Security Orchestration with IF-MAP



Similar documents
Security Coordination with IF-MAP

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

Network Access Control (NAC) and Network Security Standards

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Trusted Network Connect (TNC)

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge

IF-MAP Overview. Jan Ursi Technical Director EMEA Infoblox Inc. All Rights Reserved.

Unified Security TNC EVERYWHERE. Wireless security. Road Warrior. IT Security. IT Security. Conference Room. Surveillance.

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

The Importance of Standards to Network Access Control

Trusted Network Connect (TNC) 4th European Trusted Infrastructure Summer School August / September 2009

SANS Top 20 Critical Controls for Effective Cyber Defense

Sygate Secure Enterprise and Alcatel

Secure Cloud-Ready Data Centers Juniper Networks

IF-MAP Use Cases: Real-Time CMDB, and More

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

Defending Against Data Beaches: Internal Controls for Cybersecurity

Trust: When Physical and Logical Security Worlds Collide

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Critical Security Controls

Network Access Security It's Broke, Now What? June 15, 2010

Netzwerkvirtualisierung? Aber mit Sicherheit!

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

IBM Tivoli Endpoint Manager for Security and Compliance

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Policy Management: The Avenda Approach To An Essential Network Service

Trusted Network Connect (TNC)

Bypassing Network Access Control Systems

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Best Practices for Outdoor Wireless Security

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

IBM Endpoint Manager Product Introduction and Overview

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Protecting the un-protectable Addressing Virtualisation Security Challenges

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Connect with Addressing Intelligence to Automate IPv6 Planning, Transition & Cyber Security

BMC Client Management - SCAP Implementation Statement. Version 12.0

A viable SIEM approach for Android

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

» WHITE PAPER X and NAC: Best Practices for Effective Network Access Control.

How To Manage A System Vulnerability Management Program

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

CONTINUOUS MONITORING IN FEDERAL AGENCY NETWORKS

Network Access Control in Virtual Environments. Technical Note

Network Access Control (NAC)

Intro to Firewalls. Summary

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Chapter 9 Firewalls and Intrusion Prevention Systems

Endpoint Security More secure. Less complex. Less costs... More control.

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Introduction to Cyber Security / Information Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

INSERT COMPANY LOGO HERE

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

McAfee Security Architectures for the Public Sector

New Security Perspective for Virtualized Platforms

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

How To Use A Policy Auditor (Macafee) To Check For Security Issues

How To Monitor Your Entire It Environment

Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, :00PM EST

Towards End-to-End Security

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Network Security Requirements and Solutions

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network security strategy to meet new threats and simplify IT security operations

Discover and Manage Your Network Perimeter

How To Manage Security On A Networked Computer System

Readiness Assessments: Vital to Secure Mobility

McAfee Server Security

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

security changes with Orange focus on your business, we focus on your security

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Managed Security Services

Security Compliance and Data Governance: Dual problems, single solution CON8015

Open Source Software for Cyber Operations:

SourceFireNext-Generation IPS

COORDINATED THREAT CONTROL

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

How To Buy Nitro Security

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Payment Card Industry Data Security Standard

1518 Best Practices in Virtualization & Cloud Security with Symantec

CTS2134 Introduction to Networking. Module Network Security

Cisco & Big Data Security

Obtaining Enterprise Cybersituational

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Transcription:

Security Orchestration with IF-MAP Gary Holland, Lumeta/IMRI 2 November 2011 Copyright 2010 Trusted Computing Group

Agenda Threat Landscape and Federal Networks Trusted Network Connect Explanation of IF-MAP What is IF-MAP? What problems does IF-MAP address? How does IF-MAP solve those problems? SCAP & TNC/IF-MAP Use cases IF-MAP Adoption Summary Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #2

Cyber Threat Sources & Trends National Governments Terrorists Industrial Spies Organized Crime Groups Hacktivists Hackers Malware Botnets Cyber warfare Threats to VoIP and mobile devices The evolving cyber crime economy Sources: US-CERT http://www.us-cert.gov/control_systems/csthreats.html; GTISC Emerging Cyber Threats Report for 2012 http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #3

Trusted Network Connect & IF-MAP Open Architecture for Network Security Completely vendor-neutral Strong security through trusted computing Open Standards for Network Security Full set of specifications available to all Products shipping for more than five years Developed by Trusted Computing Group (TCG) Industry standards group More than 100 member organizations Includes large vendors, small vendors, customers, etc. Classic NAC Coordinated Security Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #4

What is IF-MAP? Open Standard for Security and Network Orchestration First published in May 2008 by the Trusted Computing Group Industry consortium including most large IT vendors Freely available for anyone to implement Growing base of vendor and product support Shared database for information on network devices, their state, and their activities A clearing house for information on IP devices and systems Aggregates real-time information from many different sources Both standard data types and vendor-specific extensions Designed to scale for machine-to-machine coordination Formal IF-MAP certification program will be available later this year Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #5

Coordinated Security with IF-MAP Asset Management System Endpoint Security (via NAC) SIM / SEM MAP IPAM IF-MAP Protocol Physical Security ICS/SCADA Security AAA Routing Server or IDS Switching Wireless Firewalls Cloud Security Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #6

Physical/Network Security Orchestration Run Video http://www.if-map.org/ Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #7

IT/Business Challenges Addressed by IF-MAP Network and Endpoint Visibility Situational Awareness - Who and what s on my network and what is the appropriate response to their presence? Advanced Network Security Policy Enforcement Easily leverage attributes previously difficult to access to make real time access decisions Location, role, device type, OS, device vulnerability status, physical security status, event logs, application information Security Automation/Orchestration Automate audit of security controls across a full suite of tools Validate remediation efforts Systems Interoperability & Data Integration Accuracy of CMDB content for networked assets? Share real-time information about network events, users, devices, threats, etc. Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #8

Security Content Automation Protocol SCAP combines a common set of standards that are used to enable automated identification, measurement and scoring of vulnerabilities to ultimately minimize endpoint attack surfaces.. *http://csrc.nist.gov/publications/nistpubs/800-126/sp800-126.pdf Languages - The SCAP languages provide standard vocabularies and conventions for expressing security policy, technical check mechanisms, and assessment results. Enumerations- Each SCAP enumeration defines a standard nomenclature (naming format) and an official dictionary or list of items expressed using that nomenclature. For example, CVE provides a dictionary of publicly known information security vulnerabilities and exposures. Vulnerability measurement and scoring systems. In SCAP, this refers to evaluating specific characteristics of a vulnerability and, based on those characteristics, generating a score that reflects the vulnerability s severity. Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #9

TNC/IF-MAP and SCAP Together Access Requestor (AR) Policy Enforcement Point (PEP) Policy Decision Point (PDP) Metadata Access Point (MAP) Sensors, Flow Controllers IF-IMC SCAP Client Software IF-IMV SCAP Analysis Software IF-MAP SCAP External Scanner TNC handles the networking and network integration and SCAP handles compliance ---IF-IMC & IF-IMV designed for adding new device checks into TNC Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #10

SCAP Implementations Federal Desktop Core Configuration Federal Information Security Management Act? Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #11

Why Consider IF-MAP Standardization & Adoption? Agencies & Vendors benefit from Security Automation in multi-vendor environments Agencies leverage existing IT investments with interoperability; improve information sharing with standardized data Procurement & Gov t IT Leadership drive standards adoption among vendors Product integration costs & time greatly reduces through standards-based interoperability Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #12

Many New Applications are Emerging Cyber/Physical (CyPhy) Convergence IT Automation Cloud Computing Don t allow users to connect to the network if they haven t badged into the building Track the location and status of all IT assets (IPs, MACs, devices, hardware, VMs, apps, users, etc.) in real time Federate authentication and authorization status across private & public clouds Don t allow a wireless device to connect if its located outside of the building Allocate assets on the fly, dynamically re-provision data centers Move computing workloads to the cloud when prices drop Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #13

Use Case Quarantine a Leaking Device Challenges: Manage network change Fight insider threats Ensure security policy compliance Enforce network segmentation Consequences: Policy violations Unauthorized, unsecure network connections Worms, viruses, hackers, insider threat Inhibited situational awareness Solution: Lumeta IPsonar s Network Leak Discovery Enable organizations to detect unknown, unauthorized and unsecure network connections Juniper Networks Unified Access Control Automatically and securely remediate the situation Integrated network defense via TNC Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #14

Policy Violation Leaking Device Access Requestor Policy Enforcement Point Policy Decision Point Metadata Access Point Sensors and Flow Controllers Remediation Network!!!! NAC Policy No Network Leak Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #15

Lumeta s IF-MAP Client Lumeta is currently a contributing member of TNC Participate in TNC and IF-MAP specification development Co-chair TNC adoption sub-group Beta IF-MAP client fall 2008 No significant development time or costs IPsonar versions 4.5 and on contain IF-MAP client GA in August of 2009 Enables delivery of IPsonar Discovery events for automated remediation Significant interest with Government Clients Integrated network defense solution with Juniper Networks Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #16

IF-MAP Adoption Access Requestor Policy Enforcement Point Policy Decision Point Metadata Access Point Sensors, Flow Controllers Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #17

What About Open Source? Lots of open source support for TNC University of Applied Arts and Sciences in Hannover, Germany (FHH) http://trust.inform.fh-hannover.de tnc@fhh - the open source TNC implementation. ISC DHCP - the open source DHCP implementation. Nagios - the industry standard in IT infrastructure monitoring. Snort - the open source network intrusion prevention and detection system. netfilter/iptables - the packet filtering framework inside the Linux 2.4.x and 2.6.x kernel series. omapd IF-MAP Server http://code.google.com/p/omapd IF-MAP Client Code http://ifmapdev.com/ Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #18

For More Information TNC Web Site Technical http://www.trustedcomputinggroup.org/developers/trusted_network_connect Business http://www.trustedcomputinggroup.org/solutions/network_security TNC-WG Co-Chairs Steve Hanna Distinguished Engineer, Juniper Networks shanna@juniper.net Paul Sangster Chief Security Standards Officer, Symantec Paul_Sangster@symantec.com Copyright 2010 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #19

Thank you! Trusted Computing Group Confidential