 access to security expertise Agility Control own destiny Leverage existing resources Pitfalls Loss of control Expensive (migration and governance costs) Risk in migration Loss of agility Governance overhead Possible lack of control Vendor skill depth Expensive, time-consuming Integration issues Ongoing skills training 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 9

CSI4 Cisco Remote Management Services Overview Remote Management Services Organization Deliver Cisco Remote Management Services Singular focus with a proven track record Experience in Remote Management Services Security, Foundation Technology, and Unified Communications Currently delivering Security Remote Management Services for VPN, Access Control, and Intrusion Prevention Highest customer loyalty levels within ROS Security services expertise Security capabilities built on Cisco Security Operations Center Approximately 3000 security devices under management Collect, analyze, remediate, and report on over 1.5 million network, security, and performance events every 5 minutes People Process Tools Knowledge 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 10

Folie 10 CSI4 I don't think we need the text I put in red What is SOC? should spell out Text in green is my change These will revert back to white once you approve Charlene Cisco Systems, Inc.; 04.10.2007

Cisco Remote Management Services Overview Services Portfolio Cisco Brand and CBR Security Unified Communications TelePresence Access Control Management Intrusion Management VPN Management IPS Signature Management Collaborative RMS Remote Management Call Manger Unity Select Operate Remote Assistance 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 11

Agenda Enterprise Security Threats & Challenges Cisco Remote Management Services Overview Cisco Security Remote Management Services Operational Approach Based on ITIL Framework Cisco IPS Signature Management Service Conclusion Why Cisco! 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 12

CSI5 Cisco Security Remote Management Services The Cisco Cisco Services Services for Security Portfolio Prepare Plan Design Implement Operate Optimize Cisco Security Remote Management Services Change Management Incident Management Incident Monitoring Operate Portal Release Management Cisco IntelliShield Vulnerability Alert Information Cisco SMARTnet Advance Hardware Replacement Software Support Advance Hardware Replacement Cisco.com 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 13

Folie 13 CSI5 Is there a reason why Advance Hardware Replacement is on the same level as IntelliShield? Cisco Systems, Inc.; 04.10.2007

CSI8 Cisco Security Remote Management Services Summary VPN Management Access Control Management Intrusion Prevention Technologies Routers Layer 3 Switches VPN Concentrators Firewalls ISRs ASAs Routers Layer 3 Switches Firewalls ISRs ASAs IDS IPS Routers w/ IOS/IPS Routers w/ NM-CIPS IDSMs ASAs w/ SSM-AIP Services Fault Monitoring Performance Monitoring Tunnel Monitoring Incident Management Change Management Configuration Management Fault Monitoring Performance Monitoring Incident Management Change Management Configuration Management Release Management Access Policy Reviews Fault Monitoring Performance Monitoring Incident Management Security Incident Response Change Management Configuration Management Release Management Tuning Metrics Availability Response to Logical MACs Response to Incidents Availability Response to Logical MACs Response to Incidents Audit Log and Policy Review Availability Response to Logical MACs Response to Incidents Security Event Metrics 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 14

Folie 14 CSI8 What are MACs? Cisco Systems, Inc.; 04.10.2007

Cisco Security Remote Management Services Access Control Management Service Features Incident Management Fault Monitoring and management Monitoring and management of security incidents through syslog Change and Release Management Access policy troubleshooting Configuration Management Regular configuration backups Configuration review every 6 months Service Benefits Coverage for the broad Cisco installed base in security Maximizes the value of Cisco security devices by insuring that they are operational and processing events correctly Saves time, money, and effort by helping customers scale their change processes 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 15

Cisco Security Remote Management Services Intrusion Prevention Service Features Incident Management Fault Monitoring and management Monitoring and management of security incidents Classification, investigation, isolation Impact assessment, notification, Recommendations Automatic blocking, shunning, TCP reset Manual shunning/update of access control Manual port configuration Change and Release Management Deployment of signature packs Lifecycle tuning of signature configuration Managed access control response to detected threat Service Benefits Coverage for the broad Cisco installed base in Security Helps customers understand the scope and impact of security incidents Provides customers with recommendations to assist in next-steps and preventing future incidents Reduces the noise generated by IDS/IPS devices by tuning over a customer s lifecycle Provides a real-time intelligent response to threats in the form of changes Customers have access to security expertise from Cisco at a monthly fee, reacting to threatening incidents for them 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 16

Cisco Security Remote Management Services Service Level Objectives Key Performance Indicator (KPI) KPI Details Cisco Security Access Control Remote Management Service Cisco Security Intrusion Prevention Remote Management Service Cisco Security Virtual Private Network (VPN) Remote Management Service MTTN Notify Customer of Fault, Performance or Security Incidents within X minutes 15 min 15 min 15 min MTTInv Investigate Fault & Performance Incidents within X minutes 30 min 30 min 30 min MTTBa Begin Analysis of Security Incidents within X minutes 30 min 30 min n/a MTTCa Complete Analysis and Provide Recommendations for Remediating Security Incidents within X minutes 75 min 75 min n/a MTTIso Isolate Root Cause of Fault & Performance Incidents within X minutes 75 min 75 min 75 min MTTR Resolve Fault & Performance Incidents within X hours P1: 4 hours P2: 24 hours P3: 72 hours P1: 4 hours P2: 24 hours P3: 72 hours P1: 4 hours P2: 24 hours P3: 72 hours Details included in the Cisco Security Remote Management Services Description 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 17

Agenda Enterprise Security Threats & Challenges Cisco Remote Management Services Overview Cisco Security Remote Management Services Operational Approach Based on ITIL Framework Cisco IPS Signature Management Service Conclusion Why Cisco! 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 18

Operational Approach Based on ITIL Process ITIL Foundation Your IT Organization Service Desk Management Reporting Configuration Management Cisco Problem Management Incident Management Change Management Release Management 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 19

Operational Approach Based on ITIL Process Incident Management Incident Detect Record Initial Notification Prioritize and Classify Investigate and Diagnose Resolve and Restore Functional and Hierarchical Escalations 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 20

Operational Approach Based on ITIL Process Incident Management - Monitoring Can Cisco reach the device? Incident Monitoring 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 21

Operational Approach Based on ITIL Process Incident Management - Monitoring Can Cisco reach the device? Is the device performing essential functions? Access Denied Traffic Detected Logs Received Alerts Received Proper Actions Taken System OK Access Denied Traffic Detected Incident Monitoring 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 22

Operational Approach Based on ITIL Process Incident Management - Monitoring What is the performance and capacity of the device? CPU 15% 10% Memory 26% 21% 31% Disk 55% 60% 50% Performance Monitoring Incident Monitoring 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 23

Operational Approach Based on ITIL Process Incident Management - Monitoring Monitor for evidence of security issues, and declare Security Incidents? Security Incident Security Incident Monitoring Performance Monitoring Fault Monitoring 011001100 110011001 100110011 001100110 011001100 110011001 100110011 001100110 011001100 110011001 100110011 001100110 011001100 110011001 100110011 001100110 011001100 110011001 100110011 001100110 011001100 110011001 Alarm! 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 24

Operational Approach Based on ITIL Process Incident Management - Monitoring 1. Start ticket via proactive incident alarm (alarm comes after verification) 2. Verify alarm 3. Correlate with other alarms occurring at same time 70% 25% 5% ----- (Reactive Support Starts Here) ----- 1. Generate ticket and notify customer 2. Ticket is picked up and analysis begins 3. Isolate and prioritize incident 4. Complete analysis or remediation (provide recommendation or perform resolution) Benign (noise) Attacks (true positives) Misuse (less than 5%) 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 25

Operational Approach Based on ITIL Process Configuration Management Daily Backups of Device Configurations Configuration #1 Configuration #2 Configuration #3 Configuration #10 Managed Component 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 26

Operational Approach Based on ITIL Process Change Management Accept Record Prioritize Categorize Your IT Organization Obtain Approval Plan and Schedule Implement 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 27

Operational Approach Based on ITIL Process Release Management Same day distribution of signature updates OS updates during next scheduled maintenance Ongoing tuning in response to events New Signatures or OS Available Updated 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 28

Operational Approach Based on ITIL Process Management Reporting Rate of Occurrence Threat Exposure 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 29

Operational Approach Based on ITIL Process Management Reporting Top 10 Types of Attack Top 10 Sources/ Destinations 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 30

Agenda Enterprise Security Threats & Challenges Cisco Remote Management Services Overview Cisco Security Remote Management Services Operational Approach Based on ITIL Framework Cisco IPS Signature Management Service Conclusion Why Cisco! 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 31

Cisco IPS Signature Management Service Service Features Overview Automatic Distribution of New Signatures New Cisco IPS signatures pushed to entitled* IPS devices with 24 hours of release Remote Signature Tuning Review applicable alarm activity for evidence of benign triggers within 2 weeks following signature distribution Implement filters for benign triggers to reduce benign alarms Notification Activities Notify Customer via email within 4 hours of the completion of signature distribution & tuning activities * Concurrent coverage by Cisco Services for IPS is required for successful push/distribution of signature updates to IPS solutions 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 32

Cisco IPS Signature Management Service Importance of Signature Tuning Analysis and careful tuning after every signature update results in more accurate event detection and effective protection What about new systems, new services, and evolving applications? Regular tuning helps intrusion prevention systems move at the speed of the business False Accept False Reject Optimal Time 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 33

Cisco IPS Signature Management Service Importance of Expertise Intelligent analysis means tuning the right signatures the right way; maximizing visibility and minimizing operational complexity Knowing the global threat environment and your business environment enables analysts and technicians to keep improving signature tuning Improve Develop IPS Signatures Analyze Deploy 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 34

Agenda Enterprise Security Threats & Challenges Cisco Remote Management Services Overview Cisco Security Remote Management Services Operational Approach Based on ITIL Framework Cisco IPS Signature Management Service Conclusion Why Cisco! 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 35

CSI20 Conclusion Why Cisco! Security Expertise Cisco Security Remote Management Services and Cisco IPS Signature Management Service leverage four centers of security expertise Cisco TAC Hardware/Software Support Cisco IntelliShield Security Intelligence Cisco IPS Signature Team Signature Development Cisco ROS Analysis and Correlation Deep expertise in data networking, IP Communications and Security Integrated into security product plans Integrated within Lifecycle Services methodology endto-end services 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 36

Folie 36 CSI20 delete across TS Cisco Systems, Inc.; 04.10.2007

CSI14 Conclusion Why Cisco! Focus on Customer Satisfaction Standardized ITIL-based processes drive consistent customer experience Cisco Security Remote Management Services include Service Level Objectives (SLO) SLO goals published on the Cisco Remote Management Portal I m very impressed with the level of ownership the entire technical team has taken with our account. Each experience that I have had, the technicians [were] very knowledgeable in their field. Everyone was dedicated to resolving the problem as if they were an employee. -IT Manager, IT Services Company 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 37

Folie 37 CSI14 changes in green Cisco Systems, Inc.; 04.10.2007

2008 Cisco Systems, Inc. All rights reserved. Cisco Public 38