34
Putting Theory into Practice, the Wrong Way John Iliadis Network Security Admin TEIRESIAS S.A.

Network Security: Putting Theory into Practice, the Wrong Way

Embed Size (px)

DESCRIPTION

Invited talk, Athens International 1st Forum on IT Security, Hellenic-American Union, Athens, Greece, May 2008

Citation preview

Page 1: Network Security: Putting Theory into Practice, the Wrong Way

�������������

Putting Theory into Practice, the Wrong Way

John IliadisNetwork Security Admin

TEIRESIAS S.A.

Page 2: Network Security: Putting Theory into Practice, the Wrong Way

�� �����������������������������������������������

� Understand the theory…sometimes even Engineers have to go back and(re)comprehend the theory, to get things done �

� Understand the problemActually listen to the problem before providing asolution.

� Provide an integrated solutionA security mechanism per se is not a solution; it ismerely a tool (more about that later)

Page 3: Network Security: Putting Theory into Practice, the Wrong Way

�����������������������������������������������������������

ProblemI want to protect

confidentiality of data exchanged between

network A andnetwork B

Network A

Network A

Network B

Network B

Network Service Provider

Network Service Provider

Page 4: Network Security: Putting Theory into Practice, the Wrong Way

�����������������������������������������������������������

ProblemI want to protect

confidentiality of data exchanged between

network A andnetwork B

SolutionOK, we ‘ll implement an IPSec VPN, using

preshared keys

Network A

Network A

Network B

Network B

Network Service Provider

Network Service Provider

VPN

Page 5: Network Security: Putting Theory into Practice, the Wrong Way

�����������������������������������������������������������

ProblemI want to protect

confidentiality of data exchanged between

network A andnetwork B

SolutionOK, we ‘ll implement an IPSec VPN, using

preshared keys

Network A

Network A

Network B

Network B

Network Service Provider

Network Service Provider

VPN

Page 6: Network Security: Putting Theory into Practice, the Wrong Way

��������������������������������

ProblemI want to protect

confidentiality of data exchanged between

network A and network B

Page 7: Network Security: Putting Theory into Practice, the Wrong Way

��������������������������������

ProblemI want to protect

confidentiality of data exchanged between

network A and network B

SolutionI trade your problem with another: that of managing symmetric

encryption keys

Page 8: Network Security: Putting Theory into Practice, the Wrong Way

��������������������������������

ProblemI want to protect

confidentiality of data exchanged between

network A and network B

SolutionI trade your problem with another: that of managing symmetric

encryption keys

ProblemHow does it sound if I

send a sealed envelope with the new symmetric

key every week by courier to the network admin of network B?

Page 9: Network Security: Putting Theory into Practice, the Wrong Way

��������������������������������

ProblemI want to protect

confidentiality of data exchanged between

network A and network B

SolutionI trade your problem with another: that of managing symmetric

encryption keys

ProblemHow does it sound if I

send a sealed envelope with the new symmetric

key every week by courier to the network admin of network B?

SolutionOK! I ‘ll implement the IPSec VPN and you

are done!

Page 10: Network Security: Putting Theory into Practice, the Wrong Way

�� �������������������

…exchanging one problem for another,

easier problem to solve

Page 11: Network Security: Putting Theory into Practice, the Wrong Way

InternetInternet

!������ �������������������"����#$%&'

ProblemI want a HIGHLY

AVAILABLE network in order to access Service

X over the Internet (assuming Service X is

highly available)

Page 12: Network Security: Putting Theory into Practice, the Wrong Way

InternetInternet

!������ �������������������"����#$%&'

ProblemI want a HIGHLY

AVAILABLE network in order to access Service

X over the Internet (assuming Service X is

highly available)

Switch A

Solution…just another day at

the office…

Router ARouter B

Switch B

ISP AISP A

ISP BISP B

Page 13: Network Security: Putting Theory into Practice, the Wrong Way

!������ �������������������"����#&%&'

Router A

Router B

Switch A

Switch B

ISP AISP A

ISP BISP B

Page 14: Network Security: Putting Theory into Practice, the Wrong Way

!������ �������������������"����#&%&'

Router A

Router B

Switch A

Switch B

ISP AISP A

ISP BISP B

Both lines follow the same route to the Computer Room (same building shaft)

Page 15: Network Security: Putting Theory into Practice, the Wrong Way

!������ �������������������"����#&%&'

Router A

Router B

Switch A

Switch B

ISP AISP A

ISP BISP B

Single point of entry Into the building

Page 16: Network Security: Putting Theory into Practice, the Wrong Way

(����������������� �" �������

• User workstations should be equipped with centrally managed software:� Antivirus� Antispyware� Firewall� Intrusion detection� Log consolidation� SW/HW Inventory� etc…

Switch

Page 17: Network Security: Putting Theory into Practice, the Wrong Way

����������������"��������"����

• No Layer 2 authentication

• The user brings his own, personal laptop• to work without being “disrupted” by all this

annoying software• to try some things he couldn’t do on the network

due to this annoying software

Switch

Page 18: Network Security: Putting Theory into Practice, the Wrong Way

����������������"��������"����

Switch

• Enforce 802.1x authentication

• Implement Port Security

• Trendy add-on: Network Admission Control

X

Page 19: Network Security: Putting Theory into Practice, the Wrong Way

��������#���'���!)

1. A turnkey security solution

2. Automatic identification/notification of attacks

3. THE new security panacea (UTMs)

Page 20: Network Security: Putting Theory into Practice, the Wrong Way

*�������������������%+����!)

Being given a chance to:

1. identify potential attacks in traffic

2. review related host logs

3. decide if this is indeed a security issue

4. take action

Page 21: Network Security: Putting Theory into Practice, the Wrong Way

�������%+����!)������������

• IDSs give us a chance to identify attacks and react

• Not much of a use if

� network traffic is not captured

� there is no experienced security personnel

� security personnel is not reviewing IDS logs

not much of a turnkey solution…

Page 22: Network Security: Putting Theory into Practice, the Wrong Way

,�� ��������������

�������� ��� � �������

HTTP HTTP HTTP

No Encryption

�������� ��� � �������

HTTPS HTTPS HTTPS

Way too much encryption

Page 23: Network Security: Putting Theory into Practice, the Wrong Way

,�� ��������������

�������� ��� � �������

HTTP HTTP HTTP

No Encryption

�������� ��� � �������

HTTPS HTTPS

Encryption/IDS BalanceHTTP

Page 24: Network Security: Putting Theory into Practice, the Wrong Way

�-!�.���

ProblemAlice needs to send aHIGHLY confidential mail to Bob once a

month

Page 25: Network Security: Putting Theory into Practice, the Wrong Way

�-!�.���

ProblemAlice needs to send aHIGHLY confidential mail to Bob once a

month

Solution

PKI !

PKI

Page 26: Network Security: Putting Theory into Practice, the Wrong Way

������������������

Organisation

Good Guys

Good Guys

Bad Guys

Bad Guys

Internal

Zone

External

Zone

Neo takes the blue pill

Page 27: Network Security: Putting Theory into Practice, the Wrong Way

������������������Neo takes the red pill

Page 28: Network Security: Putting Theory into Practice, the Wrong Way

/����� ���������

All services & users are born equal.

Some are more equal than others

�Expected user experience

�Prerequisite (e.g. VoIP, NMS)

�QoS as a security mechanism (DoS,

packet filtering alternative, …)

Page 29: Network Security: Putting Theory into Practice, the Wrong Way

���������01���*���*���� �#�2�2�2������'���

Service AService B

Service F

Service D

Service KService E

Service C

Service G

Service HService I

Single Sign-On Island

Page 30: Network Security: Putting Theory into Practice, the Wrong Way

���������01���*���3������� #(��������" �����������4��������'

Service GService B

Service K

Service I

Service FService E

Service H

Service A

Service C

Service D

Threat: unauthorised access•Impact factor: 1/5•Impact factor: 3/5•Impact factor: 5/5

Single Sign-On Island #1Single Sign-On Island #2

Page 31: Network Security: Putting Theory into Practice, the Wrong Way

�������������"���������������#$%5'

• Effect: Managers taking the wrong (security-wise) strategic decisions

• (Probable) Cause: YOU did not educate them regarding security matters

Page 32: Network Security: Putting Theory into Practice, the Wrong Way

�������������"���������������#&%5'

• Effect: Users not being security-conscious enough

• (Probable) Cause: YOU did not educate them in security matters and the HIGHER MANAGEMENT did not provide incentives and show commitment

Page 33: Network Security: Putting Theory into Practice, the Wrong Way

�������������"���������������#5%5'

• Effect: Stakeholders perceive Security as an obstacle to business

• (Probable) Cause: Security is not a goal in itself. YOU must treat it as a business enabler, before anyone else can

Page 34: Network Security: Putting Theory into Practice, the Wrong Way

/6�