protecting application delivery without network security blind spots

20
www.thales-esecurity.com Protecting Application Delivery without Network Security Blind Spots Juan Asenjo, Thales e-Security Don Laursen, F5 Networks

Upload: thales-e-security

Post on 16-Apr-2017

148 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Protecting application delivery without network security blind spots

www.thales-esecurity.com

Protecting Application Delivery without Network Security Blind Spots Juan Asenjo, Thales e-SecurityDon Laursen, F5 Networks

Page 2: Protecting application delivery without network security blind spots

2

▌Juan Asenjo, Sr. Partner Manager, Thales e-Security

Juan has worked in the information security field for over 20 years. He has degrees in engineering and business, he is a Certified Information System Security Professional, and is currently working on a post-graduate degree. His experience includes over 10 years within the Department of Defense as an engineer and as a civilian INFOSEC liaison with the U.S. Army-Europe.

▌Don Laursen, Sr. Product Manager, F5 NetworksDon has been in the technology industry for over 20 years. He is a member of IEEE, ACM, and International Privacy Professional Association. He holds an MS in computer systems, is a CISSP certified professional, and Certified Information Privacy Professional (CIPP/US and CIPP/Europe). Prior to joining the private sector Don spent 10 years serving as a U.S. Naval Cryptologist in an active-duty role and as a reservist.

Our Speakers

Page 3: Protecting application delivery without network security blind spots

3

Objectives

▌Describe how network security blind spots occur

▌Outline threat that they represent to organization

▌Define the best practices to protect against them

▌Explain how to configure a trusted secure system

Page 4: Protecting application delivery without network security blind spots

4

Introduction

SSL is growing and that presents a challenge for our customers

Most network architectures are obsolete. They are not built for SSL encryption. Enabling SSL on NG security products impacts performance (80% degradation).

Cyber criminals are growing more sophisticated and evasive in their attacks

Traditional network architectures are built for little or no encryption. Attackers are planting SSL-encrypted malware on compromised servers to evade network monitoring. Without security tools to inspect SSL traffic, attacker actions can go undetected.

Un-Encrypted Threat

Encrypted Threat

Apps

Apps

IPS DLP SWG Any Security

Security ServicesUntrusted Networks Resources

SSL BLIND SPOT

Page 5: Protecting application delivery without network security blind spots

5

Network Security Blind Spots▌Hinders work of network security tools

Network health monitoringDLP, IDS, IPS Malware detection

▌ Requires visibility into network traffic

Security Dashboard (SIEMS)Policy and Privacy Enforcement Troubleshooting

ENCRYPTED

Page 6: Protecting application delivery without network security blind spots

6

Typical Security Stack

Users / Devices

User

InternetFirewall F5 BIG-IP Firewall

IPS(Pool)

DLP(Pool)

Web Gateway

(Pool)

Anti-Malware

(Pool)

Decrypt and Steer (based

on policy, bypass options)

Re-encrypt

ICAPInline

Insertion (L2 Mode)

1-Armed / 2-Armed

NGFW(Pool)

Inline Insertion (L3

Mode)

Page 7: Protecting application delivery without network security blind spots

7

Significant Performance Impact on Existing Security Stack

Visibilityis reduced due to the growth of SSL usage

Malwareuses encrypted

channels to evade detection

Blind Spots

for decryption is a significant undertaking

Next-Gen FirewallPerformance Impact

%79

Next-Gen IPSPerformance Impact%7

5

Threat DefenseNo SSL Support

%100Enabling SSL on a firewall, SWG or an

IPS will reduce the overall performance of the appliance, often

by more than 80%

Performance

Page 8: Protecting application delivery without network security blind spots

8

Threat

▌Threat to your organizationENCRYPTED

Page 9: Protecting application delivery without network security blind spots

9

Best Practices ▌Protecting against encryption blind spots with BIG-IP

Optimizes security stack through SSL offloadCentralized decrypt/encrypt capability Support for latest ciphers and suites providing network traffic visibilityFlexible deployment to support diverse environments

▌SSL/TLS and encrypt/decrypt feature use crypto keys

Keys maintained in software can be exposed to threatsIncreasing number of crypto keys are harder to manageCustomers require certified key protection for compliance

Page 10: Protecting application delivery without network security blind spots

10

F5 BIG-IP Solution

But critical keys can exist in multiple places and are vulnerable to physical and

software attacks

Connection Origination

Page 11: Protecting application delivery without network security blind spots

11

F5 BIG-IP Solution with Thales nShield HSM

Connection Origination Critical keys are protected and

managed in certified confined of HSM and not exposed to

physical and software attacks

Page 12: Protecting application delivery without network security blind spots

12

Protecting and Managing the Keys

▌External nShield HSM enables enhanced security

Protects and manages critical SSL keys used by BIG-IP and encrypt/decrypt featureIsolate cryptography and keys in secure FIPS 140-2 Level 3 and Common Criteria EAL 4+ boundaryDeliver lifecycle hardware key management, mitigates risks, and facilitates regulatory compliance

Page 13: Protecting application delivery without network security blind spots

13

Value of HSM Integration

F5 BIG-IP• Optimizes SSL traffic, response times, and customer

experience• Provide traffic visibility and prevent security blind spots

THALES•Enhances security protecting crypto keys in dedicated hardware•Provide dual controls facilitating auditing/regulatory complianceINTEGRATION

• Delivers a proven solution with a strong and certified root of trust

Page 14: Protecting application delivery without network security blind spots

14

HSMs and Problems they Address

▌ What are HSMs?Hardware Security ModuleHardened, tamper-resistant devices isolated from host environmentAlternative to software crypto libraries

▌ What do HSMs do?Secure cryptographic operationsProtect critical cryptographic keysSegregate administration and security domains and enforce policy over the use of keys

nShield HSMs are FIPS 140-2 Level 3 and

Common Criteria EAL4+ certified

Page 15: Protecting application delivery without network security blind spots

15

Enhanced Security for Application Delivery Controllers▌ Software-only system▌ Numerous copies of keys

across system and backups

▌ Hardened security system▌ Keys are segregated within

isolated security environment

Hardware Security Module

Software environmentApplication

Hardware platform

Hypervisor

Operating System

CPU

Memory Storage

Back-ups

Hardware Security Module

Software environmentApplication

Hardware platform

Hypervisor

Operating System

CPU

Memory Storage

Back-ups

Page 16: Protecting application delivery without network security blind spots

16

Root of Trust

▌Provides FIPS 140-2 and Common Criteria certified security

▌Isolates crypto keys and processes from host environment

▌Enforces dual controls and protects from rogue super users

▌Enhances security and ensures availability of critical keys

▌Facilitates security compliance, auditing, and reporting

Page 17: Protecting application delivery without network security blind spots

17

▌ Experience ‒ Leading global provider of data protection solutions for 40+ years

▌ Leadership ‒ HSMs help secure more than 80% of the world’s payment transactions and most valuable corporate and government information

▌ Market focus ‒ Provides the best data protection solutions possible

▌ Independently certified ‒ Products certified to FIPS standards

▌ Expert advice ‒ Provides training and deployment assistance

Why Thales e-Security?

Banking Government Utilities High Tech Mobile

Page 18: Protecting application delivery without network security blind spots

18

Why F5?

▌Experience ‒ 7+ Years providing SSL offload and transformation

▌Leadership ‒ Gartner ADC Magic Quadrant Leader

▌Market focus ‒ Application Availability, Security and Performance

▌Certified ‒ Products certified for US Government and Global Markets

▌Partnerships ‒ Marketing leading partnerships and ecosystem

Page 19: Protecting application delivery without network security blind spots

19

In Summary…

▌Preventing network security blind spots should be priority

▌ADCs increasingly taking on task/enabling traffic visibility

▌Solution delivers better performance and robust root of trust

Page 20: Protecting application delivery without network security blind spots

20

Time for Questions…

Thank you !Juan Asenjo

+1.954.888.6202 / [email protected]

Don Laursen+1.205.272.6860 / [email protected]

@pgalvin63 @asenjoJuan

@pgalvin63 [email protected]