30
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP | Juniper Networks August 2016

Holistic Network Protection

  • Upload
    lydat

  • View
    217

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Holistic Network Protection

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP | Juniper Networks August 2016

Page 2: Holistic Network Protection

Today’s Objectives To understand how holistic network protection works

via foundational concepts and examples.

Attendees will learn how holistic network protection—

Goal

Objectives

1. Leverages the entire network to deliver security and is comprised using a bottom-up and top-down approach.

2. Utilizes the entire network infrastructure including all network elements to assist in threat intelligence and detection.

3. Employs cloud-based threat defenses, which includes intelligence feeds from all sources and also includes cloud-based, scalable malware detection.

4. Contains elements of a centralized, dynamic policy engine and controller that addresses all network components.

Page 3: Holistic Network Protection

THREAT TREND LANDSCAPE

Page 4: Holistic Network Protection

Stopping outside and inside threats needs a new norm: A zero-trust security posture.

Threats from Everywhere: Our Adversaries and Techniques

Increasing sophistication with low cost equipment

Insider threat: planted or human

Capturing data in transit: exfiltration of data-in-motion not just data-at-rest

Increasing variability – mobile devices, simple code

Page 5: Holistic Network Protection

• Security breaches are “when” not “if” events • Cloud economics can decrease costs • Cloud and cybersecurity must use a risk-

management focused cybersecurity framework and maturity model

• Perimeter hardening is no longer enough • Data-at-rest and data-in-motion need

in-line and end-to-end encryption • Practice resilience scenarios

(red/blue team exercises)

Some ideas . . .

What Leaders Need to Know

Page 6: Holistic Network Protection

• How do we ensure personnel training on security awareness from password strength to physical security to data movement?

• How are anomalous signatures detected and stopped?

• “The Defender’s Dilemma” (RAND research report) • Survey of CISOs • Efficacy of Security Systems (countermeasures, attackers,

defenders) • Improving software • Heuristic Cybersecurity model • Lesson for Organizations and Public Policy • http://www.rand.org/pubs/research_reports/RR1024.html

More ideas . . .

What Leaders Need to Know

Page 7: Holistic Network Protection

TODAY’S APPROACH TO CND

Page 8: Holistic Network Protection

Attackers are always gaining, attempting to stay ahead, becoming more sophisticated,

Computer Network Defense (CND) landscape has changed.

Security Trends Today

Multiple types of nodes within the architecture = highly fluid, dynamic, and unpredictable threats from multiple sources

Risk management framework (RMF) including mitigation/isolation could help

Metrics of success: total number of attacks stopped vs reduction of risk using a risk framework

Page 9: Holistic Network Protection

• Security layered on top of network (hard shell)

• Trust model: trust what’s inside the network; trust that it is secure;

• Visibility to the outside relies mostly on perimeter firewalls

• Constant threats require adaptability (reactive defense); unknown signatures could go undetected

Current look at the enterprise perimeter security model

Application Security

Inline Anti-Malware

Inline Intrusion

Prevention

Unified Threat Management

Data Loss Prevention

Most network security strategies focus on security at the perimeter only– outside in. Is securing the perimeter really enough?

Page 10: Holistic Network Protection

Multiple kinds of nodes besides our standard switches, firewalls, routers, servers, clients, etc.

Emerging Challenge: The Internet of Things (IoT)

AFCEA IoT Summit: Battlefield IoT now focuses on enterprise versus tactical with many nodes

Battlefield network includes logistics, sensor nets, vehicles, networked munitions, robots/drones

Metrics of success: total number of attacks stopped vs reduction of risk using a risk framework

Attackers are always gaining, attempting to stay ahead, becoming more sophisticated,

More bandwidth needed as adversarial environment is cyber, kinetic, and jamming RF and humans are vulnerable to deception

Page 11: Holistic Network Protection

A Change in Mindset Start talking about Secure Networks, not Network Security

Realize threats are everywhere: inside the network, outside, and evolving from worldwide threats

Recognize perimeter security isn’t enough: use risk management frameworks and risk mitigation policy

Engage in proactive and not reactive detection and enforcement should be enabled anywhere and be dynamic

Acknowledge security is everyone’s problem – horizontal and vertical – personnel security awareness is paramount

Page 12: Holistic Network Protection

COMPONENTS

Page 13: Holistic Network Protection

• Availability • Agile, flexible, dynamic, adaptable policy

• Integrity • Separation from the current landscape

• All components protected

• Security • Layered protection

• Heuristic security

Characteristics of Holistic Network Protection

Page 14: Holistic Network Protection

Holistic Network Protection

• Customized, mission-specific • COTS, GOTS

People Applications

Infrastructure Data

Operating Systems

• Awareness (training key to entire workforce)

• Sufficient expertise

• Virtual clients, all components, not just perimeter

• Transmission • Storage • Transfer

Page 15: Holistic Network Protection

• SDN has been an emerging technology in the last five years

• The basis of SDN is virtualization: software running separately from underlying hardware

• Umbrella term encompassing several kinds of network technology aimed at making the network as agile and flexible in hybrid virtualized and non-virtualized environments

• As the cloud becomes more prevalent for threat intelligence, network adaptability is key to detect, prevent, and counter potential threats

Holistic Network Protection Includes Software Defined Network (SDN) Concepts

Page 16: Holistic Network Protection

HIGH-LEVEL ARCHITECTURE EXAMPLES

Page 17: Holistic Network Protection

• Rings-Around-Things • Software Defined Secure Networks (SDSN) • Security Frameworks and Blueprints

Industry Examples

Page 18: Holistic Network Protection

• Perimeter security gives way to “Rings Around Things (RAT)”

• Response to the Internet of Things (IoT) and Bring Your Own Device (BYOD) • One size does not fit all

• Segment and isolate intrusion and avoid total network infiltration

Short film and full 31-minute presentation available at https://www.youtube.com/watch?v=bMVvjZxw7GE and https://www.youtube.com/watch?annotation_id=annotation_1152569841&feature=iv&src_vid=bMVvjZxw7GE&v=gxfbpqH6NRo

AT&T’s Concept

Page 19: Holistic Network Protection

Operating the network as single enforcement domain, every element becomes a policy enforcement point

Software Defined Secure Network

Detection

Policy

Enforcement

Create and centrally manage intent-based policy directly aligned to business objectives

Gather & distribute threat intelligence, from multiple sources – know who the bad guys are faster

Leverage cloud economics for real time analysis – find the bad guys faster

Enforce policy to the threat feed information, real time across the network – adapt the network real-time

Page 20: Holistic Network Protection

Software Defined Secure Network

Adjusting the Bottom-Up and Top-Down Approaches • Leverage entire network and

ecosystem for threat intelligence, identification, and detection

• Utilize any point of the network as a point of enforcement (inside or perimeter)

• Dynamically execute policy across all network elements

Policy, Detection and Enforcement

Your Enterprise Network

Cloud-based Threat Defense

Enforcement

Detection

Enforcement

Detection

Dynamic and Adaptive Policy Engine

Policy Threat Intelligence

Page 21: Holistic Network Protection

Where to Start – Modernize the Perimeter

Upgrade the network perimeter for adaptability

• Next Generation Firewall is Current Generation Firewall – simplify and remove niche security appliances

• Utilize Cloud Economics for Instant Intelligence that Leads to More Effective Detection

Your Enterprise Network

Cloud Security

Advanced Threat Prevention

Threat Intelligence Engine/Detection

Physical Firewall

Virtual Firewall

Page 22: Holistic Network Protection

The Right Policy for the Right Job

Different threat levels need different policies

• Breached lightbulb: quarantine and create new policy for correct behavior

• Compromised core switch? The right policy for the right level of threat

Or

Entry point: networked light bulb

Kill illegitimate

tunnel

Example 1 Example 2

Software Defined Secure Network (SDSN) Policy Engine + Controller

Page 23: Holistic Network Protection

Converse With Your Network

Deploy a policy engine that communicates with the network • Analytics Capability Based on Network

Data

• Customizable UI Provides Data Correlation

• Utilize All Network Elements as Detection & Enforcement Points

• Future: Intent Based Policy Engine to Communicate Across Any Network Element

Your Enterprise Network

Cloud Security

Advanced Threat Prevention

Secure Threat Intelligence

Security Policy Dissemination Mgmt/UI: Policy, App Visibility, Threat Map, Events

Security Policy Controller

Network Elements

Page 24: Holistic Network Protection

Everything on Your Network can be a Potential Threat Entry-point

Normal and Abnormal Behavior

Normal operation: call home beacons, energy utilization

Is this normal? How to mitigate threat traversing the enterprise?

Abnormal behavior recognition: bursting traffic, abnormal high data download rate, slow data exfiltration, entry through different access points

Page 25: Holistic Network Protection

• Using the IBM Security Framework / IBM Security Blueprint to Realize Business-Driven Security

IBM’s Approach: Framework & Blueprint toward Security Maturity

Page 26: Holistic Network Protection

IBM Security Blueprint Expands on the business-oriented view of the IBM Security Framework and maps the domains to a core set of security components

Page 27: Holistic Network Protection

• Rings-Around-Things • Looking beyond the perimeter to stop threats from

infiltrating other network segments and data stores

• Software Defined Secure Networks (SD-SN) • Disaggregates software from hardware, enabling

better agility for both security deployment and enforcement

• Security Frameworks and Blueprints • Combining a business-risk-focused framework

with a technical security blueprint to achieve security maturity

How are these holistic examples?

Page 28: Holistic Network Protection

CONCLUDING THOUGHTS

Page 29: Holistic Network Protection

Closing in on a Security Vision

• Simplified Policy and Management across all network elements

• Adaptable Security Solution based on real time threat intelligence information

• Detection and Enforcement utilizing the entire network to protect you

• 360-approach for holistic network protection engaging strategies at the personnel, data, devices, applications, and infrastructure levels.

From Network Security to Secure Networks Building blocks for tomorrow’s Software Defined Secure

Networks

Page 30: Holistic Network Protection

Thank You

dzeedick @ juniper.net