a school’s blueprint to secure everything - edweek.org schools blueprint to secure... · a...

43
A School’s Blueprint to Secure Everything Renault Ross CISSP, MCSE, CCNA, CHSS , CCSK,VCP5 US Information Security & Privacy Architect Public Sector Strategic Programs

Upload: tranque

Post on 17-Apr-2018

218 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

A School’s Blueprint to Secure Everything

Renault Ross CISSP, MCSE, CCNA, CHSS , CCSK,VCP5 US Information Security & Privacy Architect Public Sector Strategic Programs

Page 2: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Agenda

Security Challenges in Securing Everything

Key Trends & Snapshot of Today’s Threat Landscape

Recommendations and Strategies

Page 3: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

KEY TRENDS

CONSUMERIZATION

IT-IFICATION

VIRTUALIZATION

CLOUD

DATA GROWTH

THREAT LANDSCAPE

• Mobile • Social

Technology Trends

Page 4: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

KEY TRENDS

CONSUMERIZATION

IT-IFICATION

VIRTUALIZATION

CLOUD

DATA GROWTH

THREAT LANDSCAPE

• Mobile • Social

Technology Trends

Page 5: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

KEY TRENDS

CONSUMERIZATION

IT-IFICATION

VIRTUALIZATION

CLOUD

DATA GROWTH

THREAT LANDSCAPE

• Mobile • Social

Technology Trends

?

Page 6: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Retail & Finance

• Smart payments, cards

• Point of sale terminals

• ATM

• Vending machine monitoring

• Digital signage and electronic billboards

Utilities

• Meter reading

• Industrial controls

• Pro-active alerts

• Smart Grid applications

• Remote temperature control

Auto

• Telematics

• In-vehicle entertainment

• Navigation

• Safety services

• Concierge services

• Remote diagnostics

• Personalized insurance

Internet of Things

Healthcare

• Home healthcare and hospital patient monitoring

• Remote telemedicine & physician consultation

• Body sensor monitoring

Consumer Services

• Smart home appliances

• Connected home

• Video feed monitoring

Manu-facturing

• Supply chain management

• Geo-fencing

• Machine diagnostics

• Inventory control

• Industrial automation control

• Equipment monitoring

Page 7: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Hacking Old Motivation

Threat Landscape A fundamental shift…

7

Cyber Crime Cyber Espionage

Cyber Warfare

Page 8: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

What’s in common between Miss Teen and a Businessman?

Page 9: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

THEY ARE BOTH TARGETED FOR ATTACK

Page 10: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends
Page 11: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends
Page 12: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends
Page 13: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Targeted Attacks

up 42% in 2012

Page 14: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

• Manufacturing moved to top position in 2012

• But all industries are targeted

1%

2%

2%

2%

8%

10%

12%

17%

19%

24%

0% 10% 20% 30%

Manufacturing

Finance, Insurance & Real Estate

Services – Non-Traditional

Government

Energy/Utilities

Services – Professional

Wholesale

Retail

Aerospace

Transportation, Communications, Electric, Gas

Targeted Attacks by Industry

Page 15: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

2

Infection vectors

Page 16: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

The vulnerability being exploited is the browser and plugins

Browser IPS

Host IPS

Plugins (flash, Acrobat, Silverlight, Skype…)

Code (php, ActiveX javascript, AS3)

Browser

Protocol (HTTP, HTTPS)

Network (IP)

Page 17: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Threat Landscape

How are we being attacked?

• It can start with an attachment

• Buried inside may be an embedded ‘Flash’ object

• Which leverages a vulnerability to deliver malware

Page 18: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Threat Landscape

How are we being attacked?

• More likely it will be a link

• Seems innocuous, right?

• Well not so fast…

• Hover over the link to see the real link buried underneath

• Clicking the link brings you to a malicious web site

Page 19: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Threat Landscape

How are we being attacked?

• Or the web site itself will infect you just by visiting it…

• For example, the neighborhood pizza store might be infected

• How many pizza stores have a fulltime IT guy on staff looking out for trouble?

Page 20: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

2010 Trends

Mobile Threats

“There’s an app for that…”

Page 21: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends
Page 22: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Threat Landscape Why is it hard to stop attacks?

Hacker develops threat Hacker uses Tool to obfuscate executable

Tool generates clones that differ at the byte-level

This is my first virus that I

plan to use to steal key and

passwords from

unsuspecting victims.

Kjjkjjj sdkjhkjsj398jid

9-2 -02-00 3984—2 3—

030984 1299-04 1-03---0-

23li jkjdunjjdpe d.

Ijis kks my alsiep siilf that pasje ata see ps stwe ake

adas pasowallsie

sppfr ausupeasect ffi

Ijis kks my alsiep siilf that pasje ata see ps stwe ake

adas pasowallsie

sppfr ausupeasect ffi

Ista asbin lsiked lipole

alskk askf hwpks

pollasjjfklg toalkkst

pooldajao sjfkg asklfa klla oek

Use cloud scanner to check for detection

Release undetected variants

Page 23: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

HVAC

Transport

Fire & Safety

Lighting

Security

Access, etc.

Turbines

Windmills

Batteries

Generators

Motors, Drills

Fuel Cells

ENERGY Rigs, Derricks, Well

Heads, Pumps, Pipelines

Alternative

IoT (Internet of

Things) CONSUMER &

HOME

PDAs

Implants, Surgical Equipment

Pumps, Monitors

Telemedicine

INDUSTRIAL

Pumps, Valves, Vats, Conveyors, Pipelines Meters, Drives, Converting, Fabrication

Assembly/Packaging, Vessels

Tolls, etc.

Automobiles

Traffic Lights Ships Planes

RETAIL

POS Terminals

Tags

Cash Registers

Vending Machines

Signs, etc.

SECURITY/PUBLICSAFETY

IT & NETWORKS

Tanks, Fighter

Jets

Battlefield Comms

Homeland Security

Servers

Storage

PC, Routers

Switches

* Adapted from Beecham Research

The Internet of Things Is a Broad Area

Mic

rop

roce

sso

rs

….

Page 24: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

The Rising Number of “Things”

• Today, 7 billion people, 9 billion connected devices!

• By 2020, 50 billion “things” connected to the Internet

*From Cisco UBSG, April 2011

500M

12.5B

25B 50B

2003

2010

2015

2020

Page 25: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Architecture Matters Application logic, data and analytics can be placed anywhere

Enterprise Cloud Gateway Local/Edge

Application Data Analytics

Page 26: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Trust / Governance

• When a device is contacted for the first time (a user, another device), is it trusted?

– PKI as a root of trust

– Employ reputation

– Leverage a separate trusted channel

• Governance:

• Policy definition, management, and enforcement

• Compliance

Page 27: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Identity

• Billions of devices are going to be interconnected, so it is necessary to manage their identities in a scalable way

• Eventually, each device will be addressable on the Internet to support end-to-end communication, so it requires a scalable way to discover a device’s address given its identity

Page 28: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Fault Tolerance

• Devices may become faulty and stop working and even get compromised

• Many devices deployed in the field where there’s no management capability

• Fault tolerance:

– Remote monitoring

– Fault discovery by e.g., anomaly detection, intrusion detection, or remote diagnostics

– Remote reboot, reprogramming, and software update

– End-point protection by e.g., lock-down

Page 29: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Communications

• Heterogeneous communications:

– Ethernet, dail-up, optics

– WiFi, Celluar, ZigBee, Bluetooth, WiMax

• Different requirements for communication:

– Low transmission latency for control networks

– Small payload size, e.g., 8 bytes for CAN, and 128 bytes for ZigBee

• Secure communications channel:

– Establish secure communication between devices/users using e.g., SSL-like handshake protocol

Page 30: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Authenticate Device Two-factor authentication, Managed Public Key Infrastructure solutions

Security Recommendations In the Internet of Things

Protect the Infrastructure Malicious Endpoint Protection, Web Gateway, Message Gateway, and

Critical Systems Protection solutions

Develop and Enforce IT Policies Policy & standards modules, risk

manager & vulnerability modules and solutions

Manage the Infrastructure

Desktop and server patch management, software delivery, assets, ticket management and

mobile devices solutions

Protect the information Data Loss Prevention, Encryption, Backup and High availability solutions

Page 31: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Governance Tools to Develop and Enforce IT Policy

1

Page 32: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

3rd Party Data

Governance, Risk and Compliance

ESM

Manager

CCS-Data

Collection

Federated Data Processing and Analysis

Dashboards Audit Reports

Questionaires Entitlements Standards External Policies

A

Page 33: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Authenticate Identities & Devices

Page 34: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Endpoint Mobility

Application Government

Shared cloud-based two-factor authentication solution offering

multiple credential choices

VeriSign Identity Protection

RISK SCORE

Rules Eng. Behavior Eng.

Risk-Based authentication and software-based fraud detection

Fraud Detection Service

Strong Authentication and MPKI

Public Key Infrastructure

PKI service issues certificates for strong authentication,

encryption and digital signing

Page 35: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Protect the Information

3

Page 36: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Data Loss Prevention

Storage

Data Loss Prevention Network Discover

Data Loss Prevention Data Insight

Data Loss Prevention Network Protect

Endpoint

Data Loss Prevention

Endpoint Discover

Data Loss Prevention Endpoint Prevent

Network

Data Loss Prevention Network Monitor

Data Loss Prevention Network Prevent

Page 37: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Encryption of sensitive data

Whole Disk Help Desk

Removal Hard-drive

Page 38: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Manage the Infrastructure

4

Page 39: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Enterprise Systems Management

System

Management Platform

Systems Management Platform

INFRASTRUCTURE OPERATIONS

BUSINESS CONTINUITY

STORAGE INFORMATION RISK

& COMPLIANCE SECURITY

Backup

Management

Patch and System

Management

Mobile Security

Management Power

Management

HelpDesk

Management

Application

Virtualization

Dell Management

Console

Dell Client Manager

vProTM enabled

computer

management

HP Client

Manager

Third-Party Solutions

Page 40: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Protect the Infrastructure

5

Page 41: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Threat management solutions

Page 42: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Summary

Storage Foundation

NetBackup

Manage Data

Operational Security Manage Data

Information Protection

Embedded Security

Encryption

Information Protection

mPKI

Embedded Security

Operational Security

CSP

Symantec Security in IoT

SEP

• Encrypt information

• Authenticate devices

• Managed / hosted PKI & device level certificates

• Controlling and securing systems

• Intrusion protection / detection

• Resource lockdown

• Application whitelisting

CSP

• Network monitoring

• Anomaly detection and reporting

• Information and event management from all network and host sources

• Data management

• Intrusion protection / detection

• Resource lockdown

Network Heuristics

Data Loss Prevention

Inventory & Asset Mgmt

Page 43: A School’s Blueprint to Secure Everything - edweek.org schools blueprint to secure... · A School’s Blueprint to Secure Everything Renault Ross CISSP, ... Technology Trends

Thank you!

SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2010 Symantec Corporation. All rights reserved.

Thank you!

Renault Ross

[email protected]