31
Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Embed Size (px)

Citation preview

Page 1: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Jason A. WesselAVP Security Services

Network Security:

A Defense-in-Depth Approach

Page 2: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Agenda• Origin of Defense-in-Depth• Defense-in-Depth: Information Security

– Strategies, – Security Models / Frameworks

• Attackers & the evolving threats on Information Security

• Network Defenses • Additional Defenses• Question & Answer

Page 3: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Origin of Defense-in-Depth

“A military strategy sometimes called elastic defense. Defense in depth seeks to delay rather than prevent the advance of an attacker, buying time and causing additional causalities by yielding space.”

http://en.wikipedia.org/wiki/Defense_in_depth

Page 4: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Defense-in-Depth: Information Security

“…the practice of layering defenses to provide added protection. Defense in depth increases security by raising the cost of an attack. This system places multiple barriers between an attacker and your business critical information resources: the deeper an attacker tries to go, the harder it gets.”

Brooke Paul, Jul 01, Security Workshop at Network Computing

Page 5: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Defense-in-Depth StrategyInformation Assurance Strategy

Ensuring confidentiality, integrity, and availability of data

People-Hire talented people, train and reward them

Technology -Evaluate, Implement, Test and Assess

Operations-Maintain vigilance, respond to intrusions, and be prepared to restore critical services

IAS Thomas E. Anderson Briefing Slides

Page 6: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Perimeter

Internal

Hosts

Applications

Data

Defense-in-Depth

Security Model

Page 7: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Defense-in-Depth

• Framework for Information Security– “Security is a process, not a product”

Bruce Schneier

• Ongoing process– Can’t be implemented over a weekend

• Assume control points will fail– Architecture to protect from failures

Page 8: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

The Attackers• The Script Kiddies

– Does not target specific information or companies– Small number of exploits and search for victims to utilize exploits

against• The Skilled Hacker

– Targets specific information and companies– Performs comprehensive research on victims using multiple

exploits and social engineering techniques– Typically out for personal gain (money, glory, etc.)

• The Insider– Trusted employee, who knows where business critical information

is located– Typically out to harm business reputation, commit fraud, or financial

gain

Page 9: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Attack Landscape is Evolving • Viruses, Worms, Trojans, Root Kits• Shift from “Glory-Motivated-Vandals” to

“Financially-Politically-&-Fraud-Motivated-Cyber-Crime”

• “Designer Worms” and “Designer Trojans”

• Shift from Worms to Bot-Networks

From IBM Internet Security Systems

Page 10: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Attack Evolution Example

• Welchia Worm– Infected devices– Sprayed 20K UDP packets per second– Impacted services and network performance

based on increased traffic volume

• Zotob/Esbot– Owned devices, restricted range, local traffic – Assess first, fire only when vulnerable

From IBM Internet Security Systems

Page 11: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Network Defenses• Network Segmentation• Access Points • Routers and Switches• Firewalls• Content Filtering• IDS / IPS• Remote Access• Event Management• Vulnerability Management

Page 12: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Network Segmentation

• Create a logical security view of a network infrastructure

• Identify critical resources and information assets

• Apply security and business risk classifications

• Building block for the other network defenses

Page 13: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Network Segmentation

Page 14: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Network Access / Entry Points

• Entry points into the network infrastructure

• Classify the access points• Develop a security risk profile for each

access point • Each access point presents a threat for

unauthorized and malicious access to the network infrastructure.

Page 15: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Network Access Points

Page 16: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Routers and Switches

• Typically responsible for transporting data to all areas of the network

• Sometimes overlooked as being able to provide a defense layer

• Capable of providing an efficient and effective security role in a Defense-in-Depth strategy

Page 17: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Simple Router & Switch Network

Page 18: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Firewalls• First defenses thought of when working on a

Defense-in-Depth strategy• Provide granular access controls for a network

infrastructure• Firewall Types:

– Packet filtering– Proxy based– Stateful Inspection

• Continuing to increase their role by performing application layer defenses on the network

Page 19: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Firewalls

Page 20: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Content Filtering• Protection of application and data content

being delivered across the network• Content filtering looks for:

– Virus– File attachments– SPAM– Erroneous Web Surfing– Proprietary / Intellectual Property

• Commonly used network protocols:– SMTP, HTTP, FTP, and instant messaging

Page 21: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Content Filtering

Page 22: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

IDS / IPS• Detect malicious network traffic and

unauthorized computer usage• Detection Strategies

– Signature-based – Anomaly-based– Heuristic-based– Behavioral-based

• View of traffic from a single point• Similar technologies are applied at the host and

network layers

Page 23: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

IDS/IPS

Page 24: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Remote Access

• Identify all remote access points into the network infrastructure.

• Driven by the need to promote business productivity

• Expanding the perimeter

• Requires strict access controls and continuous activity monitor

Page 25: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Remote Access

Page 26: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Security Event Management

• The collection and correlation events on all devices attached to the network infrastructure.

• Provides insight into events which would go unnoticed at other individual defense layers

• Provide automated alerts of suspicious activity

Page 27: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Security Event Management

Page 28: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Vulnerability Management

• Continuous process of assessing and evaluating the network infrastructure

• Multiple views / perspectives

• Integration with Patch Management and ticketing systems

• Configuration & maintenance validation

Page 29: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Vulnerability Management

Page 30: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Additional Defenses: Connecting the Hosts & Network

• Security Policies

• Network Admission Control (NAC)

• Authentication Services

• Data Encryption

• Patch Management

• Application Layer Gateway

Page 31: Jason A. Wessel AVP Security Services Network Security: A Defense-in-Depth Approach

Network Security: A Defense-in-Depth Approach

Jason A. WesselAVP Security Services

CADRE – Information [email protected]

888-TO-CADRE