Network Security Stripped. Trends for 2009. from layered technologies to bare essentials



Similar documents
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Perspective on secure network for control systems in SPring-8

End Point Security & Network Access Control

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Campus LAN at NKN Member Institutions

Network Virtualization Network Admission Control Deployment Guide

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Achieving PCI-Compliance through Cyberoam

IPv6 Transport Support and Market Segmentations

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

CISCO IOS NETWORK SECURITY (IINS)

All You Wanted to Know About WiFi Rogue Access Points

Recommended IP Telephony Architecture

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

Gigabit SSL VPN Security Router

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Policy Management: The Avenda Approach To An Essential Network Service

(d-5273) CCIE Security v3.0 Written Exam Topics

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

IINS Implementing Cisco Network Security 3.0 (IINS)

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Network Security IPv4 + IPv6

PCI Wireless Compliance with AirTight WIPS

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Security Technology White Paper

Implementing Cisco IOS Network Security

Best Practices for Securing IP Telephony

Tim Bovles WILEY. Wiley Publishing, Inc.

Gigabit Content Security Router

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Securing Cisco Network Devices (SND)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Best Practices for Outdoor Wireless Security

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer


Securing end devices

RuggedCom Solutions for

Chapter 1 The Principles of Auditing 1

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

CTS2134 Introduction to Networking. Module Network Security

CompTIA Security+ (Exam SY0-410)

VLANs. Application Note

RAP Installation - Updated

8 Steps For Network Security Protection

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Security Awareness. Wireless Network Security

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Gigabit Multi-Homing VPN Security Router

Lecture 02b Cloud Computing II

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

SonicWALL PCI 1.1 Implementation Guide

Lucent VPN Firewall Security in x Wireless Networks

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Avaya G700 Media Gateway Security - Issue 1.0

Sophos Certified Architect Course overview

UTM10 in multi-ssid, multi-vlan network with WMS5316. Network diagram

Protecting and controlling Virtual LANs by Linux router-firewall

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network security strategy to meet new threats and simplify IT security operations

Payment Card Industry (PCI) Data Security Standard

Chapter 8 Security Pt 2

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

How To Sell Security Products To A Network Security Company

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

PROFESSIONAL SECURITY SYSTEMS

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Security Considerations in IP Telephony Network Configuration

Network Access Control ProCurve and Microsoft NAP Integration

Section 12 MUST BE COMPLETED BY: 4/22

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

Network Security. Topology. Spring This is the logical topology of the network environment used for testing.

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Cisco Certified Security Professional (CCSP)

PART D NETWORK SERVICES

Cisco Nexus 1000V Switch for Microsoft Hyper-V

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Joshua Beeman University Information Security Officer October 17, 2011

Firewall Security. Presented by: Daminda Perera

Comprehensive LAN Security: A Business Requirement

Secure Networks for Process Control

Networking for Caribbean Development

How to build a security assessment program. Dan Boucaut

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives

Architecture Overview

Penn State Wireless 2.0 and Related Services for Network Administrators

Avaya TM G700 Media Gateway Security. White Paper

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

8 Steps for Network Security Protection

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Cisco Secure PIX Firewall with Two Routers Configuration Example

The Future Of The Firewall

Transcription:

Network Security Stripped from layered technologies to bare essentials Jennifer Jabbusch, CISSP, HP MASE, JNCIA AC Carolina Advanced Digital, http://cadinc.com Trends for 2009

This presentation contains technical information not included in the slide presentation. If you did not hear the presentation live you re missing all the good stuff. Sorry.

About Us For over 25 years, Carolina Advanced Digital, Inc. has offered the highest level of engineering expertise in support of all enterprise sectors. Serving government, education and commercial customers, CAD focuses on IT infrastructure, security and management. Thecompanyhelps customers guard their core network, ensuring network security and availability of critical data. Find us at http://cadinc.com.

About Us

About Us Jennifer has over 15 years experience working in various areas of the technology industry. Most recently, Ms. Jabbusch has focused in specialized areas of infrastructure security, including network access control, 802.1X and wireless security technologies. Jennifer has consulted for a variety of government agencies, educational institutions and Fortune 100 and 500 corporations. In addition to her regular duties, Jennifer participates in a variety of courseware and exam writings and reviews, including the official (ISC)2 CISSP courseware.

What We re Doing What am I telling you?

What I m telling you How to leverage security features you have and start down a holistic security path.

What We re Doing Why am I telling you this?

Why I m telling you You have goals. You have bosses. We want to help.

What We re Doing Why hasn t someone else told you this?

Why they haven t told you They want to sell you stuff. If you don t buy more stuff, their bosses get mad.

Why they haven t told you But, we don t care about their bosses.

What we ll be covering The Business of Security understanding goals and options Back to Bare Essentials working towards holistic security Tapping into Technologies ways to leverage what you have Getting Started ideas to get you going

The Business of Security

The quest for goals, smart use of resources and ways to keep your bosses boss happy.

Moving toward a goal Agency IT Department Your Team Your Projects Regulations Security Compliance Customer Serving Public Inter agency

Moving toward a goal Agency IT Department Your Team Your Projects

Focus on resources Bigger focus on Budget using resources wisely Assets Agency Staff Time

Focus on resources Adapt for the Budget resources available Assets Agency Staff Time

Focus on resources Balance what s Budget missing with what s abundant Assets Agency Staff Time

Current projects What are you working on now and in the next 12 months?

Ways to meet goals Options Buy some more stuff Use what you have Get someone else to do it

For your projects Which one are you planning to do? And why?

What we re buying There are plenty of manufacturers and vendors that would like your money.

NAC Endpoint Security Enhanced AV Guest Solutions Wireless Security Firewalls/IDS Data Leakage ID Management SIEM Encryption They want us to buy all this

Side effects of new stuff Training Budget Services Resources For staff and end users To buy new products For install, configure & support Manage and maintain

Side effects of new stuff What s the real TCO involved with new products?

Balancing the real TCO TCO + TCO

The question Is buying new stuff the solution?

The answer Probably NOT

For your projects Would you use what you have if that were an option?

Back to Bare Essentials

The quest for holistic network security and the realization of ignorance.

Using what you have Leveraging Leveraging built in features Retooling Retooling the infrastructure Designing Designing for security from the start

Leveraging what you have Use features and tools built in to the products you have.

Retooling the infrastructure Reengineer the network for security and availability.

Design for security early Architect security into solutions at the start.

Holistic security snippets Access Control 0 Day User Control Management Using switches instead of NAC Using sflow instead of IDS Using directories instead of overlays Using effective logging and reporting

A simple concept It seems so simple, so why aren t more people doing it?

Holistic holdbacks There are several common factors that prevent IT departments from effectively using what they have.

Holistic holdbacks Under staffing and high turnover are problems Staff Skill May not have necessary skills in house Redesign and training is time consuming Time

Holistic holdbacks Awareness of current environment Documentation Complexity Complicated vendor specific features Pulling pieces together for an integrated solution Integration

Holistic holdbacks Not knowing what products and solutions you have Ignorance Understanding The overall goals and objectives Getting buy in from management Management

Tap Into Technologies

The quest for finding added functionality in your current stuff so we don t have to buy new stuff.

Tapping what you have Switch Firewall Encryption Management Coming Soon

Here are slide references to the cool stuff you missed, including the new 802.1X REV overview

Switches and wireless VLANs (Virtual LANs) Switch Not new Protects by segregating network traffic Lets you logically segment and secure instead of physically separating

Switches and wireless 802.1X Port Security Switch Also not new Protects unauthorized users from connecting to a port or wireless SSID Uses standard communication to lock ports until the user is authenticated

Switches and wireless MAC Lockdown (Port Security) Switch Protects unauthorized devices from connecting Statically set or dynamically learns allowed MACs

Switches and wireless Switch Dynamic IP Lockdown (IP Source Guard) Protects from statically set IP addresses Tracks DHCP results to match IP to MAC port VLAN

Switches and wireless Switch Source Port Filtering (Protected Ports) Protects devices from communicating directly Similar to wireless communication segregation for endpoints

Switches and wireless DHCP Snooping Switch Protects from rogue DHCP servers Maps known servers with its MAC address to an assigned port

Switches and wireless Dynamic ARP Protection/Inspection Switch Protects from ARP cache poisoning ARP matches MAC to IP Sees spoofed MAC addresses and ARP flood attacks

Switches and wireless Dynamic Port Mirroring Switch Not direct security feature Lets you offload traffic for security inspection with low overhead

Switches and wireless Other monitors Monitor for port scanning by watching for packets sent to closed TCP/UDP ports Monitor for DoS attacks from IP flooding by watching for a volume of new learned Ips Monitor for viruses by watching for sudden increase in ARP requests Monitor for other DoS attacks by monitoring system resources

Switches and wireless Other monitors Monitor for management intrusion by watching for failed logins Monitor for other attacks by watching for excessive or unexpected events new or moving MAC addresses and IP addresses, system resources

Switches and wireless Switch VLANs 802.1X MAC Lockdown Dynamic IP Lockdown Source Port Filtering DHCP Snooping Dynamic ARP Protection Dynamic Port Mirroring Other Monitoring

Tapping what you have Switch Firewall Encryption Management Coming Soon

Firewall, UTM and IDS Firewall

Firewall, UTM and IDS Gateway Security and UTM Firewall Use built in anti virus and anti spyware for an added layer of protection without a separate appliance Use integrated IDS/IPS instead of purchasing an additional solution

Firewall, UTM and IDS Application Security Firewall Use a firewall to apply application access control up to layer 7 Add security by using encrypted VPN connections on the LAN to access sensitive data

Firewall, UTM and IDS Network Segregation Firewall Use firewall logical zones and routes for segregation of LAN traffic

Firewall, UTM and IDS Inspection Firewall Offload or mirror internal network traffic to your firewall or IDS for further inspection to supplement NBAD

We re really gettin crazy now!

Tapping what you have Switch Firewall Encryption Management Coming Soon

Encryption Encryption

Encryption Data Protection Encryption Use encryption to secure sensitive data on endpoints and storage

Encryption Key Management Encryption Used your encryption product for centralized key management Map to your user directory for added security and reduced management Use single product for FDE, removable media, mail and other applications

Tapping what you have Switch Firewall Encryption Management Coming Soon

Management Management

Management 0 Day Protection Management Use integrated tools for NBAD (network behavior anomaly detection) Collect sflow/netflow from switches and wireless to see real time problems

Management Inventory Management Use current management systems such as patching and anti virus servers for asset inventory Use inventory reports to identify unpatched and unhealthy devices

Management Event Correlation Management Use built in management, search tools or syslogs for event correlation Data can be used for compliance reporting and change management

Management Log Management & Reporting Management Use a central log server or search tool for all your network devices, instead of manufacturer specific products

Tapping what you have Switch Firewall Encryption Management Coming Soon

Coming Soon Coming Soon

Coming Soon 802.1X REV Coming Soon Revision of 802.1X to incorporate 802.1AE, 802.1af and other security features Look for the standard release in Q1 2009

Coming Soon 802.1AR Coming Soon Device identity Look for the standard release in Q1 2009

Coming Soon TNC IF MAP Coming Soon Framework for sending endpoint health status to a centralized server Offers NAC like integrity functions without a specific vendor solution Look for more adoption in 2009

Getting Started

Embarking on the quest for integrated security

Learning to leverage Strategies for getting started with what you have.

Training for staff Classroom Lab Webcasts Online Conference sessions

Vendor assistance From manufacturer Pre or Post sales SE Pro services Bundle with product

Consultant or integrator Your choice Integrated assistance Objective 3 rd party Flexible

Staff and contractors Staff may have expertise on a topic Find self motivators with interests in the solutions you need

User groups Product user groups Peer user groups Industry associations Conferences

Bang for your buck ROI Training Vendor Consultant COST Staff User groups

The final frontier. Getting the buy in from management.

Selling a holistic approach Devices, software, licenses, contracts and personnel Survey See what s been purchased and rate effectiveness

Selling a holistic approach Needs, goals and projects See where you can leverage what you have Identify

Selling a holistic approach Find the ROI for leveraging technologies instead of products Factor in TCO of product vs longterm investments in staff Monetize Put it in terms of dollars &cents

Selling a holistic approach The key is to understand the bottom line

Selling a holistic approach What is the bottom line?

A dollar saved is a dollar you can spend on some other super cool geeky toy.

Recap

A super quick review of the last 100 slides.

Seven steps to remember Understand Survey Identify Strategize Supplement Sell It Succeed 1 2 3 4 5 6 7

This is where I took a bunch of crap out

Seven steps to remember If you follow these steps, you will reach a state of security Zen

Disclaimer *The preceding statements have not been approved by IEEE, TNC, IETF, the FDA, the FAA or the FBI. Please consult your doctor before attempting these, or any other regimens to reach security Zen. Neither CAD, the conference management, or the presenter will assume responsibility, explicit or implied, for the use of this material in reaching security Zen. Please proceed at your own risk.

Thank you.

Carolina Advanced Digital, Inc. http://cadinc.com