automating networksecurityassessment

36
Владимир Илибман , Cisco Automating Network Security Assessment

Upload: glib-pakharenko

Post on 19-Jan-2015

304 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Automating networksecurityassessment

Владимир Илибман , Cisco

Automating Network Security Assessment

Page 2: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 2

What we will cover

Traditional approach

What’s new: Automation

Case study: Network modeling- Cisco’s global infrastructure

Case study: Zone defense- Scrub down of border PoP’s

Case study: Defending critical assets- Isolating PKI

Case study: “Surprise!”- Handling new infrastructure

- Case study: Managing change day to day- The Carnac moment

Page 3: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 3

Today’s network security audits

Typically, network and hosts treated separately

Network:Elbow grease and eye strain

Gather configs; print configs; read configs

Similar to proof-reading the phone book

Hosts:Level 1: Leave the admins to patch

Problem: hope is not a strategy

Level 2: Scan for unpatched systems

Problem: more data than you can handle

Level 3: Drive cleanup based on risk

Problem: prioritization easier said than done

Page 4: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 4

Why network assessment is different

You can’t detect a route around the firewall by reading the firewall

It’s not host analysisIt’s not config analysis

Page 5: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 5

Case study: “Project Atlas”

Objective:Map the entire global Cisco environment

Review major site interconnections

Audit access to sensitive locations

27,000 configuration files

How long would this take manually? Reads a device configuration in 1 hour

Checks a firewall rule in 1 minute

4 person‐years (working 24x7x365)

Resources:Installed RedSeal software

Two weeks

Page 6: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 6

Raw network (aka “The Bug Splat”)

Lesson #1: You need a config repository

Page 7: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 7

Organizing Cisco’s worldwide network

Zoning from location codes, without input from Cisco

Lesson #2: Naming conventions are your friend

Page 8: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 8

Final “circumpolar” zoned view

US

Europe

India

APAC

US

Page 9: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 9

Connectivity to six sensitive servers

Sensitiveservers

Page 10: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 10

Automatic calculation of connectivity

Blue lines show open access paths to sensitive servers

Clearly shows the need for segmentation

Lesson #3: Pictures easily explain difficult concepts

Page 11: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 11

Access specifics – “Is it just ping?”

Detailed drill-down from one blue arrow

Well, at least we blocked telnet(Specifics hidden, for obvious reasons)

Page 12: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 12

Case Study: Zone defense

Cisco has 15 major PoP’s for external connections

Typical manual assessment: 90 days per PoP

Target:1. Build map

2. Record major zones • Internet, DMZ, Inside, Labs, etc

3. Analyze for Best Practice violations

4. Add host vulnerabilities from scans

5. Run penetration test

Page 13: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 13

San Jose Campus Network Map

Map of one PoP

Zoning done “semi-automatically”

Internet DMZ Main Site Labs

Page 14: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 14

Offline penetration testing

Next level of analysis is penetration testing

Combine network map with host scans

Add access calculation

Software automatically evaluates attack paths

Identify high risk defensive weaknesses

Page 15: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 15

Risk from Network-Based Attacks

15

Hig

h Ri

skLow

Risk

Blocking Rule

Blocking Rule Blocking Rule

Pivot Attack

Blocking ACL

Pivot Attack

Hig

h Ri

skLow

Risk

Page 16: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 16

Sample attack chain – Before

Internet

DMZ

Main Site

Page 17: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 17

Step 1 – Vulnerabilities exposed in DMZ

Attackers can reach these Internet-facing servers

Page 18: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 18

Just a few pivot attacks are possible

Step 2 – Some attack paths sneak in

Page 19: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 19

Step 3 – Attack fans out

An attacker can get in if they find this before you fix it

Page 20: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 20

Penetration test results

Sample result:

External attackers can reach red hosts

Then pivot to attack yellow hosts

But no attack combination reached green hosts

Lesson #6: Network data + Vuln data + Attack path = GOLD

Page 21: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 21

Case Study: Defending critical assets

PoP audits work outside inBroad scope, hunting major gaps

Problem: lots and lots of access to review

Can’t quickly capture all rules for all incoming access

Some assets deserve focused attention

For critical assets, work inside outStart from known target

Limit scope, increase focus

Continuous re-assessment

Page 22: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 22

Distributed public key infrastructure

Main site, plus disaster recovery siteBuilding the “crossbar” was easy – we sampled from Atlas

Internet

Cert Authority

WAN (sample)

DR Site

Lesson #7: A reference atlas is your friend

Page 23: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 23

Distributed public key infrastructure

Access strictly controlledUntrusted 3rd party manufacturers need to request certs

Only cert admins should have general accessInternet

Cert Authority

Cert Admins

WAN to Extranet

DR Site

Page 24: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 24

Investigate unexpected access

Note: no flow into primary

Only DR site had unexpected Internet accessEven that was for limited sources, but still unexpected

Lesson #8: Cruft is so important we mention it twice

Page 25: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 25

Case Study: “Surprise!”

Ad hoc network support

Sudden addition of complete network to secure

M&A, or in this case, short-lived Expo network

Requires very rapid assessment

Continuous tracking during high visibility phase

Until end of expo, or for M&A, integration into normal ops

Page 26: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 26

China Expo Center Topology

Page 27: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 27

• Weak Community String

Page 28: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 28

Best Practice Checks

Lesson #9: Computers are better at reading phone books than you are. Get over it.

Page 29: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 29

Case Study: Managing daily change

Business change requests come thick & fast

Security teams are asked to approve

No standard basis to approve

Can’t position security team as “Dr No”Need clear, unequivocal reasons when rejecting changes

Causes “the Carnac moment”

Page 30: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 30

RTP Campus Network Map

Sensitiveservers

DMZ

Internet

Cisco Campus

Page 31: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 31

Client Connection Request

• Create Network Model• Input Vulnerability Data• Business need: Open one Class C network :80

• Connection exposes 32 vulnerabilities

Downstream Effect?Exposes 7,549 Vulnerabilities

InsideOutside

Page 32: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 32

Client Connection Exposure

Blue lines show open access paths to sensitive servers

Clearly shows the need for segmentation

Page 33: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 33

Acceptable Risk Assessment

• Access is BLOCKED

OutsideInside

• No hosts vulnerable; nothing Leapfroggable

Page 34: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 34

Automating network audit

Before: After:

Map the entire global network environmentAudit access to sensitive locationsCorrelate access rights and threat risk

Page 35: Automating networksecurityassessment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation_ID 35

Полезно !Видеозапись презентации http://www.redseal.net/news-and-events/Cisco-Live-Presentation-6-2010

The Security Content Automation Protocol (SCAP)

is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation

http://scap.nist.gov/index.html

The Security Content Automation Protocol (SCAP) combines a number of open standards that are used to enumerate software flaws and configuration issues related to security.

Cisco Proactive Automation of Change Execution (PACE)

http://www.cisco.com/en/US/netsol/ns661/index.html

Page 36: Automating networksecurityassessment