Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net



Similar documents
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

ICANWK406A Install, configure and test network security

Network Access Security. Lesson 10

Achieving PCI-Compliance through Cyberoam

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

INTRUSION DETECTION SYSTEMS and Network Security

Unified Threat Management, Managed Security, and the Cloud Services Model

Chapter 9 Firewalls and Intrusion Prevention Systems

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

CMPT 471 Networking II

Industrial Security Solutions

Achieving PCI Compliance Using F5 Products

PCI Requirements Coverage Summary Table

Ovation Security Center Data Sheet

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Building A Secure Microsoft Exchange Continuity Appliance

MANAGED SECURITY SERVICES

Overcoming PCI Compliance Challenges

Goals. Understanding security testing

Network Virtualization Network Admission Control Deployment Guide

Cisco Advanced Services for Network Security

Retention & Destruction

Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader

Introduction of Intrusion Detection Systems

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Developing Network Security Strategies

Managed Security Services for Data

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Taxonomy of Intrusion Detection System

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

FIREWALLS & CBAC. philip.heimer@hh.se

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

RuggedCom Solutions for

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Fundamentals of Network Security Graphic Symbols

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Best Practices For Department Server and Enterprise System Checklist

GE Measurement & Control. Cyber Security for NERC CIP Compliance

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Cisco PIX vs. Checkpoint Firewall

SonicWALL PCI 1.1 Implementation Guide

Industrial Security for Process Automation

Lesson 5: Network perimeter security

INTRODUCTION TO FIREWALL SECURITY

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Gigabit SSL VPN Security Router

Architecture Overview

Managed Security Services

ADM:49 DPS POLICY MANUAL Page 1 of 5

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

INTRUSION DETECTION SYSTEM

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

IT Security and OT Security. Understanding the Challenges

Penetration testing & Ethical Hacking. Security Week 2014

Security Testing in Critical Systems

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Ovation Security Center Data Sheet

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

A Decision Maker s Guide to Securing an IT Infrastructure

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

GE Measurement & Control. Cyber Security for NEI 08-09

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

How To Protect A Network From Attack From A Hacker (Hbss)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Network/Cyber Security

74% 96 Action Items. Compliance

Payment Card Industry Data Security Standard

Security Technology: Firewalls and VPNs

IT Security. Securing Your Business Investments

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Additional Security Considerations and Controls for Virtual Private Networks

Alcatel-Lucent Services

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Introduction to Cyber Security / Information Security

8 Steps for Network Security Protection

Securing Cisco Network Devices (SND)

13 Ways Through A Firewall

Secure Networks for Process Control

How To Ensure The C.E.A.S.A

8 Steps For Network Security Protection

PCI Requirements Coverage Summary Table

IP Telephony Management

Transcription:

Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net

Security Security is recognized as essential to protect vital processes and the systems that provide those processes Security is not something you buy, it is something you do

What is Security? Security is no longer just controlling the perimeter or layered Transactions use all of the network, from DMZ to Database ALL of the network and resident systems have to be secured

What Securing All of the Enterprise Really Means.. Firewalls, routers, applications, passwords Intrusion detection NIDS and HIDS Proactive scanning, pen testing System Configuration Monitoring Health Checking VoiP, Wireless, Embedded Systems 24x7 Monitoring Analytical review and correlation Policies, Procedures, Personnel

What Is Effective Security Combination of appliances, software, alarms, and vulnerability scans working together in a wellthought out architecture Extends to policies, procedures, and people Monitored 24x7 Designed to support the security goals of the Enterprise

The Security Framework The Security Framework is a coordinated system of security tools Similar to the Enterprise management framework Extends end to end of the customer enterprise architecture Security data centrally monitored 24x7 in a Security Operations Center Data analyzed using correlation tools

Security Framework Considerations Mapped to the customer s architecture to provide end to end security Uses existing commercial and open source tools Leverages existing security infrastructure to quickly build out the security framework

Benefits of a Security Framework Provides Enterprise security that is : Consistent Constant Covers everything Characteristics of Good Enterprise Security are: Reliable Robust Repeatable

Benefits of a Security Framework (continued) An Effective Security Framework is: Monitored Managed Maintained This is the raison d être for a Security Framework

Security Frameworks Using the Framework Approach

Map Security Framework to Enterprise Architecture The Security framework follows structure of Open Systems Interconnect (OSI) 7-Layer Network Reference Model 1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

Additional Layers of the Security Framework The security framework adds the financial and political layer (8 & 9)

The Security Framework -- Physical Layer Physically secure and mange the cable plant Wiring closets WAN connections CSU/DSU Physically secure and control access to networking equipment Routers Hubs Switches Physically secure and control access to servers, mainframes Provide redundant power and WAN connections

The Security Framework-- Data Link and Network Layers VPNs protecting the links between networks Network Intrusion Detection Systems (NIDS) watching traffic for attacks Host Intrusion Detection Systems (HIDS) protecting connections to critical servers/hosts Virus scanning taking place on traffic coming in from outside the customer s network.

The Security Framework-- Network and Transport Layer Firewall performing stateful inspection of incoming and outgoing packets Router Access Control Lists (ACLs) filtering packets bound between networks Virus scanning of attachments at the e-mail gateways

The Security Framework-- Session, Presentation and Application Layers OS and application hardening at the system level Conduct security health checking to determine if security polices for types of applications allowed to run, password composition and length, services allowed on hosts, etc. are being followed Provide vulnerability scanning to test the configuration of applications and systems, looking for vulnerabilities, missing patches, etc. Conduct penetration tests to determine if machines can be exploited and privileged access gained

The Security Framework-- Presentation and Application Layers User account management on the network User account management on individual systems User account management for specific applications, RDBMS, etc. Virus scanning and updates on individual machines and user desktops Role & Rules Based Access Control (RBAC) PKI and digital certificates

The Security Framework-- Financial Layer Leverages existing security infrastructure to reduce costs Provides an operational framework for conducting regular security checks Lends itself to outsourcing to a managed security service provider New technologies can be incorporated into the security framework Security costs are easier to identify, budget, and control.

Security Framework the Political Layer Provides a platform to align security with business goals just as enterprise system management normalizes the enterprise Framework is extensible to and modular, flexible to meet changing business objectives.

Security Frameworks A More Detailed Technical Look

Mapping Security Framework Components to the Architecture Security Component Service Delivery Center (SDC) Virtual Private Networks (VPN) Architecture Layer Layer 1 - Physical Layer Layer 2/3 Data Link and Network Layers Architecture Component Description The Data Center controls physical cable pant connecting architecture together in a network. Provides physical security to networking components and hardware. Provides physical security to server hardware. Redundant power and WAN connections. VPN tunnels encrypt data flowing over the data link to protect it from outside scrutiny. Bit stream is encrypted, sent over the wire, and unencrypted at the far end. Network Intrusion Detection (NIDS) Host Intrusion Detection Layer 2/3 Data Link and Network Layers Layer 2/3 Data Link and Network Layers Monitor network traffic and system logs to compare what's happening in real-time to known methods of hackers. When a suspicious event is detected, an alarm is kicked off. In addition the Intrusion Detection system may suspend or drop the offending connection, all while recording as much information as possible HIDS Sensor scans bit streams as they reach the host system to match patterns and signatures that are indicative of an attack against the host or its applications. When a malicious pattern is detected the HID sends out an alert.

Mapping Security Framework Components to the Architecture Security Component Architecture Layer Architecture Component Description Virus Scanning Layer 2 & 3 Data Link and Network Layers Virus canning software looks at bit streams flowing across data link to match signature patterns that indicate malicious code and viruses. Firewalls and firewall appliances Routers Layer 3 & 4 Network and Transport Layers Layer 3 & 4 Network and Transport Layers A device or software that blocks Internet communications access to a private resource. The resource can be a network server running a firewall as an application or an appliance with firewall application running as firmware. Use Cisco IOS to create access control lists (ACLs) to filter IP packets. ACLs on routers can shape traffic and restrict traffic flow between network segments. IP address schemes can segment the architecture by network, making ACLS and firewalls rules easier to manage. Virus scanning of attachments Layer 3 & 4 Network and Transport Layers Virus scanning software opens attachments entering and leaving the network to check for patterns and signatures the would indicate malicious code.

Mapping Security Framework Components to the Architecture Security Component Legacy Access Control Architecture Layer Layer 5 Session Layer for Legacy systems Architecture Component Description Mechanisms used by legacy systems to control access to secure resources. These can include RACF, Top Secret, ACF2 and NT Domain Security. Legacy access controls can also be used as part of credential synchronization (single sign-on) systems. OS & system Hardening Layer 5, 6, 7 Session, Presentation, Application Layers Process of ensuring OS patches are up to date, unnecessary services are turned off, unneeded applications and tools are removed, and applications are patched. Vulnerability Scanning Layer 5, 6, 7 Session, Presentation, Application Layers Tool to scan for vulnerabilities, missing patches, new known vulnerabilities and exploits. Tools are updated regularly from CERT advisories, bug lists, and new exploit notices. Vulnerability Assessment Layer 5, 6, 7 Session, Presentation, Application Layers Team of trained ethical hackers attempt to gain access to target machine, simulating a real world attack as a malicious intruder would to test the security architecture.

Mapping Security Framework Components to the Architecture Security Component Architecture Layer Architecture Component Description User account management on the network Layers 6 & 7, Presentation and Application Layers Managing user accounts on and access to the network. Uses Network NOS, Active Directory, LDAP, etc. to authenticate. User account management on systems Layers 6 & 7, Presentation and Application Layers User account management on individual system. Management of privileged accounts, separation of duties between administrators User account management on applications Layers 6 & 7, Presentation and Application Layers Manage access to software and applications such as RDBMS, etc. Virus scan engine and signature updates Layers 6 & 7, Presentation and Application Layers Updates to anti-virus applications, scan engines, virus signatures, etc.

Mapping Security Framework Components to the Architecture Security Component Architecture Layer Architecture Component Description PKI & Credential Management Layer 6 & 7 Presentation and Application Layers Provides capabilities for the management of user credential information. This information can be a user id, password, PKI, digital certificate or biometric information. Role Based Access Control (RBAC) Layer 6 & 7 Presentation and Application Layers The security engine responsible for definition and decision making around all security policies. Applications delegate security decision making to the security engine. This delegation occurs through existing security extension points within the application domain. Security is seamless and non-intrusive from the application's point of view Security Operations Center (SOC) Layer 8 - Financial Layer 24 x 7 security management using SOC to manage and monitor security architecture. Ensures real time monitoring of the security of the network.

Mapping Security Framework Components to the Architecture Security Component Using Existing Security Infrastructure Architecture Layer Layer 8 Financial Layer Architecture Component Description Security tools, connections, trained personnel are leveraged to provide security services and build a security framework for less than the cost to duplicate the same services as point security solutions Provides an operational framework for regular security checks Layer 8 Financial Layer Security becomes part of the enterprise operations, providing consistent security management in the same fashion as enterprise system management. In the same way, the security framework reduces the total cost of security. Lends itself to outsourced managed security services Layer 8 Financial Layer A security framework can be implemented by using managed security services that build, monitor, and manage security across the enterprise.

Mapping Security Framework Components to the Architecture Security Component Extensible to new networks and technologies Architecture Layer Layer 8 Financial Layer Architecture Component Description As network grow and merge, the framework can extend into these new segments. New technologies such as wireless, VoIP, smart HVAC systems can also be managed and monitored by the security framework. Security cost are more predictable Layer 8 Financial Layer The cost of providing security becomes more predictable and manageable. Security costs are consolidated into the framework, facilitating budget and planning. Provides a platform to align security with business goals Security Framework is modular, quickly extensible Layer 9 Political Layer Layer 9 Political Layer Security framework can be used to manage security consistently to meet business goals just as the enterprise system management manages the IT infrastructure to meet the company objectives. If new technology such as wireless networks are adopted, security controls can be added to the framework to manage the new initiatives. Networks added through acquisitions can be quickly added to the security framework.

Security Framework by Services Application Presentation Session Transport Network Data Link Wiring closets, cable plant, building access control, power, HVAC Physical

Security Framework by Services Application Presentation Session Transport Network Data Link NIDS, HIDS Virus Scanning Physical

Security Framework by Services Application Presentation Session Transport Network Firewall, Routers, Access Control Lists (ACLs), IP schemes, E-Mail Attachment Scanning Data Link Physical

Security Framework by Services Application Presentation OS Hardening, Security Health Checking, Vulnerability Scanning, Pen-Testing, Session Transport Network Data Link Physical

Security Framework by Services Application Presentation User Account Management on Systems, Role/Rule Bases Access Control, Application Security, Virus Updates, Virus Signatures Session Transport Network Data Link Physical

Security Frameworks - Summary To sum it all up Security Frameworks provide end to end security from the DMZ to the Database Security is managed and monitored consistently and continually The security framework becomes the technology that turns security policies into practice New technologies and new networks can plug into the security framework Security costs become more predictable and manageable

Security Frameworks More Q/A Questions?