家中等职业教育改革发展示范学校概述.pptx

上传人:云*** 文档编号:88453590 上传时间:2023-04-26 格式:PPTX 页数:44 大小:5.15MB
返回 下载 相关 举报
家中等职业教育改革发展示范学校概述.pptx_第1页
第1页 / 共44页
家中等职业教育改革发展示范学校概述.pptx_第2页
第2页 / 共44页
点击查看更多>>
资源描述

《家中等职业教育改革发展示范学校概述.pptx》由会员分享,可在线阅读,更多相关《家中等职业教育改革发展示范学校概述.pptx(44页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、Risk Management using Network Access Control and Endpoint Control for the EnterpriseKurtis E.Minder Mirage Networksi2-CONFIDENTIAL-AgendaDrivers of NACKey Elements of NAC SolutionsIdentifyAssessMonitorMitigateNAC Landscape3-CONFIDENTIAL-Business Needs Drive Security Adoption3 Ubiquitous Security tec

2、hnologiesAnti-virus-Business driver:File sharingFirewalls-Business driver:Interconnecting networks(i.e.Internet)VPNs-Business driver:Remote connectivityTodays top security driver-Mobile PCs and devicesBroadband access is everywhereIncreased percentage of the time devices spend on unprotected network

3、sPerimeter security is rendered less effective because mobile devices bypass it and arent protected by itMobility of IP devices is driving the need for Network Access Control solutionsLeading source of network infectionsMore unmanaged devices on the network than ever-guest and personal devices4-CONF

4、IDENTIAL-The Traditional Approach to Network Security Isnt Enough5-CONFIDENTIAL-The Problem NAC Should AddressToday,endpoint devices represent the greatest risk to network security by propagating threats or being vulnerable to them.Infected DevicesUnknown DevicesOut-of-Policy Devicespropagate threat

5、s,resulting in loss of productivity&hours of cleanuplike home PCs,contractor PCs,&WiFi phones can introduce new threats or compromise data securityare more vulnerable to malware attacks,while running services that could jeopardize security“Because of worms and other threats,you can no longer leave y

6、our networks open to unscreened devices and users.By year-end 2007,80 percent of enterprises will have implemented network access control policies and procedures.”Gartner,Protect Your Resources With a Network Access Control Process6-CONFIDENTIAL-The Cost1 mi2g Intelligence Unit,Malware Damage in 200

7、42 ICSA Labs,9th Annual Computer Virus Prevalence Survey7-CONFIDENTIAL-The Numbers Tell the Story“Protection”is in place98%use firewalls197%of companies protect machines with antivirus software 1 79%use anti-spyware 1 61%use email monitoring software 1 But its not enough!Cost of malware:$14.2B 280%o

8、f companies experienced 1 or more successful attacks,30%had more than 10 3Average net loss for malware incidents in US companies is nearly$168,000 per year1Worldwide,32%of companies experience attacks involving business partners43%of those were infections,while 27%were unauthorized access475%of ente

9、rprises will be infected with malware that evaded traditional defenses5 1 Computer Security Institute/FBIs 2006 Computer Crime and Security Survey2 Computer Economics,20063 ICSA Labs,9th Annual Computer Virus Prevalence Survey4 Cybertrust,Risky Business,September 20065 Gartner,Gartners Top Predictio

10、ns for IT Organizations and Users,2007&Beyond,December 20068-CONFIDENTIAL-The Problem is Expected to Get Worse2006 StatisticsSteep increase in the number of software security vulnerabilities discovered by researchers and actively exploited by criminals Microsoft Corp issued fixes for 97(versus 37 in

11、 2005)security holes assigned critical label14 of of the critical became zero day threats.Experts worry that businesses will be slow to switch to Vista.Pre-Vista MS Office is expected to remain in widespread use for the next 5-10 years.Source:Washington Post,Dec 2006,Cyber Crime Hits the Big Time in

12、 20069-CONFIDENTIAL-NAC Market ExpectationsNAC Appliance vendors will sell$660m worldwide in 2008NAC Appliances will gain 17%worldwide share of the NAC market by 2008,up from 6%in 2005Research reveals World Network Access Control(NAC)Products and Architectures Markets earned revenues of over$85 mill

13、ion in 2006 and estimates this to reach over$600 million in 2013Gartner estimates that the NAC market was$100M in 2006 and will grow by over 100%by YE 200710-CONFIDENTIAL-Increasing Number of Targets to ProtectOperating SystemsInternet ExplorerWindows LibrariesMicrosoft OfficeWindows ServicesWindows

14、 Configuration WeaknessesMac OSXLinux Configuration WeaknessesNetwork DevicesVoIP Phones&ServersNetwork&Other Devices Common Configuration Weaknesses*SANS Institute Top 20 Internet Security Attack Targets(2006 Annual Update),v7.0,11.15.06Cross Platform ApplicationsWeb ApplicationsDatabase SoftwareP2

15、P File Sharing ApplicationsInstant MessagingMedia PlayersDNS ServersBackup SoftwareSecurity,Enterprise,and Directory Management ServersSecurity Policy&PersonnelExcessive User Rights&Unauthorized DevicesUsers(Phishing/Spear Phishing)Sans Institute 2006 Top Attack Targets*11-CONFIDENTIAL-Pre-admission

16、(at network connect),30%Post-admission(continuous monitoring),7%Both,60%Dont know,3%What Class of NAC Solutions to Deploy?Aberdeen Research,200612-CONFIDENTIAL-%of Respondents00.20.40.60.8Meet regulatory requirementsReduce IT operations costImprove endpoint visibilityAutomate remediation of policy/c

17、onfiguration violationsReduce time required to recover from malware outbreakImprove network uptimeEnforce security policy complianceEnforce endpoint software configurationsControl network access for staff,partners and contractorsReduce incidents of malware propagation11%12%12%17%22%24%41%42%53%59%Al

18、l RespondentsTop Drivers Influencing NAC SolutionsAberdeen Research,200613-CONFIDENTIAL-Top Features Required in a NAC Solution%of Respondents00.10.20.30.4Visibility to endpoint configurationsThreat propagation detection/IDSScalability/fault toleranceReportingVisibility to endpoint threatsRedirectio

19、n of users to remediation resourcesEndpoint configuration posture check(on admission)Ease of deploymentEndpoint configuration posture check(continuous/ongoing)Network infrastructure independentEase of managementPrevent infection of your endpoints by remote control,spyware and botsIdentity-based cont

20、rolIntegration with current network infrastructureDay zero malware control6%7%11%12%14%14%16%17%19%23%24%28%30%34%37%All RespondentsAberdeen Research,200614-CONFIDENTIAL-Key Elements of NAC SolutionsCommon NAC ElementsNAC is an evolving space with evolving capabilitiesNAC solution elements-some or a

21、llIdentify-Detect&authenticate new devicesAssess-Endpoint integrity checks to determine levels of risk and adherence to security policyMonitor-Watch the devices activity for change of assessed state with respect to policy and threat statusMitigate-Take appropriate action upon any device that is iden

22、tified as a security risk by previous three elements 16-CONFIDENTIAL-Identify-Find/Authenticate New DevicesQuestion-How do you know when a new device comes on the network?Is it a known or unknown device?Is it an authenticated user?Common approachesLeverage 802.1x or network infrastructure OSAuthenti

23、cate through existing EAP infrastructure to pass credentials to authentication serverSpecial purpose DHCP serverAuthentication usually web based and tied to authentication serverAuthentication proxyNAC solution serves as a proxy between device and authentication serverInline security appliances(i.e.

24、security switches)Serve as a proxy between device and authentication serverReal time network awarenessAuthentication usually web based and tied to authentication serverAll approaches trigger off entry on the network by a new IP device17-CONFIDENTIAL-Identify-Pros&Cons of Various Approaches802.1x app

25、roachPros:Device detected and authenticated prior to IP address assignmentCons:Often is a costly and time consuming installationRequires switch upgrade/reconfigurationEndpoints must be 802.1x enabled-requires supplicant softwareMust create guest/remediation VLANsDHCP approachPros:Easier to deploy,in

26、dependent of network infrastructure,covers both managed and unmanaged devicesCons:Bypassed by static IP address assignment,remediation typically to a broadcast VLAN(cross infection risk)18-CONFIDENTIAL-Identify-Pros&Cons of Various Approaches cont.Authentication proxyPros:Good hook for checking mana

27、ged devicesCons:Unknown devices may never authenticate,but still could have network access;may not check all IP devicesIn-line security appliance/switchPros:Sees all devices both managed and unmanaged and doesnt require agent based softwareCons:If it is not inline with,or does not replace the access

28、 switch then it will not see the device as it comes on the networkOut of band appliances with network awarenessPros:Sees all devices as they enter the network both managed and unmanaged;easier to implement than many of the other approachesCons:May require switch integration for mitigation of problem

29、s19-CONFIDENTIAL-AssessAssess Endpoint IntegrityQuestion:Even if a device is allowed on my network,how do I ensure it meets my security policies and risk tolerance?Answer:Endpoint integrity checksOperating system identification and validation checksTypically requires an agent Must establish a policy

30、 relating to acceptable patch level(latest patch on company SMS server,no older than X months,most recent patch available from software vendor)What do you do for unknown devices?Usually requires an agent for these checksSecurity software checks-AV,personal firewall,spyware,etc.Is it up and runningIs

31、 it in the right configurationIs it up to date-both the software and the databaseUsually requires an agent for these checks21-CONFIDENTIAL-Assess Endpoint Integrity cont.Endpoint integrity checks cont.Endpoint configuration-find unauthorized servers and servicesWeb servers,FTP servers,mail servers,e

32、tc.Vulnerable or high risk ports,i.e.port 445 exploited by ZotobThese checks can be done from the network or with an agentThreat detectionScan the device for active infections or backdoorsNot commonly implemented on entry to the networkToo much latencyRisk profile substituted for deep scans(i.e.AV i

33、s up to date and had a current scan)Elements for endpoint integrity checksNetwork scanning server(Optional)Endpoint software-permanent or transient(Optional)Policy server(Required)-must have somewhere to define what is allowed/disallowed22-CONFIDENTIAL-MonitorMonitoring Post Network EntryThe forgott

34、en element of Network Access ControlWhy is monitoring a critical element of NAC?Cant effectively check for all threats on entry-takes too longSecurity policy state can change post entry-users initiate FTP after access is grantedInfection can occur post entry-e-mail and web threats can change securit

35、y state of the deviceWhat Gartner says in their paper“Protect Your Resources With a Network Access Control Process”“The network traffic and security state of systems that are connected to the network must be monitored for anomalous behavior or system changes that bring them out of compliance with se

36、curity policies.”Why isnt this simply another network security function?Monitoring is both for threats and policy adherence-takes advantage of policy definition of NAC solutionWorks hand in hand with NAC quarantine services 24-CONFIDENTIAL-Traditional Approach to Network Security Traditional Approac

37、h Firewall/IPS at the Perimeter AV,HIDS/HIPS on the EndpointThis approach leaves a soft underbelly through which unmanaged,out-of-policy and infected endpoints can easily gain access.External Environment New technologies New threats Regulatory requirements 25-CONFIDENTIAL-Exploiting the Networks Wea

38、knessInfected endpoints bypass the perimetergenerating rapidly propagating threats that take over a network in minutesbringing business to a halt and creating costly cleanup.26-CONFIDENTIAL-Monitoring ApproachesAgent based approachesHost Intrusion Prevention SystemsPersonal firewallsBoth require int

39、egration with a network policy server to be an element of NACDoesnt cover unknown/unmanaged/unmanageable devicesNetwork based approachesIn-line:Typically evolution of IPS vendors into NAC capabilities;also includes Network Based Anomaly Detection(NBAD)vendorsOut-of-band:Most commonly NBAD and old Di

40、stributed Denial of Service(DDoS)security vendorsKey considerationsDoes the security device watch for policy violations as well as threats?Does it see devices as they enter the network?Can they work across both voice and data networks without negatively impacting quality and performance?What is the

41、management overhead associated with both approaches?27-CONFIDENTIAL-MitigateMitigation Approaches for NACTwo elements for NAC mitigationQuarantine capabilities(required)On-entry restrict access for devices not meeting requirementsPost-entry take a device off the network and send to quarantine zone i

42、f they violate policy or propagate a threatIdeally should be able to assign to different quarantine server based on problem,i.e.registration server for guests,AV scanner for infected devices,etc.Remediation services for identified problems(optional)Additional diagnostic tools for deeper checks-Vulne

43、rability scannersAV scanners,etc.Tools for fixing identified problemsOS patch linksAV signature update and malware removal toolsRegistration pages for unknown devices29-CONFIDENTIAL-Quarantine ApproachesDHCP integrationUses DHCP process for identification and endpoint integrity checks on entry to th

44、e network.Pros:Assigns appropriate IP and VLAN according to their risk levelCons:After IP address is assigned they dont have an independent quarantine capability;Static IPs bypass their enforcementSwitch integrationUses either ACLs or 802.1xACLs-not commonly used because of negative performance impa

45、ct and access requirements in the network802.1x-forces device to re-authenticate and assigns new VLANPros:Effective both pre and post admission,uses standards based approach in 802.1xCons:Can negatively impact switch performance;Usually not granular in quarantine server assignment;If using broadcast

46、 quarantine VLAN there is a cross-infection risk30-CONFIDENTIAL-Quarantine Approaches cont.In-line blocking with web redirectPros:Improved performance over ACLs;Can granularly block suspect traffic;has the capability of sending web traffic to appropriate quarantine server based on problemCons:Doesnt

47、 see downstream traffic so can only block and redirect traffic that comes through it;May require additional integration with network for mitigation because of thisARP managementSecurity appliance selectively goes inline for a single host and becomes its default gateway by ARP manipulationPros:No net

48、work integration required for full quarantine capabilities;enables surgical,problem specific quarantine without cross-infection risk;effective both pre and post admissionCons:If implemented improperly network equipment can misidentify this as an attack and drop this traffic31-CONFIDENTIAL-Todays NAC

49、 LandscapeEvolving proprietary standardsCisco Network Admission Control(CNAC)Three critical elements-Cisco Trust Agent(CTA),updated Network Access Device(NAD),Cisco Access Control Server(ACS)Integration with endpoint agents to communicate with ACS regarding appropriate access level to the networkMic

50、rosoft Network Access Protection(NAP)Available in VistaEndpoint needs System Health Agent(SHA)SHA reports to System Health Validator(SHV)to do policy checksNetwork isolation through enforcement integrationsDHCP Quarantine Enforcement Server(QES)VPN QES802.1xTrusted Network Connect open standardTNC c

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 管理文献 > 企业管理

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁