Transcript
Page 1: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

BYOD @ Cisco

David Bell

Cisco InfoSec

October 7th, 2014

Cisco Secure 2014

Page 2: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Agenda

Introductions

Changing landscape(s)

Trusted Device

Differentiated Network Access

Witam

Page 3: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Introductions

Page 4: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 4© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Project Manager – Cisco InfoSec (Architecture Team)

Work scope focused on Cisco IT infrastructure projects

Sometimes projects from InfoSec

Most times from IT (or through IT from sales, engineering, services, etc)

Role focused on driving security initiatives through IT partnership

Insure InfoSec requirements are included in non-InfoSec projects

Align InfoSec priorities with the changing IT landscape

Balance security goals w/ the experience and features IT desire

[email protected] http://www.linkedin.com/in/llebevad

David Bell

Page 5: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Reports to our Chief Operating Officer (COO)

Generally* doesn’t operate security infrastructure

Major organizations:

Architecture (BYOD aligns here)

Data Governance

Hosted Services – WebEx, Cisco Web Security, IronPort, Cisco Cloud Services

Incident Response

PKI

Security Operations – Audit, PenTest, Assessments, Service Mgmt

Cisco InfoSec

Page 6: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 6© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco Systems

• Worldwide leader in networking for the Internet

• Founded in 1984

• $108+ billion market capitalization

• $46+ billion cash/cash equivalents

• $5.8 billion a year in R&D

• 140+ acquisitions

• 650+ active suppliers

• 86% of products distributed via channel

• 100,000+ employees and contractors

• 24,000+ engineers in 1800+ labs worldwide

• 8,000+ patents issued to Cisco inventors

• Global presence in 165 countries

Best in the World, Best for the World

Page 7: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 7© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Changing Landscapes

Page 8: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 8© 2013-2014 Cisco and/or its affiliates. All rights reserved.

2010-2011

Tablet Support

AnyConnect on Trusted Devices

WebEx and Jabber

2012

Cisco AppStores

MacBook Air

Mobile Apps

Desktop Optimization and Go Native Strategy

2013+

Pilot for non-Cisco laptops

eStore for mobile

Cloud Services

2003-2008

Corporate-Paid Devices

Good Mobile

Windows XP

Cisco IT – AnyDevice Growth

2009

Mobile BYOD Mandate

Mobile Mail and Wi-Fi on iPhone, BlackBerry, Android, etc.

MacBook Pro

+61%2 years

Cisco

Mobile Devices

Page 9: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 9© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Cisco IT – AnyDevice Management

Page 10: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.

IT Client Environment

Desktop Apps

Mobile Apps

Responsive Web

Trusted Cloud Public Cloud

Email

EDM & Search

Corporate PC

Mobile devices Hybrid devices

New Appliances

Wearables

Softw

are

Hard

ware

eStore

Suppo

rt

Cloud Connectors

Cloud

services and

native apps

Secure

access to

files stored

in the Cloud

Multiple

Devices

(Corporate &

BYOD)

Simplified

device on-

boarding &

refresh

Simplified &

optimized

device

experience

Seamless

transition

between

devices

Personalised

& proactive

support

Silent

security that

follows the

userUntrusted Devices

Untrusted Apps & Services

Security

Personalisation Identity Compliance

Tru

sted

Dev

ice

Dat

a P

rote

ctio

n

Man

agem

ent

Ant

i-mal

war

e

Hel

p D

esk

Pro

activ

e S

uppo

rt

Sel

f Sup

port

Tra

inin

g &

FA

Q’s

ConnectivityWired & wireless Cost management

Apps

DaaS

Page 11: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 11© 2013-2014 Cisco and/or its affiliates. All rights reserved.

The Culture Has Changed, and So Must Our Approach

Perspectives about security have changed It’s a roadblock It enables the business

It’s not my problem Everyone needs to own security

Technology metamorphoses Disjointed point solutions Integrated architectural play

Physical infrastructure – slow to change Virtual infrastructure – flexible, dynamic, change-ready

The office contains all my stuff My mobile devices are my office (Data, Apps, Voice, Video)

Architecture approach has changed Perimeters as the control point Identity is the new perimeter

Focus on protecting the infrastructure Focus on protecting the data

Capabilities not tightly aligned Services, Service Categories, Service Offerings

The threats have changed Individuals Organized criminals/hacktivists

Disparate groups Nation State

Capture individual users data Gain access to your Data (and your customer ‘s data)

Page 12: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 12© 2013-2014 Cisco and/or its affiliates. All rights reserved.

What are the threats for the endpoints?

• Phishing and Data Exfiltration

• Network attacks

• Malware/Exploits (RansomWare: Cryptolocker)

• Advanced Persistent Threats (APTs) - Foreign threats that are highly targeted and financially motivated to retrieve intellectual property.

• Lost/Stolen Device

How are they addressed

• Data Protection: Encryption (Lost/Stolen desktops)

• Known Threats: VirusScan (file scanning)

• Unknown Threats/Exploits: HIPS (IPS/behaviour scanning + Firewall)

• Global Threat Intelligence: Cloud-based protection

Security Models

Trusted Device components

Defense in Depth components

Device Security LandscapeExtend Full Security

Capabilities Cross-Platform,

Mobile, and Cloud

1

Shift to proactive

defense against most

dangerous attack vectors

2

Drive Adoption and

Enforcement of new

capabilities

3

Evolve Sec Ops

Risk and Problem

Management

4

Page 13: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 13© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Collaboration

Mobility

LegalLocal

Laws Cost

Management

Internet of

Everything

User

Experience

Identity

Data Protection

Biometrics

Interoperability

Business

need?

Passwords

Data

Sovereignty

Cloud

Consumption

Public

Hybrid

On the platform

In the

appLeft

behind

New

Platforms

Chasing the

endpoint

IPV6

Parity

Simple

Privacy

AttacksPrivate

Nation

State

Organized

Crime

Targeted

Hacktivist

Drive

bySeamless

Role

Based

Page 14: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 14© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Trusted Device

Page 15: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 15© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Policy

Physical Security

Network Security

Computer Hardening

Application Security

Data Security

Antivirus software, Host Intrusion-Prevention

System (HIPS), Encryption, Firewall, Minimum

OS, Software Patching, PW and Screen-Lock,

Device Registration and Inventory, Remote

Wipe

Computer Hardening

InfoSec Trusted Device Policy:

Set of security capabilities, by platform, required

to access the corporate network.

Policy

Change Management, Dual Authentication, and

Restrictive Access

Device Access Hardening

Page 16: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 16© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Code of Business Conduct

Corporate Information

Security Policies

Network Access Policy

Trusted Device Standard

Policy Hierarchy

COBC: “I agree to comply with InfoSec Policy”

InfoSec Policy: “Network Access defines rules for accessing Corporate resources”

Network Access: “Only devices meeting Trusted Device will be allowed to access Corporate resources”

Trusted Device: “All devices must have these security controls in place”

Page 17: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 17© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Device Registration

Anti-Malware

Encryption (Cisco Data)

Minimum OS

Software Patching

Rooted Device Detection *

Remote wipe (Cisco Data) *

Password/Screen-lock Enforcement

Hardware/Software Inventory

* Mobile device only

Policy: Trusted Device Requirements

Page 18: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 18© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Fragmented solutions

are complex to manage

for both Operations and

User Experience

Extending Security

Capabilities and

support to multiple

Platforms

Managed base security

requirements and

focused on main

platforms

Add hardened security

capabilities: Device

Posture, DLP, and

Forensics

Leverage a Go Native

Strategy to improve

User ExperienceMaintain Native strategy

AND leverage Cisco Tools

Extending Security

Capabilities and

support to multiple

Platforms

Enabled base security

requirements and

focused on main

platforms

Leverage a Go Native

Strategy to improve

User Experience

Encryption

Device Naming

10 min PIN / Screenlock

Altiris Script

Inventory + Patching

Then

Minimum Access

Policy

Policy aligns to user demand,

minimal requirements

AntiMalware

McAfee AV + HIPS

Encryption + Device Naming + PIN + Inventory + Patch

Management + Remote Wipe + Minimum OS

Native Controls + DM:

SCCM/Casper/Afaria

Posture + Differentiated Ntwk Access

ISE

Data Loss Protection

Symantec

Encryption + Device Naming + PIN + Inventory + Patch

Management + Remote Wipe + Minimum OS

SCCM/Casper/Afaria

Trusted Device

Go Native. Scale access and

services cross platform.

Antivirus + Forensics

SourceFire + CWS

AntiMalware

CSA HIPS

AntiMalware

Then TodayFY13 FY14 FY15/16

Browser Hardening

Trusted Device +

Network Enforcement

Access based on device posture

leveraging Cisco TrustSec

Page 19: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 19© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Trusted Device Quadrants

Cisco Managed• Full Network Access

• Cisco, Employee or 3rd party

owned

• Corporate Policy Applied

• Device Management

• Cisco Confidential Access

Internet Only• Internet \ Public Cloud Only

• Virtualization for Confidential

• Extranet, Vendor

Remediation

Requirede.g. out of date DAT's, patches

Trusted

Managed

Trusted

Unmanaged

Untrusted

Managed

Untrusted

Unmanaged

Non-Cisco Managed• Full Network Access

• Cisco, Employee or 3rd party

owned

• Corporate Policy Applied

• Self \ Partner Managed

• Cisco Confidential Access

Page 20: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 20© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Network Access

Page 21: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 21© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Code of Business Conduct

Corporate Information

Security Policies

Network Access Policy

Trusted Device Standard

Policy Hierarchy

COBC: “I agree to comply with InfoSec Policy”

InfoSec Policy: “Network Access defines rules for accessing Corporate resources”

Network Access: “Only devices meeting Trusted Device will be allowed to access Corporate resources”

Trusted Device: “All devices must have these security controls in place”

Page 22: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 22© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Covers all devices – personal, Corporate, partner

PCs and Infrastructure

From anywhere – on-campus, remote, wired/wireless, partner sites

Right to Audit and Monitor

References requirement to meet the Trusted Device Standard

“Devices that fail to comply are not entitled to full access to the network and may receive only limited network access”

Policy: Network Access

Page 23: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 23© 2013-2014 Cisco and/or its affiliates. All rights reserved.

IT will deliver multiple capabilities with ISE

Access ControlAuthentication on

wired & wireless

networks

BYODSupport Trusted

Device Standard and

enable BYOD

ProfilingAbility to identify

users and devices

on our network

Endpoint

ProtectionProtect the network

from infected devices

Guest AccessRestrict unauthorized

devices & users to

Internet access only

Page 24: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 24© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Internet Only

Access

Full access

No restrictions

Limited Access

Corporate Owed

Trusted devices

Manager

Employee owned

Untrusted devices

IT Analyst

At Starbucks

Engineer/Coder

Employee owned

Semi-trusted devicesPolicy

Decision Point

Page 25: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 25© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Access Model

Only Trusted devices will have direct access to the core network

Untrusted devices will be limited to the Internet Only Network or Public Cloud

Different services will be enabled at each layer depending on security requirements

If required Untrusted devices can access the Core network by using a VXI session or virtualized applications

Core

Network

Internet Only

Network

Public Cloud

Trusted

Devices

Untrusted

Devices

Page 26: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 26© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Trusted Device and Differentiated Access thru Cisco ISE

Core

Network

Internet Only

Network

Public Cloud

Trusted

Devices

Trusted

Applications

Differentiated Network

AccessAccess based on device posture leveraging

Cisco ISE

Trusted Device

More controls needed to

scale access and services

Remote Wipe (Cisco Data)

Anti-Malware

Encryption (Cisco Data)

Minimum OS

Software Patching

Rooted Device Detection (Mobile

Devices Only)

Device Registration

Password/Screen-lock Enforcement

Hardware/Software Inventory

Tiered

Page 27: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 27© 2013-2014 Cisco and/or its affiliates. All rights reserved.

• Identity of a device on the network

• Quantify the risk

1. Profiling

• User and end device attribution

• Identification of end points on Wireless connections

2. Authentication

•Device security posture assessment

•Allows for better policy & security decisions

•Reactive control (EPS)

3. Posture

• Ability to enforce policy decisions based on context

• Untrusted devices have restricted access

4. Enforcement

ISE Capability Phasing

FY13/14 FY14 FY15/16FY15

ISE 1.2 ION

Profiling

ISE 1.2 Wireless Authentication

Monitor Mode for Wired

ISE 1.3 MDM integration

Global EPS

ISE 2.0NAC and ACS parity

“Four Stages of a Secure Network”

Page 28: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 28© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Challenges?

I don’t need your Security

My app “x” requires XP

I don’t want you see my personal data

Security controls impact my productivity

Page 29: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Dziękuję

Page 30: BYOD @ Cisco Secure... · BYOD @ Cisco David Bell Cisco InfoSec October 7th, 2014 Cisco Secure 2014

Cisco Confidential 30© 2013-2014 Cisco and/or its affiliates. All rights reserved.


Recommended