| 0 comments ]

Cisco Self-Defending Networks

Add a note here In the past, threats from internal and external sources moved slowly and it was easy to defend against them. Now Internet worms spread across the world in a matter of minutes. Security systems, and the network itself, must react instantaneously. As the nature of threats to organizations continues to evolve, the defense posture taken by network administrators and managers must also evolve.

Add a note hereThe Cisco Self-Defending Network strategy describes the Cisco vision for security systems and helps customers more effectively manage and mitigate the risks to their networked business systems and applications.

Add a note here Changing Threats and Challenges

Add a note here Figure 1-24 shows how the threats that organizations face have evolved over the past few decades, and how the growth rate of vulnerabilities reported in operating systems and applications is rising. The number and variety of viruses and worms that have appeared over the past three years is daunting, and their rate of propagation is frightening. There have been unacceptable levels of business outages and expensive remediation projects that consume staff, time, and funds that were not originally budgeted for such tasks.

Click to collapse
Add a note hereFigure 1-24: Threat Evolution

Add a note here Figure 1-24 also shows that blended threats are evolving. A blended threat uses multiple means of propagation. These threats often have the characteristics of a virus; for example, they can attach themselves parasitically to email attachments. These threats self-replicate across a network with worm-like capability, and frequently search for and exploit a system or application vulnerability, or multiple vulnerabilities, to gain access to a host and deliver their payload. Some believe that blended threats might be evolving into “flash” threats that could exploit new, unknown vulnerabilities, and have the capability to propagate across the Internet in seconds, seriously affecting the Internet on a global scale.

Add a note hereAlso, notice on Figure 1-24 that the trends are becoming regional and global in nature. Early attacks affected single systems or one organization’s network. In contrast, more recent attacks are affecting entire regions. For example, attacks have expanded from individual DoS attacks from a single attacker against a single target to large-scale DDoS attacks emanating from networks of compromised systems known as botnets.

Add a note hereThreats are also becoming persistent. After an attack starts, attacks might appear in waves as infected systems join the network. Because infections are so complex and have so many end users (employees, vendors, and contractors), multiple types of endpoints (company desktop, home, and server), and multiple types of access (wired, wireless, VPN, and dialup), infections are difficult to eradicate.

Add a note hereNetwork-dependent enterprises constantly face security dilemmas in the typical business environment. You can no longer secure networks just by securing the network perimeter. Businesses have consolidated their data centers, converged internal networks, and embraced the Internet. Environments that were once self-contained and controlled are now open to partners through business-to-business extranets, retail outlet connections, and home-based employees. By extending the corporate network, the trust boundary has extended across untrusted intermediate networks and into uncontrolled environments.

Add a note hereThe growing list of devices that access networks poses more problems. Many devices do not comply with corporate policies. Network users often use compliant devices to access other uncontrolled networks before connecting into the corporate network. As a result, devices on these external networks can become conduits for attacks and related misuse. The following are some of the issues that concern network security experts:

  • Add a note here Common application interfaces: The emergence of common application interfaces based on messaging protocols, such as Extensible Markup Language (XML) and SOAP, formally known as Simple Object Access Protocol, has increased e-commerce and corporate productivity. However, similar to most new technologies, these new message protocols have introduced an entirely new set of vulnerabilities and attack vectors that corporations need to protect. In the past, firewall policies would filter data carried across many network protocols. Now, single transport protocols, such as HTTP on TCP port 80, transport that data. As a result, much of the data that previously resided in packet headers now resides in the packet payload. This change creates significant processing challenges that make it easier for an attacker to evade classic network defenses.

  • Add a note here Security hampering policy: To meet the data confidentiality and integrity requirements of corporations, more applications are using Secure Sockets Layer (SSL), Transport Layer Security (TLS), and HTTPS protocols to encrypt application-level traffic. This trend makes it much harder for IT departments to enforce corporate access policies at the network perimeter, because they cannot inspect the packet payloads of those encrypted flows. Many organizations mistakenly assume that if they comply with regulations, their infrastructure is more secure, which is frequently not the case. Following the law of unintended consequences, the very act of creating compliance can introduce new vulnerabilities. For example, worms and viruses can spread more effectively in a network supporting end-to-end VPNs because the intermediate nodes have no visibility into the traversing traffic. Such traffic can carry worms to sensitive corporate servers in a secure, encrypted packet. End-to-end VPNs can make it more difficult to remediate the problem and it can take longer to diagnose such an attack.

  • Add a note here Blurred perimeters: The wireless and mobile network within an enterprise now supports laptops, personal digital assistants (PDA), and mobile phones that have more than one network connection. These multihomed hosts are capable of establishing impromptu wireless networks to enable peer-to-peer communication. In addition, these devices effectively forward packets at the application level. As a result, network boundaries become much more ambiguous. To manage a secure system and maintain network availability, corporations must be able to extend a control point onto these mobile devices.

Add a note hereTo illustrate the seriousness of network vulnerabilities, consider the effects of the SQL Slammer worm, first seen on January 25, 2003:

  • Add a note hereSaturation point was reached within two hours of the start of infection.

  • Add a note hereInfections doubled every 8.5 seconds.

  • Add a note hereSQL Slammer spread 100 times faster than Code Red.

  • Add a note hereAt its peak, SQL Slammer scanned 55 million hosts per second.

  • Add a note hereThe number of hosts infected was between 250,000 and 300,000.

  • Add a note hereInternet connectivity was affected worldwide.

Add a note hereSource: Cooperative Association for Internet Data Analysis (CAIDA) and the University of California at San Diego.

Add a note hereSQL Slammer compromised 90 percent of vulnerable systems within the first 10 minutes, and doubled in size every 8.5 seconds. Within the first 3 minutes, it achieved its maximum scanning rate of more than 55 million scans per second.

Add a note here Building a Cisco Self-Defending Network

Add a note hereA Cisco Self-Defending Network uses the network to identify, prevent, and adapt to threats. Unlike point-solution strategies, in which you purchase products individually without consideration for which products work best together, a network-based approach is a strategic approach that meets the current challenges and evolves your security capability to keep ahead of the curve.

Add a note hereThe following are key principles of a Cisco Self-Defending Network:

  • Add a note hereIntegrate security throughout the existing infrastructure. Security should be built in, not bolted on.

  • Add a note hereThere should be collaboration between security and the network so that they leverage off each other and work together.

  • Add a note here The network should have the capability to intelligently evolve and adapt to emerging threats.

Add a note hereCisco Self-Defending Network increases the value of your investment over time (contrary to point solutions, where the costs increase over time due to posture erosion, inconsistencies, and complexities).

Add a note hereA common infrastructure offers savings over time while supporting business transformations. A common infrastructure allows simplified management, which greatly reduces the evolution of gaps in controls that typically materialize over time. Management is more likely to be correctly and consistently performed when it is simplified, which allows the identification of gaps before they become disabling vulnerabilities in the posture.

Add a note hereThe process of assessing the environment, identifying gaps, applying changes, and ultimately auditing those controls becomes much more efficient when you have more consistent controls and visibility.

Add a note hereAn additional compelling argument for a Cisco Self-Defending Network design is the reality that introducing a common infrastructure falls within the scope of the other strategies for implementation. Specifically, each strategy is governed by product life cycle management. In spite of strategy differences, you can acquire the products that make up the infrastructure based on the traditional technology refresh cycles by which many IT organizations abide.

Add a note hereThe Cisco Self-Defending Network approach is comprehensive and covers the following aspects of security using specific tools:

  • Add a note here Policy-based management through Cisco Security Manager.

  • Add a note here Threat management through Cisco Security Monitoring, Analysis, and Response System (MARS).

  • Add a note here Network security through Cisco IOS Software, Cisco ASAs, and Cisco IPS Sensor Software.

  • Add a note here Endpoint security through Cisco NAC appliances and Cisco Security Agent.

Add a note hereThe following are additional benefits that result from this comprehensive, integrated approach:

  • Add a note here 360 degree-visibility and protection: Delivers comprehensive and proactive network defense

    Add a note hereInfrastructurewide threat intelligence that is cost-effectively delivered across a variety of systems and devices.

    Add a note hereMultivector threat identification captures policy violations, vulnerability exploits, and anomalous behavior.

  • Add a note here Simplified control: Streamlines policy and management across the network

    Add a note hereNetworkwide policy management.

    Add a note hereInfrastructurewide implementation across a variety of systems and devices.

  • Add a note here Proactive business protection: Ensures the operations of the enterprise

    Add a note here Unparalleled collaboration and correlation across systems, endpoints, and management enables adaptive response to real-time threats.

    Add a note hereKey element of the Cisco Self-Defending Network strategy.

Add a note hereThis enhanced threat control and containment solution portfolio delivers comprehensive threat protection across the entire infrastructure, ensuring business continuity and strengthening the Self-Defending Network vision.

Add a note hereA Cisco Self-Defending Network starts with a secure network platform, as shown in Figure 1-25, which is a strong, secure, flexible base from which you build your own Cisco Self-Defending Network solution.

Click to collapse
Add a note hereFigure 1-25: Cisco Self-Defending Network Defined

Add a note hereWith security integrated into the very fabric of the network, security becomes an integral and fundamental network feature. The next step, as shown in Figure 1-25, is to layer advanced technologies and security services, where and when you need them, on to this platform. The following are solutions for advanced technologies and security services:

  • Add a note here Threat control and containment: Keep your employees productive against a challenging and ever-changing threat landscape.

  • Add a note here Secure communications: Ensure the confidentiality and privacy of all of your sensitive communications, whether it is data communication, voice communication, or wireless communication.

  • Add a note here Tools for operational control and policy management: Add a suite of tools that comprise a framework for operational control and policy management that span your security end to end.

Add a note hereWhether you are a large enterprise or commercial customer, these solution components comprise a complete Cisco Self-Defending Network.

Threat Control and Containment

Add a note here The Cisco Threat Control and Containment solution offers comprehensive protection for your network through networkwide visibility, simplified policy control, and proactive system protection.

Add a note hereThe Cisco Threat Control and Containment solution is part of the Cisco Self-Defending Network, which protects the network, servers, endpoints, and information. The Cisco Threat Control and Containment solution regulates network access, isolates infected systems, prevents intrusions, and protects critical business assets. It counteracts malicious traffic such as worms, viruses, and malware before they affect your business, by using centralized policy, configuration, and threat event management.

Add a note hereThe Cisco Threat Control and Containment Solution contains three elements:

  • Add a note here Threat control for endpoints: This element defends against threats most commonly introduced by Internet use, such as viruses, spyware, and other malicious content that may lead to data loss and degrade productivity.

    Add a note hereCisco products that provide threat control for endpoints include the Cisco Security Agent for Desktops, Cisco ASA 5500 series (Content Security Edition), Cisco Integrated Services Routers, Cisco IPS, and Cisco NAC appliances.

  • Add a note here Threat control for infrastructure: This element safeguards your server and application infrastructure against attacks and intrusions. It also defends against internal and external attempts to penetrate or attack servers and information resources through application and operating system vulnerabilities.

    Add a note hereProducts that provide threat control for the infrastructure include the Cisco Security Agent for Servers, Cisco IPS, Cisco firewall solutions including the Cisco ASA 5500 series and Cisco Catalyst 6500 series Firewall Services Module, Cisco ACE (Application Control Engine) Module, Cisco AVS Application Velocity System, XML security, Cisco Security MARS, and Cisco Security Manager.

  • Add a note here Threat control for email: This element protects your business productivity, resource availability, and confidential information by stopping email-initiated threats. Cisco provides solutions to protect from threats contained in email, such as the Content Security and Control Security Services Module used in the Cisco ASA firewall and the IronPort appliance.

Secure Communications

Add a note hereEnsuring the privacy and integrity of all information is vital to your business. You can achieve this through the use of IPsec and SSL VPNs. As your company uses the flexibility and cost-effectiveness of the Internet to extend its network to branch offices, telecommuters, customers, and partners, security is paramount. You must create a manageable, cost-effective communications infrastructure that will do the following:

  • Add a note hereImprove productivity

  • Add a note hereEnable new business applications

  • Add a note hereHelp you comply with information privacy regulations

  • Add a note hereEnhance business efficiency

Add a note here The Cisco Secure Communications solution is a set of products and security life cycle services that are an essential element of the Cisco Self-Defending Network. By incorporating capabilities that secure the network, the endpoints, and the applications and messages, this systems-based approach delivers comprehensive security of your communications. The solution has two major elements:

  • Add a note here Secure communications for remote access: This element provides highly secure, customizable access to corporate networks and applications by establishing an encrypted tunnel across the Internet.

  • Add a note here Secure communications for site-to-site connections: This element provides an Internet-based WAN infrastructure for connecting branch offices, home offices, or the sites of business partners to all or portions of your network.


Tip

Add a note hereThe Cisco Secure Communications solution uses cryptography to ensure confidentiality.

Operational Control and Policy Management

Add a note hereCisco network management systems help you automate, simplify, and integrate your network to reduce operational costs and improve productivity. Built to complement the popular CiscoWorks products, the tools within the network management systems provide innovative ways to centrally manage your network to achieve critical functions such as availability, responsiveness, resilience, and security in a consistent way.

Add a note hereThese network management systems also help reduce the troubleshooting and planning time associated with the introduction of new services such as voice, wireless, and security management. Solutions-focused tools streamline network management systems, including the management of devices, configurations, users, and services.

Add a note hereThe benefits of the different Cisco network management systems include the following:

  • Add a note hereIncrease speed and accuracy of policy deployment

  • Add a note hereGain visibility to monitor end-to-end security

  • Add a note hereRespond to threats more rapidly

  • Add a note hereEnforce corporate policy compliance

  • Add a note hereEnable proper workflow management

Cisco Security Management Suite

Add a note hereThe Cisco Security Management Suite is a framework of products and technologies designed for scalable policy administration and enforcement for the Cisco Self-Defending Network. This integrated solution can simplify and automate the tasks associated with security management operations, including configuration, monitoring, analysis, and response. There are two main components of the Cisco Security Management Suite: Cisco Security Manager and Cisco Security MARS.

Cisco Security Manager

Add a note here Cisco Security Manager is a powerful but easy-to-use solution that enables you to centrally provision all aspects of device configurations and security policies for the Cisco family of security products. The solution is effective for managing even small networks consisting of fewer than 10 devices, but also scales to efficiently manage large-scale networks composed of thousands of devices. Scalability is achieved through intelligent policy-based management techniques that can simplify administration. Cisco Security Manager features include the following:

  • Add a note hereIt enables administrators to effectively manage configuration for Cisco IPS 4200 series sensors, the Cisco ASA Advanced Inspection and Prevention Security Services Module (AIP-SSM), the Cisco Catalyst 6500 Series Intrusion Detection System Services Module 2 (IDSM-2), the Cisco IDS Network Module, the Cisco IPS AIM, and Cisco IOS IPS.

  • Add a note hereIt responds faster to threats by enabling you to define and assign new security policies to thousands of devices in a few simple steps.

  • Add a note hereIt has a rich graphical user interface that provides superior ease of use.

  • Add a note hereMultiple views provide flexible methods to manage devices and policies, including the ability to manage the security network visually on a topology map.

  • Add a note hereIt contains extensive animated help for the new user, which reduces the learning time.

  • Add a note hereIt enables you to centrally specify which policies are shared and automatically inherited by new devices to ensure corporate policies are implemented consistently, while providing optional flexibility.

  • Add a note hereIt integrates with Cisco Secure Access Control Server (ACS) to provide granular roll-based access control to devices and management functions.

  • Add a note hereIt integrates with Cisco Security MARS to correlate events with the associated firewall rules to help make quicker decisions and increase network uptime.

  • Add a note hereIt enables you to assign specific tasks to each administrator during the deployment of a policy, with formal change control and tracking, and allows the security and network operations staff to work together as a single team with effective coordination.

Cisco Security MARS

Add a note hereCisco Security MARS provides security monitoring for network security devices and host applications made by Cisco and other providers. Cisco Security MARS offers these benefits:

  • Add a note hereGreatly reduces false positives by providing an end-to-end view of the network

  • Add a note hereDefines the most effective mitigation responses by understanding the configuration and topology of your environment

  • Add a note herePromotes awareness of environmental anomalies with network behavior analysis using NetFlow

  • Add a note hereProvides quick and easy access to audit compliance reports with more than 150 ready-to-use customizable reports

  • Add a note here Makes precise recommendations for threat removal, including the ability to visualize the attack path and identify the source of the threat with detailed topological graphs that simplify security response at Layer 2 and above


Tip

Add a note hereFor training on Cisco Secure MARS, go to http://www.cisco.com/web/learning/le31/le29/learning_training_from_cisco_learning_partners.html.

Add a note here Cisco Integrated Security Portfolio

Add a note hereA truly secure network requires multiple products and technologies that collaborate seamlessly across platforms and integrate tightly with the network infrastructure, as shown in Figure 1-26. No single product or technology can secure a network.

Click to collapse
Add a note hereFigure 1-26: Security Services Integrated into the Network

Add a note hereCisco offers the broadest portfolio of integrated security products in the industry. No other vendor has such a diversity of platforms. Benefits of a comprehensive Cisco architecture include the following:

  • Add a note hereIncrease speed and accuracy of policy deployment

  • Add a note hereGain visibility to monitor end-to-end security

  • Add a note hereRespond to threats more rapidly

  • Add a note hereEnforce corporate policy compliance

  • Add a note hereEnable proper workflow management

Add a note here The Cisco portfolio is designed to meet the requirements and diverse deployment models of any network and any environment. The following are some of these products:

  • Add a note hereCisco IOS platforms with integrated IPS, VPN, and stateful firewall to support secure IP connectivity

  • Add a note hereCisco ASA 5500 series appliances with integrated VPN to ensure perimeter security, access control, and IPS

  • Add a note hereCisco PIX 500 series security appliances with integrated VPN to ensure perimeter security and access control

  • Add a note hereAppliance-based network IDS and IPS and integrated network IDS and IPS for Cisco IOS routers, Cisco PIX security appliances, and Cisco ASAs

  • Add a note hereCisco Security Agent endpoint protection software, which protects servers and desktops from the damaging effects of known and unknown threats

  • Add a note hereCisco Secure ACS, which ensures that users have the proper authority to access corporate resources

  • Add a note hereSecurity modules for Cisco Catalyst 6500 series switches and Cisco 7600 series routers that provide security throughout the data center

  • Add a note hereSecurity management products, including Cisco Security Manager, Cisco Security MARS, Cisco Router and Security Device Manager (SDM), and other GUI-based device managers

Add a note hereMost customers will not adopt all the components of the Cisco Self-Defending Network at one time, because it can be difficult to overhaul all the required subsystems simultaneously without disrupting the integrity of the IT services. Some customers might hesitate to turn over security controls to an automated system until they are confident that the system will operate dependably. The Cisco Self-Defending Network initiative deals with these concerns by first providing products that you can usefully deploy independently of one another and then by offering solutions that can link these products together as confidence builds in each product and subsystem. This initiative has proven to be a successful approach based on a combination of product development, product acquisition, systems development, and partnering.

Summary

Add a note here To have a comprehensive security solution, it is important to cover all aspects of the operation of an organization. Comprehensive security requires suitable reliance on technical, physical, and administrative controls; implementing defense in depth; and developing an all-inclusive security policy. You will also be required to demonstrate forward thinking, taking into consideration the threats of tomorrow.

Add a note hereIn this chapter you have learned that

  • Add a note hereTo provide a comprehensive security solution, it is essential that there be a combination of technical, physical, and administrative controls in place.

  • Add a note hereDefense in depth is a philosophy used to provide layered security to a system by using multiple security mechanisms.

  • Add a note hereOperations security is concerned with the controls used to protect hardware, software, and media on a day-to-day basis.

  • Add a note hereA security policy is a set of objectives for the company, rules of behavior for users and administrators, and requirements for system and management that collectively ensure the security of network and computer systems in an organization.

  • Add a note hereChanging threats and challenges demand a new approach to network security, one that is quickly adaptable, such as the Cisco Self-Defending Network.

Add a note here References

Add a note hereFor additional information, refer to these resources:

  • Add a note hereRichardson, R. 2007 CSI Computer Crime and Security Survey, http://i.cmpnet.com/v2.gocsi.com/pdf/CSISurvey2007.pdf

  • Add a note hereHarris, S. CISSP All-in-One Exam Guide, Third Edition (McGraw Hill Osborne, 2005)

  • Add a note hereThe Jargon File, http://www.catb.org/~esr/jargon/html/index.html

  • Add a note hereMcClure, S., Scambray, J., and Kurtz, G. Hacking Exposed, Fifth Edition (McGraw-Hill/Osborne, 2005)

  • Add a note hereSecurityFocus, http://www.securityfocus.com/

  • Add a note hereVerio, http://www.whois.net/

  • Add a note hereUwhois, Universal WHOIS, http://www.uwhois.com/

  • Add a note hereInsecure.org, http://www.insecure.org/nmap/

  • Add a note hereGiacobbi, G. The GNU Netcat Project, http://netcat.sourceforge.net/

  • Add a note hereSecurity-Solutions.net, http://www.security-solutions.net/download/index.html

  • Add a note hereMicrosoft Corporation. Windows 2000 Resource Kit Tools for Administrative Tasks. http://support.microsoft.com/kb/927229

  • Add a note hereSomarSoft Utilities, http://www.somarsoft.com/

  • Add a note here Microsoft Corporation. Windows Server 2003 SP1 Platform SDK Web Install, http://tinyurl.com/cew8e

  • Add a note hereKabay, M. E. Salami Fraud, http://www.networkworld.com/newsletters/sec/2002/01467137.html

  • Add a note hereNIST Publication 800-64 Rev. A. Security Considerations in the Information System Development Life Cycle

  • Add a note hereNIST Publication 800-42. Guideline on Network Security Testing

  • Add a note hereTripwire, Inc., http://www.tripwire.com

  • Add a note hereGFI Security & Messaging Software, http://www.gfi.com

  • Add a note hereTenable Network Security, http://www.nessus.org/download

  • Add a note hereWood, C. Information Security Policies Made Easy, Version 10 (Information Shield, 2005)

  • Add a note hereNIST Publication 800-29 Rev A. NIST Engineering Principles for Information Technology Security

  • Add a note hereCisco Systems, Inc. Security: Reduce IT Risk, http://www.cisco.com/go/sdn

  • Add a note hereWikipedia Foundation, Inc. Attack Tree, http://en.wikipedia.org/wiki/Attack_tree

0 comments

Post a Comment