37
Threat-Centric Security with FirePOWER

Threat-Centric Security with FirePOWER

Embed Size (px)

Citation preview

Page 1: Threat-Centric Security with FirePOWER

Threat-Centric Security with FirePOWER

Page 2: Threat-Centric Security with FirePOWER

Threat-Centric Security with FirePOWER

Håkan Nohre, CISSP Consulting Systems Engineer

Page 3: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Demo:

§ John surfs the net with unpatched Adobe Flash Player -  Vulnerability from May 2014

§ John lured to Browser Exploit Site § John's PC owned by controller (Command and Control)

Browser Exploit Site

Controller

John's PC

Page 4: Threat-Centric Security with FirePOWER

Cisco Connect 2015

The Kill Chain Recon

Attack Delivery

Exploitation

Persistence

C&C

Lateral Movement

Steal Data

https://media.blackhat.com/bh-us-12/Briefings/Flynn/bh-us-12-Flynn-intrusion-along-the-kill-chain-WP.pdf

What if we could detect and correlate

Page 5: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Security Model

BEFORE Detect Block

Defend

DURING AFTER Control Enforce Harden

Scope Contain

Remediate

Attack Continuum

Point in time Continuous

Visibility and Automation

Page 6: Threat-Centric Security with FirePOWER

Cisco Connect 2015

100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00

01000 01000111 0100 11101 1000111010011101 1000111010011101 1100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00

The Problem with Legacy Next-Generation Firewalls Focus on Application Visibility and Control

But miss the threat… and do not provide visibility

Legacy NGFWs can reduce attack surface area but advanced malware often evades security controls.

01000 01000111 0100 1110101001 1101 111 0011 0

100 0111100 011 1010011101 1

01000 01000111 0100 111001 1001 11 111 0

Page 7: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Cisco ASA with FirePOWER Services Industry’s First Adaptive, Threat-Focused NGFW

World’s most widely deployed, enterprise-

class ASA stateful firewall

Identity-Policy Control

& VPN

Best in class high availability with

clustering Integrated Threat defense across the attack continuum

Unmatched visibility and automation with

FireSIGHT management Threat focused – Industry-leading next-generation IPS (NGIPS)

Advanced Malware Protection

URL Filtering

Page 8: Threat-Centric Security with FirePOWER

Cisco Connect 2015

ASA High 5585-X

ASA Midrange

5512-5555-X

FirePOWER Software module – *requires SSD disc FirePOWER Hardware module FirePOWER Services supported by default

ASA for SMB

5506-X

ASA with FirePOWER Services

Page 9: Threat-Centric Security with FirePOWER

Cisco Connect 2015

FirePOWER Platforms IP

S P

erfo

rman

ce a

nd S

cala

bilit

y

Data Center Campus Branch Office SOHO Internet Edge

FirePOWER 7100 Series 500 Mbps – 1 Gbps

FirePOWER 7120/7125/8120 1 Gbps - 2 Gbps

FirePOWER 8100/8200 2 Gbps - 10 Gbps

FirePOWER 8200 Series 10 Gbps – 40 Gbps

FirePOWER 7000 Series 50 Mbps – 250 Mbps

From 50Mbps to 60Gbps Modularity in 8000 Series Fixed Connectivity in 7000 Series Mixed SFPs in 7100 Series Configuration Fail-Open & Fail-Close across all Scalable 8000 Series Runs NGIPS, AMP and App Control in the same chassis

Page 10: Threat-Centric Security with FirePOWER

Cisco Connect 2015

ASA FirePOWER Services Management NetOPS Workflows - CSM 4.6/7 or ASDM-ASA-On-Box 1

SecOPS Workflows -FireSIGHT Management Center 2

NGFW/NGIPS Management

Forensics / Log Management

Network AMP / Trajectory

Vulnerability Management

Incident Control System

Adaptive Security Policy

Retrospective Analysis

Correlated SIEM Eventing

Network-Wide / Client Visibility

Visibility Categories Threats Users Web Applications Application Protocols File Transfers Malware Command & Control Servers Client Applications Network Servers Operating Systems Routers & Switches Mobile Devices Printers VoIP Phones Virtual Machines

CSM or ASDM

FireSIGHT

Page 11: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Visibility: FireSIGHT Discovers

Host 10.1.19.4

OS

User

Apps

Vulnerabilities

100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00

john

§  ...automatically § Hosts, OS, Logged in Users,

Applications, Vulnerabilities

§ Gives much more than just Application Visibility and Control (AVC)

Page 12: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Visibility: FireSIGHT Discovers Users

Host 10.1.19.4

OS

User

Apps

Vulnerabilities

john

§ User Agent installed on

Windows machine

§ Reads Active Directory logon and logoff events

§  Informs FireSIGHT

Active Directory User

Agent

john

log on

Page 13: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Future: Discovering Identities for Other Devices Host 10.1.19.4

OS

User

Apps

Vulnerabilities

§ Device authenticates to network

(802.1X)

§ Cisco ISE shares info with pxGrid

§ Works even if device is not in Active Directory

I S E

john

pxGrid

Future – Roadmaps are Subject to Change

Page 14: Threat-Centric Security with FirePOWER

Cisco Connect 2015

FirePOWER™ Services: NGIPS

§  IPS Engine based on Open Source Snort ™ §  Best Threat Effectiveness §  Best Value (lowest TCO/protected Mbps) §  Subscription License

IPS

IPS

OpenAppID

Page 15: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Visibility : Reduce Workload & Improve Performance

§ FireSIGHT recommends IPS tuning § Reduces Workload

§  Improves Performance

Adapt IPS tuning to environment

IPS

Reduced Risk and Cost

Page 16: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Visibility : Reduced Workload and Risk

Host 192.168.3.1

OS

User

Apps

Vulnerabilities

100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00

john

§  Increased IPS efficacy § Focus on Relevant Alerts

Act Immediately Vulnerable

IPS

Page 17: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Correlates all intrusion events to an impact of the attack against the target

1

2

3

4

0

IMPACT FLAG ADMINISTRATOR ACTION WHY

Act Immediately, Vulnerable

Event corresponds to vulnerability mapped to host

Investigate, Potentially Vulnerable

Relevant port open or protocol in use, but no vuln mapped

Good to Know, Currently Not Vulnerable

Relevant port not open or protocol not in use

Good to Know, Unknown Target

Monitored network, but unknown host

Good to Know, Unknown Network

Unmonitored network

Cisco FireSIGHT Simplifies Operations It tells you which alerts are the most important!

IPS

Page 18: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Security Intelligence: Reputation Based Filters

100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00

§ Detects communication to known CnCs, Malware Sites § Complements Signature based detections

IPS

Reduced Risk

ALERT! John tried to connect to known CnC

Page 19: Threat-Centric Security with FirePOWER

Cisco Connect 2015

3rd Party Validation IPS

Top Ratings (8260)*

§  98.9% detection & protection

§  34Gbps inspected throughput

§  60M concurrent connections

§  $15 TCO / protected Mbps

IPS

Page 20: Threat-Centric Security with FirePOWER

Cisco Connect 2015

AMP – Advanced Malware Protection

§  Analyses files to block and detect malware §  Cloud based lookup of File Reputation §  Cloud based Dynamic Analysis with Sandboxing §  Retrospective Security

§  Subscription License

AMP

AMP

Page 21: Threat-Centric Security with FirePOWER

Cisco Connect 2015

The Value of Retrospective Security

•  If a malicious file slips through the Anti-Malware controls...

•  ...because it was a new malware

AMP

Page 22: Threat-Centric Security with FirePOWER

Cisco Connect 2015

The Value of Retrospection

•  If a malicious file slips through the Anti-Malware controls...

•  ...because it was a new malware •  And the next day when the

malware is known... •  Wouldn't you want to know -  Who downloaded it? -  Where has it spread?

AMP

Reduced Risk and Cost

Page 23: Threat-Centric Security with FirePOWER

Cisco Connect 2015

AMP in Action: Known Bad File

100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00

§ File look-up returns "malware" § File dropped immediately

AMP

AMP Cloud

File Lookup =Malware

Page 24: Threat-Centric Security with FirePOWER

Cisco Connect 2015

AMP in Action: Retrospective Security

100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00

§ File look-up returns "Unknown" § File is allowed

AMP

AMP Cloud

File Lookup =Unknown

Page 25: Threat-Centric Security with FirePOWER

Cisco Connect 2015

AMP in Action: Retrospective Security

100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00

§ File is later classified as malware -  sandboxing -  machine learning -  intelligence community

§ Alert on who downloaded the file

§ Visibility and Containment

AMP

AMP Cloud

Reduced Risk and Cost

ALERT!catfood.pdf

downloaded by [email protected]

is malware

Page 26: Threat-Centric Security with FirePOWER

Cisco Connect 2015

FireSIGHT : Indications of Compromise

•  FireSIGHT Indications of Compromise identifies hacked clients •  Based on IPS alerts, Malware events, Communications with known Botnet

Controllers •  Quick and Easy to Identify Hacked Clients

AMP

IPS

Reduced Risk and Cost

Page 27: Threat-Centric Security with FirePOWER

Cisco Connect 2015

FireSIGHT : Detecting Anomalies

•  Detects if new application appears or traffic profile changes •  Identify Hacked Hosts •  Useful in static environments: Scada, DMZ, MEDTEC...

Reduced Risk and Cost ALERT Host has suddenly started to use SSH client and outgoing traffic volume has

increased by 3 ssh

Page 28: Threat-Centric Security with FirePOWER

Cisco Connect 2015

FireSIGHT : Automated Responses

•  Use pre-defined or custom script to initiate automatic actions •  E.g, Quarantine device with ISE API

Reduced Risk and Cost

Indications Of Compromise - IPS event impact 1 - Malware - Communication with BOTNET QUARANTINE

I S E

change VLAN or

SGT

Page 29: Threat-Centric Security with FirePOWER

Cisco Connect 2015

FireSIGHT : Integrate with 3rd Party through open APIs

eStreamer API Export Events

Vulnerability API Import

Vulnerabilities

Remediation Modules

I S E

Page 30: Threat-Centric Security with FirePOWER

Cisco Connect 2015

FirePOWER Services: URL Filtering

§  Block (or warn) non-business-related sites by category §  Based on user and user group §  Subscription Based License

URL

Employee Productivity

Page 31: Threat-Centric Security with FirePOWER

Cisco Connect 2015

FireSIGHT : Reporting

§ Extensive reporting § Highly customizable templates

§ Scheduled Reports

Management Visibility

Page 32: Threat-Centric Security with FirePOWER

Cisco Connect 2015

John, the CFO.

Cat Friend. Owned.

John's PC compromised

... HOW, WHEN, WHO ELSE?

Page 33: Threat-Centric Security with FirePOWER

Cisco Connect 2015

A Note on this Demo

ASA FirePOWER would have blocked all attacks by default Set to "no block" to illustrate visibility of compromised system No security system will catch everything

Retrospective Visibility Matters!

Page 34: Threat-Centric Security with FirePOWER

Cisco Connect 2015

John, the CFO.

Cat Friend. Owned.

I know WHO, HOW, WHEN, WHO ELSE,

WHAT FILES... but what's the name of

the cat?

Page 35: Threat-Centric Security with FirePOWER

Cisco Connect 2015

The Kill Chain Recon

Attack Delivery

Exploitation

Persistence

C&C

Lateral Movement

Steal Data

https://media.blackhat.com/bh-us-12/Briefings/Flynn/bh-us-12-Flynn-intrusion-along-the-kill-chain-WP.pdf

What if we could detect, correlate and take action

Page 36: Threat-Centric Security with FirePOWER

Cisco Connect 2015

Summary

•  ASA with FirePOWER Services is industry’s first threat focused NGFW •  Threat defense with IPS, AMP and URL •  Unprecedented visibility with FireSIGHT management

Page 37: Threat-Centric Security with FirePOWER