Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI



Similar documents
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

End Point Security & Network Access Control

How To Protect A Network From Attack From A Hacker (Hbss)

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Network Access Security It's Broke, Now What? June 15, 2010

Network Access Control in Virtual Environments. Technical Note

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Total Protection for Compliance: Unified IT Policy Auditing

Network Access Control ProCurve and Microsoft NAP Integration

How To Use Cisco Identity Based Networking Services (Ibns)

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Bypassing Network Access Control Systems

Cisco TrustSec Solution Overview

ForeScout Technologies Is A Leader Among Network Access Control Vendors

Microsoft Windows Server System White Paper

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Industrial Security for Process Automation

Critical Security Controls

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Technical Note. ForeScout CounterACT: Virtual Firewall

HP Identity Driven Manager Software Series Overview

Technical Note. CounterACT: 802.1X and Network Access Control

Secure IP Address Management Layer 2 Network Access Control Solution

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities

The Protection Mission a constant endeavor

Bypassing Network Access Control Systems

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

SANS Top 20 Critical Controls for Effective Cyber Defense

» WHITE PAPER X and NAC: Best Practices for Effective Network Access Control.

Configure ISE Version 1.4 Posture with Microsoft WSUS

Sygate Secure Enterprise and Alcatel

Secure Networks for Process Control

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Verve Security Center

Ovation Security Center Data Sheet

Network Virtualization Network Admission Control Deployment Guide

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data at Rest Security in Navy/NMCI. Steven Gillis ONR Information Assurance Manager 10 January 2008

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU

Network Security Solutions Implementing Network Access Control (NAC)

Addressing BYOD Challenges with ForeScout and Motorola Solutions

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities

GE Measurement & Control. Cyber Security for Industrial Controls

Modular Network Security. Tyler Carter, McAfee Network Security

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

On-boarding and Provisioning with Cisco Identity Services Engine

Compliance series Guide to meeting requirements of USGCB

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT

White Paper: Consensus Audit Guidelines and Symantec RAS

Cyber Security for NERC CIP Version 5 Compliance

IBM Tivoli Endpoint Manager for Security and Compliance

INCIDENT RESPONSE CHECKLIST

InfoExpress Cyber Gatekeeper. How to quote? Günter Neuleitner. März 2009

Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

HP ProCurve Identity Driven Manager 3.0

Using IEEE 802.1x to Enhance Network Security

Penn State Wireless 2.0 and Related Services for Network Administrators

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

IBM Tivoli Endpoint Manager for Security and Compliance

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Chapter 1 The Principles of Auditing 1

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

UNCLASSIFIED. Trademark Information

Are you prepared to be next? Invensys Cyber Security

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

GE Measurement & Control. Cyber Security for NERC CIP Compliance

Patch Management SoftwareTechnical Specs

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

Did you know your security solution can help with PCI compliance too?

Introduction to Endpoint Security

Whitepaper. Securing Visitor Access through Network Access Control Technology

Securing BYOD With Network Access Control, a Case Study

Patch and Vulnerability Management Program

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Configure Posture. Note. Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.1 1

Transcription:

1 Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI Tom Lerach Head of IA, HP DoD Rajat Bhargava StillSecure October 2009

Agenda endpoint compliance with NMCI 2 Introduction to NMCI The IA challenge Next generation approach: closed loop endpoint compliance NAC Implementation battle Plan Current and future state Q & A

NMCI Overview The Navy Marine Corps Intranet (NMCI) is the world s largest purpose-built IP network: Standardized software, hardware, and infrastructure for more 700,000 Sailors, Marines and civilians at 620 locations. Four Network Operations Centers (NOCs) Approximately 375,000 seats More than 19,000 BlackBerry devices Approximately 2,000 wireless PC cards More than 100 million e-mail messages per month 3.4 terabytes of data throughput (1/3 the volume of the Library of Congress) per day NMCI Network Access Control Status HP Enterprise Services NMCI is much more than just a big network

NMCI Overview The Navy Marine Corps Intranet (NMCI) is the world s largest purpose-built IP network: Standardized software, hardware, and infrastructure for more 700,000 Sailors, Marines and civilians at 620 locations. Four Network Operations Centers (NOCs) Approximately 375,000 seats More than 19,000 BlackBerry devices Approximately 2,000 wireless PC cards More than 100 million e-mail messages per month 3.4 terabytes of data throughput (1/3 the volume of the Library of Congress) per day NMCI is much more than just a big network

C2 Concerns the New Normal Cyber war continues to escalate DOD required IA posture continues to be elevated, going deeper into the infrastructure (bios, chip sets), wider in scope to other services (W2.0, social networking) Key area of action is Vulnerability Management, and the configuration control on networked devices. NMCI has hardened the edge, has hardened the Boundary 1 4. How do we stop things before they get on the network, stop motion??? One key initiative for us: Network Access Control (NAC)

Closed loop endpoint compliance process 6

Flex testing + flex enforcement = full coverage in your network 7

SCAP the great equalizer? 8 SCAP efforts to standardize compliance NAC vs. vulnerability scanners vs. endpoint solutions standards eliminate tool differences Results can be compared and normalized Standardization of checks Which checks are required / not required Which ones are critical and how will they be tested Depth of testing misconfigurations, malware, etc. Checks created / validated by government control quality of tests StillSecure vision: SCAP compliant scan on connect will be model Vulnerability scanners will ultimately give way to scan on connect technology Test devices at point of entry and at time of greatest risk to the network Immediately remedy issues prior to potential for widespread outbreak Point in time testing and validation will go by the wayside Depth of testing will continue to increase more issues, more control, more risk mitigation StillSecure Safe Access SCAP support in process FDCC and XCCDF support Authenticated scanner Purpose built scan engine to be extended to include SCAP support

Open and standards based 9 Enterprise Integration Framework (EIF): A published open architecture Allows third-party systems to control Safe Access testing and quarantining functions Enables Safe Access to import/export endpoint security data with other IT systems EIF benefits: Leverages Safe Access quarantining and testing capabilities Leverages capabilities of other security-related systems Improves security, productivity, and efficiency with the IT environment Standards focused Common Criteria FIPS 140-2 Level 1 and 2 SCAP in process XCCDF / FDCC support

NMCI Safe Access deployment architecture 10

NAC Battle Plan NMCI is deploying an enterprise NAC solution consisting of: 802.1x authentication with machine based certificates Posture assessment w/remediation Layer 2 network access assignment Solution is based on DISA White Paper Network Access Control_Security At a Glance Draft version V1.R0.1 with enhancements. An overview of the 802.1x enforcement mode flow is below. Two key phases - passive and then active NAC Two key phases enterprise deployment of passive NAC with scanning/alarming enabled Complete. Pilot, then deployment of active NAC with quarantining (in process this year, py2010) 11 11/3/2009 NMCI NMCI IA NAC IA NAC

Current State passive NAC (all data is notional) SafeAccess NAC solution is employed for on-connect scanning IAV Compliance Security Application Compliance Host Based Security Suite (HBSS) and sub-modules Workstation Anti-Virus Targeted malicious files MD5 Filename/File Extension Registry Settings NAC reports: Negative findings for compliance Forwarded for mitigation Positive findings for targeted and malicious scans Input to SIM for correlation and investigation 20,000 15,000 10,000 5,000 20,000 15,000 10,000 5,000 HBSS / AV Results 200,000 Tested A/V HBSS HIPS Security Results 200,000 Tested Malware MD5 USB Stick Registry File 12 11/3/2009 NMCI IA NAC

Current State IAV (all data is notional) IAV Compliance Scans for all applicable JTF-GNO reported IA Vulnerabilites IAV Alerts (A), Bulletins (B), Technical (T) Consistent with SCCVI (eeye Retina) Output Provides multiple output formats for mitigation and tracking Calculates and trends vulnerabilities per machine Input into Security Information Manager (SIM) for correlation 13 11/3/2009 NMCI IA NAC 140,000 120,000 100,000 80,000 60,000 40,000 20,000 0 IAV Results 200,000 Tested 2009 A 9001 2009 A 9002 2009 A 9003 2009 A 9004 2009 A 9005 2009 A 9006 2009 A 9007 2009 A 9008 2009 A 9009 2009 A 9010 2009 A 9011 2009 A 9012 2009 A 9013 2009 A 9014 2009 A 9015 2009 A 9016 2009 A 9017 2009 A 9018 2009 A 9019 2009 A 9020

Next phase, Active NAC Objectives In FY10, the effort within NMCI will be a pilot deployment with the following objectives: Provide a managed device authentication function to authenticate managed devices using the IEEE 802.1X Port Based Network Access Control specification. Provide a non-managed device authentication function to authenticate nonmanaged devices (i.e., printers,etc) using MAC authentication. Provide logically separated VLAN s for repositing endpoints as part of the network admission process. The network admission function will support the movement of endpoint devices among the VLAN s during the various phases of access negotiation. Provide a network admission function management console that will allow authorized network operators to define and manage network access policy rules. Provide a notification and metric reporting function for endpoint devices, i.e. non-compliant systems quarantined for remediation, etc. Provide a mechanism whereby a user can self-initiate a policy assessment of his or her endpoint device to facilitate obtaining the latest patches and software updates on an NMCI workstation in order to avoid a disruption of service. An After Action write-up will be provided to the NMCI Program Office to facilitate analysis of the impact of this capability has on the day to day mission of the Navy. 14 11/3/2009 NMCI IA NAC

Future Implementation Managed Device Authentication Endpoints and access switches will be 802.1x enabled Today NMCI is Certificate Authority and all NMCI workstations are issued machine certificates; leveraged in solutions today on NMCI (WLAN, RRAS). Considering leveraging native.1x capability within the Windows OS for client. Unmanaged Device Authentication If endpoint does not have a supplicant, we will be authenticating through MAC Authentication Bypass (MAB). Feature supported within current switch fabric Have the switch vendor (Cisco) perform code rec for enterprise STIG Compliance Solution will seek to comply with current outlined STIG ID s. (NET-NAC-002: CAT II) The IAO/NSO will ensure the network access control policy limits access in the Policy Assessment VLAN to the policy assessment server only. Would request to combine Assessment and Remediation to minimize the time of movement and get systems to Production more quickly. (NET-NAC-004: CAT II) The IAO/NSO will ensure the network access control policy contains all nonauthenticated network access requests in an un-authorized VLAN that has access to no devices or networks. Considerations for option to support non-auth systems to be reposited to Guest VLAN Add l Challenges Whitelisting Policy for government accepted non-compliant hosts (traveling VIP s that have limited access to remediation systems, etc. Support for multiple authentication directories (certification stores). Ability to authenticate NMCI, OneNet, IT-21, DoD, etc. 15 11/3/2009 NMCI IA NAC

16 11/3/2009 NMCI IA NAC Questions?

Thank you! 17 Contact information: Tom Lerach Head of IA, HP DoD Rajat Bhargava President & CEO, StillSecure

18 11/3/2009 NMCI IA NAC Backup Slides

Managed Device Authentication NAC Process Flow 19 11/3/2009 NMCI IA NAC

Safe Access supports all key 802.1X functionality outlined in the DISA white paper to provide authentication of devices at Layer 2, before devices receive an IP Address. 802.1X enabled switches or other access points, challenge connecting devices for authentication information which is securely relayed to RADIUS authentication servers for authentication before an IP Address has been assigned. This prevents endpoint devices from posing any significant risk to the network. Authentication options include: unique User ID/Password AD domain User/Pass AD device membership (machine certificates) MAC Address authentication Machine authentication with NMCI certificates will use EAP-TLS, as shown below. Safe Access directs devices that pass or fail authentication to specific VLANs for special handling and restriction or remediation. 20 11/3/2009 NMCI IA NAC

Managed Device Authentication Endpoints use 802.1x supplicant All switch ports are 802.1x enabled After successful authentication, endpoint is placed in an assessment VLAN with ACL limiting access to: DHCP server SafeAccess Server Remediation services (Remedy, Radia, HBSS, SAV, etc.) If endpoint fails compliance test, SafeAccess will tag endpoint as unhealthy and force an 802.1x re-auth. After successful authentication, endpoint is placed in the remediation VLAN with ACL limiting access to: DHCP Server SafeAccess Server Remediation services (Remedy, Radia, HBSS, SAV, etc.) Upon successful remediation, SafeAccess will retest endpoint, tag it as healthy and force an 802.1x re-auth. After successful authentication, endpoint is placed in the production VLAN. If endpoint passes compliance test, SafeAccess will tag endpoint as healthy and force an 802.1x re-auth. After successful authentication, endpoint is placed in the production VLAN. 21 11/3/2009 NMCI IA NAC

Unmanaged Device Authentication If endpoint does not have a supplicant, it will be authenticated through supported feature of Cisco access layer switches, MAC Authentication Bypass (MAB). If device passes MAB authentication (e.g. a printer, CLIN 27), SafeAccess will place in VLAN specified by RADIUS server. If device fails MAB authentication, it will be placed in a restricted VLAN (802.1x guest VLAN, configurable per port) or the port will change back to the unauthorized state (802.1x un-auth state). Below is a process flow for an unmanaged device. 22 11/3/2009 NMCI IA NAC

HP Enterprise Services PROPRIETARY STATEMENT Contract No. N00024-00-D-6000 Electronic Data Systems Corporation 13600 EDS Drive, Herndon, Virginia 20171 This document contains commercial, confidential, and proprietary information of Electronic Data Systems Corporation (EDS). This information is to be used only within the Department of the Navy and only for the purposes specifically authorized in writing by EDS in connection with the performance of the NMCI Contract (Contract No. N00024-00-D-6000). Do not use, modify, reproduce, release, perform, or disclose this proprietary information (or any portion thereof) outside of the Department of the Navy without prior written authorization by the EDS Contracts Manager. This notice shall be marked on any authorized reproduction of this document, in whole or in part. 23 11/3/2009 NMCI IA NAC

Technology for better business outcomes HP 13600 EDS Drive Herndon VA 20171 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.