31
SAC-PA Workshop “Firewalls” and ScienceDMZ applications Brian Pasquini Director Information Security - University of Pittsburgh Kenny Holmes, CISSP ® Cyber Security Evangelist and Director Public Sector

SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

SAC-PA Workshop“Firewalls” and ScienceDMZ applications

Brian PasquiniDirector Information Security - University of Pittsburgh

Kenny Holmes, CISSP ®

Cyber Security Evangelist and Director Public Sector

Page 2: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Objectives

2 | © 2017 P alo A lto N etw orks, Inc. C onfidential and P roprietary.

• Trust

• We have a consumption issue

• Automation, Orchestration, and Leverage

• The third-evolution of Cyber-Security

• Philosophy of prevention oriented security

• Minimize the spread of attacks by providing protection based on comprehensive global, industry, and organizational threat data

• Enforce automated preventative measures with a security platform in tap mode or in-line

Page 3: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

TECHNOLOGY ISPART OF OUR LIVES

Page 4: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your
Page 5: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Source identity @2018 Dark Reading: 2017 Smashed World’s Records for Most Data Breaches, Exposed Information by Kelly Jackson Higgins.White House Council of Economic Advisers Report. February 2018

Breaches reported in 2017

5,207US breach cost 2016, up to

$109Bn

Page 6: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

OFFICE OF THE CISO

CONSUMING CYBERSECURITY IS BECOMING IMPOSSIBLE

Page 7: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

NO SINGLE ENTITYCAN DO ALL INNOVATION

Page 8: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

8 | © 2017, P alo A lto N etw orks. A ll R ights R eserved.

AUTOMATION, ORCHESTRATION, AND LEVERAGE

Page 9: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

EVOLUTION II

EVOLUTION IIIPALO ALTO N ETW O R KS APPS 3rd PAR TY PAR TN ER APPS C U STO M ER APPS

CLOUD-DELIVERED SECURITY SERVICESThreat P revention U R L F iltering M alw are Analysis

9 | © 2018 P alo A lto N etw orks. A ll R ights R eserved.

APPLICATION FRAMEWORK & LOGGING SERVICE

NETWORK SECURITY ADVANCED ENDPOINT PROTECTION CLOUD SECURITY

Page 10: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Philosophy for prevention

1

0

Reduce attack surface area

• Enable business apps• Block “bad” apps• Limit app functions• Limit file types• Block websites• Require multi-factor

authentication

Prevent all known threats

• Exploits• Malware• Command & control• Malicious websites• Bad domains• Credential theft

• Dynamic Analysis• Static Analysis• Attack techniques• Anomaly detection• Analytics

Detect & prevent new threats

• All applications• All users• All content• Encrypted traffic• SaaS• Cloud• Mobile

Complete visibility

Page 11: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Next GenerationSecurity Platform

Next-Generation Firewall

And More..

2

Automated Prevention Touch Points Continuous Protection

C loud Security Services

3rd Party SolutionsEDR | SIEM | IR Systems | O365

3

•JSON•JSON-SEQ•STIX/TAXII

High-Fidelity IOC’s

URLDomain

IP

HashRegex

AutoFocus3rd Party Intelligence Correlation and

Aggregation

11 | © 2015, P alo A lto N etw orks. C onfidential and P roprietary.

A utom ated Protection #2

N etw ork D evice w / A C L

API, External Dynamic List-5min updates

IP, URL, DomainPython/EEM/TCL ACL Updates

A utom ated Protection #3API/External Dynamic ListWhite List OR Black List

Python/EEM/TCL ACL Updates

A utom ated Protection #1-5 min updates

WF-AV, C2, DNS, URL230K+ protections daily

Static Bare metalMachine Dynamic

ENDPOINT IOT

1

Page 12: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Scaling Option 1

12 | © 2017 P alo A lto N etw orks, Inc. C onfidential and P roprietary.

LAN

Nexus 7Ks

Nexus 9Ks

Optional TapAggregator

PA-5260

ENDPOINTS ENDPOINTS ENDPOINTS ENDPOINTS

Page 13: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Scaling Option 2

13 | © 2017 P alo A lto N etw orks, Inc. C onfidential and P roprietary.

LAN

Nexus 7Ks

Nexus 9Ks

Tap Aggregator

PA-5260Central Mgmt.

Page 14: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

14 | © 2017 P alo A lto N etw orks, Inc. C onfidential and P roprietary.

LAN

Nexus 7Ks

Nexus 9Ks

PA-7080

Scaling Option 3

Central Mgmt.

Page 15: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

THANK YOU

Page 16: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

THANK YOU

Page 17: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Additional Information

17 | © 2017 P alo A lto N etw orks, Inc. C onfidential and P roprietary.

Page 18: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Physicalnetwork

Mobile

Privatecloud

CONSISTENT AND FRICTIONLESS PREVENTION EVERYWHERE.

IaaS

SaaS

PaaS

Page 19: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

PALO ALTO NETWORKS SECURITY OPERATING PLATFORM

19 | © 2018 P alo A lto N etw orks. A ll R ights R eserved.

PREVENT SUCCESSFUL

CYBERATTACKS

FOCUS ON WHAT MATTERS

CONSUME INNOVATIONS

QUICKLYPalo Alto Networks, 3rd party,

and customer deliveredOperate with ease using

best practicesAutomate tasks using context and analytics

BUILT FOR AUTOMATION

Page 20: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Disrupting the cyber-security consumption model

20 | © 2017, P alo A lto N etw orks. A ll R ights R eserved.

AUTOFOCUSHUNTING

URL FILTERING

MINEMELDTHREAT SYNDICATION

LIGHTCYBERBEHAVIORAL ANALYTICS

3rd PARTY APP 3rd PARTY APP

YOUR IN-HOUSE APP

NETWORK

PERIMETER MOBILE CORE DATA CENTER

A U T O M A T E D T H R E A T P R E V E N T IO N S E R V IC E S

DATA FROM LOGS & TELEMETRY

ENDPOINT IOT CLOUD SAAS

AZUREAWS GOOGLE SALESFORCE

THREAT PREVENTION WILDFIRE

Page 21: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Disrupting the cyber-security consumption model

21 | © 2017, P alo A lto N etw orks. A ll R ights R eserved.

AUTOFOCUSHUNTING

URL FILTERING

MINEMELDTHREAT SYNDICATION

LIGHTCYBERBEHAVIORAL ANALYTICS

3rd PARTY APP 3rd PARTY APP

YOUR IN-HOUSE APP

NETWORK

PERIMETER MOBILE CORE DATA CENTER

A U T O M A T E D T H R E A T P R E V E N T IO N S E R V IC E S

DATA FROM LOGS & TELEMETRY

ENDPOINT IOT CLOUD SAAS

AZUREAWS GOOGLE SALESFORCE

THREAT PREVENTION WILDFIRE

>1003rd party feeds

350 MillionU nique Protections

5 minuteautom ated updates

~19K Wildfire custom ers(> 45K NGFW Customers)

>3.1 Billionfiles scanned

>1 Trillionartifacts learned

(IP addr, processes, domains)

~50k New Protectionspublished/day

~250k Malware threatslearned/day

>6M New filesscanned/day

Page 22: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

WildFire

215M+Never before seen samples every month

19,500+Global customers ac5vely submi7ng samples

Firewalls

Traps

Industry sharing

150+ Partner integrations

3rd party IntegrationAPI

Aperture

3rd Party Intel Feeds

Unit 42

AutoFocus/MineMeld

PAN-DB

230,000+New protections delivered daily every 5 minutes

Threat Intelligence Cloud

Page 23: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

WildFire

3.1BSample Files in AutoFocus

1,500+Unit 42 Malware Tags

1.2TArtifacts in

AutoFocus

Firewalls

Traps

Industry sharing

150+ Partner integrations

3rd party IntegrationAPI

Aperture

3rd Party Intel Feeds

Unit 42

AutoFocusMineMeld

PAN-DB

150+ Built in 3rd Party Feed Connectors

AutoFocus

Page 24: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Our approach to enterprise security

App-IDIdentify the application

User-IDIdentify the user

Content-IDScan the content

Page 25: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

PA-5200 Series

25 | © 2017 P alo A lto N etw orks, Inc. C onfidential and P roprietary.

• New advanced architecture delivers up to 72 Gbps* (App-ID) and 30 Gbps* (Threat Prevention)

• Up to 32M sessions; 3.2M SSL decrypt session capacity

• Higher port density, 40G and 100G I/O support for diverse deployments

*Performance specs derived from HTTP traffic with 64K transaction size

Page 26: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

PA-5220

• 18 Gbps App-ID• 9 Gbps Threat Prevention• 5 Gbps IPSec VPN• 4,000,000 sessions• (4) 40G QSFP+• (16) 1G/10G SFP/SFP+• (4) 100/1000/10G Copper

PA-5250

• 35 Gbps App-ID• 20 Gbps Threat Prevention• 14 Gbps IPSec VPN• 8,000,000 sessions• (4) 40G/100G QSFP28• (16) 1G/10G SFP/SFP+• (4) 100/1000/10G Copper

PA-5260

• 72 Gbps App-ID• 30 Gbps Threat Prevention• 21 Gbps IPSec VPN• 32,000,000 sessions• (4) 40G/100G QSFP28• (16) 1G/10G SFP/SFP+• (4) 100/1000/10G Copper

PA-5200 Series Specifications

26 | © 2017 P alo A lto N etw orks, Inc. C onfidential and P roprietary.

• Hot swappable fans, power supplies • Dual SSD system drives (240GB) and dual HDD logging drives (2TB)• Dedicated HA and management interfaces• 3U, 2 and 4 post rackmount units• Front to back airflow with replaceable filters• NEBS Level 3 Certified

Page 27: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

PA-5200 Series Architecture

27 | © 2017 P alo A lto N etw orks, Inc. C onfidential and P roprietary.

Security Processors• High density parallel processing• Hardware-acceleration for

standardized complex functions (SSL, IPSec, decompression)

1 0 0 G b p s

FE-100 Network Processor• 100 Gbps front-end network

processing• Hardware accelerated per-packet

route lookup, MAC lookup and NAT

Data Plane

Flow control

Route, ARP, MAC lookup

NAT

...

SSL IPsec De-Comp

CPU48

CPU1

RAM

RAM

Control Plane

CPU1SSD

SSDCPU2

CPU3 CPU4 1 3 G b p s

...

Signature Match

SSL IPsec

De-Comp

CPU40/48

CPU1

RAM

RAM

RAM

RAM

RAM

RAM

1 3 G b p s

...

SSL IPsec

De-Comp

CPU48

CPU1 RAM

RAM

Logging System

CPU9RAM

RAM

HDD

HDD

CPU10

CPU11 CPU12

PA-5220 PA-5250 PA-5260

Firs

t Pac

ket P

roce

ssor

(FPP

)

1 3 G b p s

CPU5 CPU6

CPU7 CPU8RAM

RAM

RAM

RAM

RAM

RAM

Page 28: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

7080 Benefits

• Managed and licensed as a single system regardless of how many NPCs used• Consistent PAN-OS feature set• Managed by webUI, CLI, or Panorama• Support and subscriptions are system-wide

• Easily integrates into any network• Virtual wire means plug-n-play level integration into nearly

any network• L2, L3 mode provide added integration options• Active/Active or Active Passive ensures resiliency

Page 29: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

At the perimeter

§ Protect the network§ Reduce threat exposure by blocking

high risk applications§ Enable applications based on need

and user credentials§ Block known/unknown threats§ Control web activity§ Inspect encrypted traffic

§ Key features: System capacity and performance, zone-based architecture, networking, SSL decryption

Page 30: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Power that predictably scales to 100 Gbps

Nearly 700 processors dedicated to protecting your data

§ Network processing card (NPC)§ 670 processors distributed across 10 NPCs § Executes all networking and security

processing functions§ Scales to 100 Gbps by adding an NPC as

needed

§ Switch management card (SMC)§ 14 processors intelligently manage all traffic

to maximize resource utilization

§ Log processing card (LPC)§ 14 processors dedicated to managing high

volume log processing tasks

Page 31: SAC-PA2 Kenny Holmes ScienceDMZ Research Proposal · 2018-06-16 · hunting url filtering minemeld threat syndication lightcyber behavioral analytics 3rd party app 3rd party app your

Intelligent traffic management

First Packet Processor

§ Dedicated subsystem designed to deliver scalable connection setup

§ Intelligently allocates security processing resources based on configurable administrative controls

§ Automatically scales traffic processing as new cards are added