31
1 Strategies to Address SANS Critical Controls 10 and 11 - Secure Configurations and Control of Network Devices John Pescatore, SANS Michelle Johnson Cobb, Skybox Security Brian Kelly, Skybox Security

Using a Network Model to Address SANS Critical Controls 10 and 11

Embed Size (px)

Citation preview

Page 1: Using a Network Model to Address SANS Critical Controls 10 and 11

1

Strategies to Address SANS Critical Controls 10 and 11 -

Secure Configurations and Control of Network Devices

John Pescatore, SANSMichelle Johnson Cobb, Skybox Security

Brian Kelly, Skybox Security

Page 2: Using a Network Model to Address SANS Critical Controls 10 and 11

2

Making Security Advances During Turbulent Times

Prevent more, detect faster, respond more effectively Third party connections are increasingly targeted

How to implement security zones without impacting business? Misconfigured security controls worse than no controls at all

Page 3: Using a Network Model to Address SANS Critical Controls 10 and 11

3

Disrupting the Breach Chain

Source: SecurityIntelligence.com

Page 4: Using a Network Model to Address SANS Critical Controls 10 and 11

4

Target Breach Lessons Learned

• Why could HVAC contractors see POS systems/servers?○ Zoning

• Why could PoS system malware talk to server?○ Application control policies

• Why could internal file server talk to external world?○ All of the above

• Usual reasons:○ Segmentation broke apps or sys admin○ Policy was changed “temporarily”

Page 5: Using a Network Model to Address SANS Critical Controls 10 and 11

5

The Critical Security Controls History

• 2008 – NSA “Consensus Audit Guidelines”• 2009 – Center for Strategic and International Studies publishes

the “20 Critical Security Controls”• 2011 – SANS takes over stewardship• 2013 – Council on Cybersecurity formed• 2015 – Critical Security Controls and Council become part of

the Center for Internet Security (MS-ISAC)

Page 6: Using a Network Model to Address SANS Critical Controls 10 and 11

6

Critical Security Controls

6

1 23

4

5

6

7

89

1011121314

15

16

17

1819 20

1) Inventory of Authorized and

Unauthorized Devices

11) Limitation and Control of Network Ports,

Protocols and Services

2) Inventory of Authorized and Unauthorized Software

3) Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers

4) Continuous Vulnerability Assessment and Remediation

5) Malware Defense

6) Application Software Security

7) Wireless Access Control

8) Data Recovery Capability

9) Security Skills Assessment and Appropriate Training to Fill Gaps

10) Secure Configuration of Devices such as Firewalls, Routers, and Switches

20) Penetration Tests and Red Team Exercises

19) Secure Network Engineering

18) Incident Response Capability

17) Data Protection

15) Controlled Access Based on Need to Know

14) Maintenance, Monitoring and Analysis of Audit Logs

13) Boundary Defense

12) Controlled Use of Administrative Privileges

16) Account Monitoring and Control

Page 7: Using a Network Model to Address SANS Critical Controls 10 and 11

7

Critical Security Controls V6 DraftCritical Security Controls Version 5.1 Critical Security Controls Draft 6.0

1 Inventory of Auth/Unauth Devices Inventory of Auth/Unauth Devices

2 Inventory of Auth/Unauth Software Inventory of Auth/Unauth Software

3 Secure Configurations for HW/SW Secure Configurations for HW/SW

4 Continuous Vulnerability Assessment Continuous Vulnerability Assessment

5 Malware Defenses Controlled Use of Admin Privileges

6 Application/Software Security Maint, Monitor, Analysis of Audit Logs

7 Wireless Access Control Email/Browser Security (new)

8 Data Recovery Malware Defenses

9 Security Skills Limitation/Control of Ports

10 Secure Configurations for Network HW Data Recovery

Page 8: Using a Network Model to Address SANS Critical Controls 10 and 11

8

Critical Security Controls V6 DraftCritical Security Controls Version 5.1 Critical Security Controls Draft 6.0

11 Limitation/Control of Ports Secure Configurations for Network HW

12 Controlled Use of Admin Privileges Boundary Defenses

13 Boundary Defenses Data Protection

14 Maint, Monitor, Analysis of Audit Logs Controlled Access/Need to Know

15 Controlled Access/Need to Know Wireless Access Control

16 Account Monitoring and Control Account Monitoring and Control

17 Data Protection Security Skills

18 Incident Response and Management Application and Software Security

19 Secure Network Engineering Incident Response and Management

20 Penetration Test/Red Team Exercises Penetration Test/Red Team Exercises

Page 9: Using a Network Model to Address SANS Critical Controls 10 and 11

9

Continuous Processes

Shield

Eliminate Root Cause

Monitor/Report

Policy Assess Risk

Baseline Vuln Assessment/Pen TestSecure Configuration

Mitigate

• FW/IPS• Anti-malware• NAC

• Patch Management• Config Management• Change Management

• Software Vuln Test• Training• Network Arch• Privilege Mgmt

Discovery/Inventory

• SIEM• Security Analytics• Incident Response

ThreatsRegulationsRequirementsOTT Dictates

Page 10: Using a Network Model to Address SANS Critical Controls 10 and 11

10

Bottom Line: Avoiding Self Inflicted Wounds

• Zoning or segmenting the network is Security 101• Flat networks are usually the path of least resistance• Reducing attack apertures without impacting business flows

requires○ Next Generation Firewall/Application Aware Policies○ Accurate and timely inventory○ Rapid reaction to both change requests and alerts○ Repeatable, scalable policy management processes and governance

Page 11: Using a Network Model to Address SANS Critical Controls 10 and 11

Michelle Johnson CobbVP, Worldwide Marketing

Using a Model of the Attack Surface to Address SANS Critical Controls 10 & 11

Page 12: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 12

Skybox Security Overview

Powerful platform uses attack surface visibility and intelligence to address:– Firewall and change management– Network visibility and compliance– Vulnerability and threat management

Over 500 Global 2000 Customers

Risk Analytics for Cyber Security

Page 13: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 13

Challenges implementing Controls 10 & 11

Problem 1: Tons of Vendors

Problem 2: Complex Rulesets

Problem 3: Changes

• 500 network devices

• 25,000 FW rules• 1,000 IPS

signatures• 55,000 nodes• 65 daily network

changes• Infrastructure

spanning three continents

• Will a change introduce a new exposure?

• Are IPS signatures up to date?

• Impact of new vulnerabilities on network devices, hosts?

Page 14: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 14

How do you analyze complex data?

Meterology: Climate models

Aerospace: Flight simulators

Information Security

?

Page 15: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 15

How do you analyze complex data?

Meterology: Climate models

Aerospace: Flight simulators

Information Security: Attack surface model

?

Page 16: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 16

Gain Visibility of the Attack Surface

Page 17: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 17

Gain Visibility of the Attack Surface

ASSETS

• Servers

• Workstations

• Networks

Page 18: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 18

Gain Visibility of the Attack Surface

SECURITY CONTROLS

• Firewalls

• IPS

• VPNs

ASSETS

• Servers

• Workstations

• Networks

Page 19: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 19

Gain Visibility of the Attack Surface

SECURITY CONTROLS

• Firewalls

• IPS

• VPNs

NETWORK TOPOLOGY

• Routers

• Load Balancers

• Switches

ASSETS

• Servers

• Workstations

• Networks

Page 20: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 20

Gain Visibility of the Attack Surface

SECURITY CONTROLS

• Firewalls

• IPS

• VPNs

NETWORK TOPOLOGY

• Routers

• Load Balancers

• Switches

ASSETS

• Servers

• Workstations

• Networks

VULNERABILITIES

• Location

• Criticality

Page 21: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 21

Gain Visibility of the Attack Surface

SECURITY CONTROLS

• Firewalls

• IPS

• VPNs

NETWORK TOPOLOGY

• Routers

• Load Balancers

• Switches

ASSETS

• Servers

• Workstations

• Networks

VULNERABILITIES

• Location

• Criticality

THREATS

• Hackers

• Insiders

• Worms

Page 22: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 22

Critical Security Control 10

“Establish, implement, and actively manage (track, report on, correct) the security configuration of network infrastructure devices using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings.”

#10

Page 23: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 23

Analytics to Maintain Secure Configurations

Firewall rule analysis Platform configuration checks Network compliance Path visualization Rule optimization Change planning Rule lifecycle management

Page 24: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 24

Critical Security Control 11

“Manage (track/control/correct) the ongoing operational use of ports, protocols, and services on networked devices in order to minimize windows of vulnerability available to attackers.”

#11

Page 25: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 25

Attack Simulation to Find and Minimize Risks

Visualize Correlate, Prioritize

Exploitable VulnerabilitiesCVE-1234CVE-0123MS12074CVE-4567CVE-5678

Page 26: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 26

Attack Simulation to Find and Minimize Risks

Visualize Correlate, Prioritize

Understand Controls

Security Controls

Access pathsPolicy violations

Unauthorized changes

Page 27: Using a Network Model to Address SANS Critical Controls 10 and 11

© 2015 Skybox Security Inc. 27

Attack Simulation to Find and Minimize Risks

Visualize Correlate, Prioritize

Understand Controls

Identify Attack Vectors

High-risk vector

Page 28: Using a Network Model to Address SANS Critical Controls 10 and 11

Brian KellySales Engineer

Demo: Security Policy Management with Skybox

Page 29: Using a Network Model to Address SANS Critical Controls 10 and 11

29

Page 31: Using a Network Model to Address SANS Critical Controls 10 and 11

31

Acknowledgements

Thanks to our sponsor:

And to our attendees:

Thank you for joining us today