Network Access Control and Policy Enforcement

Transcription

Network Access Control and Policy Enforcement
Technical Note
CounterACT
Network Access. Controlled.™
CounterACT
Network Access. Controlled.
Technical Note
Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
CounterACT — Clientless Network Access Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
How CounterACT Works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Setting Network Security Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
The ForeScout Difference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Universal Discovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Endpoint X-Ray. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Table of CounterACT’s Continuously Updated Network Values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Tailored Enforcement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Compliance and Reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Non-Disruptive Deployment of CounterACT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
About ForeScout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
CounterACT
Network Access. Controlled.
Technical Note
Introduction
Highlights
Point of Connection
(End Point Control)
•• Network-based, clientless solution —
NO desktop client or host agent required.
•• Provides flexibility to conduct pre- and
post-connection policy enforcement.
•• Policy control over devices — managed/
unmanaged/non-user.
•• No change required to user’s experience,
current configuration, or login process.
•• Turnkey appliance with a plug-and-play
“Virtual Firewall” feature.
Infrastructure
•• Seamless integration with existing
network infrastructure — no network
change required.
•• Not an inline device (typically deployed at
distribution layer switch).
•• Scalable and easy to deploy with no
network redesign.
•• Handling of peripheral devices (printers,
VoIP, WAP) in addition to host nodes.
After Connection
•• Continuous protection and enforcement
— devices monitored after connection
at regularly scheduled intervals or on
demand.
•• Real-time self propagating malware
quarantine — does not rely on signatures
or anomaly detection. Includes real-time
protection from zero-day threats and
malicious attackers.
Network Access Control (NAC) continues to build momentum as an ever-increasing number
of globally dispersed enterprises look for new and innovative ways to address network security
while continuing to support current infrastructure and the expanding mobile and contracted
workforce. The challenge facing enterprises is to find the delicate balance between having control
over network security and minimizing the disruption to end-user productivity. This whitepaper
will discuss ForeScout’s CounterACT clientless NAC solution, which provides an easy and flexible
solution to control access to networks and computing resources, defend against hackers and selfpropagating malware, and ensure business is not effected.
..................................................................................................
CounterACT — Clientless Network Access Control
As technology continues to advance and workers become more mobile, the traditional
network perimeter is no longer the primary focus of security technologies. Now more than ever,
organizations of all sizes have to consider the threats posed by mobile and unmanaged endpoints
that have the ability to walk around perimeter defenses. These devices, whether property of the
company (e.g. corporate laptop) or unmanaged devices (e.g. personal network-enabled PDA’s) have
the ability to move in and out of secured networks potentially exposing the corporate network to
threats.
ForeScout’s CounterACT is the only non-disruptive, clientless network access control solution
to deliver Endpoint X-ray™ and Fast Pass™, eliminating the usual mandatory “quarantine upon
connection” phase, allowing users to quickly become productive. Security checks include deep
interrogation for bullet-proof security, but are immediate, transparent and hassle-free to the user.
CounterACT also enables an extensive policy enforcement option to custom-fit network access
control, and scans devices that enters the network. This means laptops, PDA’s, printers and desktops
are all scanned by ForeScout’s clientless solution, which requires no endpoint software installation
or downloads. CounterACT ensures no disruption to the network or normal business operations
because it is not deployed inline, meaning there is no need to upgrade or install new gear; leaving
both the network and endpoints untouched.
How CounterACT Works
CounterACT provides IT security administrators with the ability to create and enforce granular
security policies without causing any disruption to the user and without requiring any form of agent
or client on the endpoint. Policies are predefined using a simple, granular GUI which guides the
process of creating access policies. Policies are created by defining the following steps:
3
CounterACT
Network Access. Controlled.
Technical Note
Setting Network Security Policy
1.Set Conditions — Administrators have the ability to create a granular set of conditions (policies). These pre-defined sets of values enable the
appliance to detect endpoint activities and detect when the endpoint has violated the corporate security policy. These conditions contain a variety
of values including registry keys, services, applications, service packs, security updates, etc.
Example: Policy can be defined to check if the device attempting to connect to the network has an up-to- date version of the corporate antivirus software
ensuring that the most recent .dat files are in place prior to being allowed access.
2.Set Triggers — With the network security policy set, this step allows for the determination of when the policy is to be enforced. The appliance
will detect policy violations both upon connection and through continuous monitoring of network activity. This allows for the detection of policy
violations post-connection ensuring the network security policy is always enforced.
Example: Policy can be triggered to check network security policies against the device attempting to connect when the device makes a DHCP call requesting
a new IP address. The appliance detects this connection attempt and applies appropriate policies triggered by this event. Furthermore, the policy can be
defined to continually check the connected device against access policies to ensure device remains in compliance.
3.Set IP Range — This step provides an additional level of flexibility allowing for policies to be applied network-wide or to a specific sub group within
the enterprise based on particular network configuration/security needs.
Example: The network is configured so guests are connecting through a single subnet. Specific policies can be established for that subnet providing guests
(unmanaged devices) only limited network access in a quarantined VLAN. In the case an employee were to plug into that subnet, the CounterACT would
recognize this employee and grant them full access based upon their role.
4.Set Automatic Enforcement — No network access solution would be complete without the ability to enforce the access policies in realtime. ForeScout provides administrators with a variety of options for enforcement. This tailored enforcement ranges from a simple notification
delivered through hijacking the HTTP session and providing a dialogue box notifying the user of the policy violation to complete and immediate
disconnection from the network. The administrator has the ability to custom fit which response should be taken based upon which policy violation
has occurred.
Example: CounterACT detects that the device attempting to connect to the network has not applied the latest Microsoft security patch. The policy is set
to deny access until the security patch is installed. The CounterACT system hijacks an HTTP session presenting the user with a dialogue box stating that the
Microsoft security patch has to be installed before the user will be granted access to the network. A link to the patch is provided and Internet access allowed
for the user to self-remediate. Once the patch is in place, the user is granted normal access to the network.
The ForeScout Difference
In addition to maintaining the company-owned managed devices, one of the most difficult challenges facing network administrators is employees
and guests with laptops or other forms of mobile endpoints, which have the ability to plug into the internal network or connect remotely through a
VPN. Even with the most vigilant security administration, the opportunity for an endpoint to be out of compliance with network security policies has
come to be expected.
With CounterACT, administrators can set and enforce network access policies (i.e., OS patch level, current AV file, etc.) without having prior knowledge
of the endpoint due to its unique ability to discover and interrogate endpoints connecting to the network including non-user devices. In addition, the
clientless technology allows users to gain access to the network with no disruptions required for the downloading or installing of an agent or client.
Administrators are provided with the ability to customize how each point of connection is handled depending on the compliance of the endpoint,
allowing for even less disruption to business productivity. Additionally, the CounterACT solution integrates with directory structures (e.g. Active
directory), enabling role-based network access ensuring that new connections only receive access to authorized segments of the network.
4
CounterACT
Network Access. Controlled.
Technical Note
Universal Discovery
As the corporate environment becomes more mobile and contract employees have become more prevalent, enforcing role-based network access
policies has become imperative. However, enforcing and maintaining such policies can create some unique challenges when it comes to finding a
solution that is easy to deploy and maintain. Currently there are two approaches to network access control: client/agent-based, or clientless. Clientbased systems are limited in regards to both unmanaged and non-user based devices and can face interoperability issues with the specific operating
systems. The right clientless solution can provide a thorough inspection with a fast connection, without these limitations of the types of connecting
devices that can be scanned.
ForeScout’s CounterACT is a clientless solution that requires no persistent or downloaded software agent to be installed on any connecting device,
yet still provides quick access to the network with a thorough interrogation of the endpoint. By enforcing security policies from the network,
administrators can just as effectively provide access control for managed and unmanaged/guest devices without the overhead/maintenance
nightmare of managing a client-based solution. In addition, this ensures universal discovery of endpoints connecting to the network, including nonuser devices such as network printers, VoIP phones, and PDA’s. Upon connection, CounterACT instantly determines the type of devices, ensures it does
not present a threat, and has the ability to place it in its appropriate logical location on the network.
Example: Unmanaged devices are simply defined as devices that are not part of any corporate domain and can not be found in any directory file. A typical
example of this would be a contractor using their own laptop to connect to the network. Due to the fact that CounterACT does not require an agent or any
form of code to be placed on the contractor’s laptop, the system will detect an unmanaged or guest device attempting to access the network. The device will
be allowed the level of connectivity determined by the policies that are in place for handling guests. This could include actions like moving the device from a
public VLAN to a quarantined VLAN which only has access to the Internet, but no access to the corporate network.
Example: Printers, fax machines, VoIP phones, etc., make up a category of network elements that have not typically been included in conventional network
policy enforcement schemas. CounterACT provides the ability to detect these devices and apply policies that would safeguard the network from security
threats emanating from these network devices. For example, a policy can be established to ensure that traffic coming from a network printer is specific to
print related traffic. If the printer begins to act like a different device, like in the case of someone spoofing the printer’s IP address, the CounterACT system will
detect the change in traffic and quarantine/disconnect the device.
Endpoint X-Ray™
One of the key challenges of deploying enterprise-wide network access control is the daunting task of educating the workforce. Many access control
technologies fail when they force users to change their behavior or add additional steps (multiple logins) to gain network access. CounterACT
features the most granular device interrogation engine in the industry. ForeScout’s Endpoint X-Ray technology provides for both a quick inspection
for self-propagating threats at the point of connection and a deep interrogation of the device to ensure policy compliance. By tapping directly into
the registry and file system of the device, CounterACT determines virtually everything about the state of the endpoint ranging from the presence of a
desktop firewall, the level of OS patches, last update of anti-virus definition file, or the presence of specific files or specific entries in the registry of the
system.
During this interrogation, CounterACT gathers a significant amount of data from connected devices. This information is simultaneously collected both
passively and actively.
Passive inspection: CounterACT sees traffic coming into and out of different network nodes. As such, it automatically learns, in an ongoing
manner, different parameters. Some examples of this include ports/services (from where CounterACT sits, it can tell which machines are connected
to which services, e.g. DHCP requests) and packet banners, (which indicates the type of activity within the packet, for example operating systems,
etc). Depending on what policies are defined to enforce, this passive inspection may suffice, or additional information may be required, which can
be obtained in an active manner.
Active inspection: In addition to the network/endpoint values that CounterACT can see just by “watching” the network activity passively,
CounterACT can actively obtain additional information from the different network nodes. Depending on what the administrator has defined to
enforce, information can be obtained regarding the end nodes accordingly. This includes A/V updates, patches, service packs, running applications,
running services, registry values, etc.1
Obtaining some of these values may require administrator privileges to the end points, which can easily be obtained through domain administration credentials. Once a device has successfully logged into
the domain, CounterACT has the ability to work through administrators credentials to inspect the full registry and check against corporate directories to determine if the device is known. If CounterACT does
not have this type of access granted, it continues to provide protection from know vulnerabilities, detect MAC/IP addresses, open services, etc.
1
5
CounterACT
Network Access. Controlled.
Technical Note
Table of CounterACT’s Continuously Updated Network Values
••Network policy violations
User Behavior
••Audited responses
••Self-remediation success
User Information
Applications
••Username
••Email address
••Authentication status
••Role/Department
••Workgroup
••Phone number
••Illegitimate applications
••File information
••Application versions
••Modification date
••Registry values
OS Integrity
Device Information
••OS fingerprint
••Un-patched vulnerabilities
••Antivirus update status
••Open services
••Jailbroken / rooted
••Running processes
••IP address
••Device type (PC, smartphone, tablet, printer,
wireless, etc.)
••MAC address
••Hostname
Physical Layer
••Physical switch
••802.1X
••VLAN
••Number of devices sharing a port
••Switch port
6
CounterACT
Network Access. Controlled.
Technical Note
Tailored Enforcement
The challenge that most enterprises face is its ability to enforce and ensure compliance with security policies, while still maintaining a high degree
of productivity amongst its users. Most NAC solutions on the market are limited to a binary enforcement response, meaning that a user is either
compliant or not, and those that are not compliant are not allowed on the network. This type of response can create more work for resource-strained
IT teams and frustration amongst the users of the system.
Example: In order to become compliant with virus definitions or operating system patches, users must be able to access the network. The Catch-22 is that
because they are not compliant, they cannot access the network to download the files they need to become compliant. As a result, users that fails to update
virus definitions or patches in a timely fashion must call upon IT for resolution. Note that this could be a reoccurring problem, depending upon the frequency
with which updates and patches are mandated.
Example: With a binary access scheme, guest users such as employees from another location, consultants, or customers needing to access the network even
for simple tasks such as downloading e-mail or using an Internet browser will not have the appropriate access credentials to gain access to the network.
Either these users must be given access to a compliant device or IT must make the guest device compliant by providing it the appropriate access credentials
which in some cases would include installing a client on the connecting device.
Instead of treating policy compliance as a binary scenario, ForeScout’s NAC solution utilizes a tailored enforcement approach which offers a range
of custom responses to each individual security event- ranging from informing the end user of policy violations through a hijacked HTTP session
dialogue box to complete, and immediate disconnection based upon the severity of the policy violation and the detected risk to network operations.
Additionally, devices connecting to the network can be moved into quarantined VLAN’s either at the point of connection or due to policy violation
after connection is made. With this approach, non- compliant users are no longer denied access due to minor policy violations (e.g., antivirus files outof-date by one day), but can continue to remain productive through limited access to applications like e-mail or the Internet. In addition, CounterACT
provides continued monitoring of connected devices to ensure policies are being enforced and provides a measured and appropriate response to
specific policy violations.
ALERT AND INFORM
Open Trouble Ticket
Send Email
SNMP Traps
Syslog
HTTP Browser Hijack
Auditable End-User Acknowledgement
Self-Remediation
SMS, PatchLink Integrations
RESTRICTIVE ACCESS
Deploy a Virtual Firewall around an infected
or non-compliant device
Reassign the device into a VLAN with
restricted access to resources and services
Update access lists on switches, firewalls and
routers to restrict access
Automatically move device to a
pre-configured guest network
MOVE AND DISABLE
Reassign device from production VLAN to a
quarantine VLAN
Block access with 802.1X
Alter the end user’s login credentials to restrict
or completely block access
Block access with device authentication
Turn off physical switch port
Terminate unauthorized applications
Figure 1: Flexible policy enforcement options
•• Alerts: CounterACT will alert appropriate network administrators to specific policy violations of unknown devices. This is accomplished
through SNMP traps, Syslog export, API level integration with trouble ticketing systems to automatically open a trouble ticket, e-mail, and pager
notification.
•• Engage/Inform: CounterACT will engage the visitor who is in violation of security policy. The appliance will hijack the HTTP session and present
the user with a dialogue box explaining which corporate policy has been violated. The visitor can choose to self-remediate, or may be instructed
to contact a network administrator before being allowed on the network.
•• Limit Network Access: A key feature of CounterACT is the ability to provide a plug-and-play virtual firewall which protects critical network
resources from unauthorized access, and provides protection of vulnerable systems from threats, including unknown devices.
7
CounterACT
Network Access. Controlled.
Technical Note
•• Update Network Access Lists: ForeScout has developed a full catalogue of network API level device plug-ins which allows the appliance to
communicate with network elements like switches, routers, and firewalls. This response is then used to deny access to a visitor device that is not
compliant with network policy, effectively blocking the device from connecting at the infrastructure level.
•• Move: Similar to the functions described in limiting network access, CounterACT provides a level of flexibility in enforcing network policy.
The range of response allows network administrators to control which devices have access to specific areas within the network. Part of this
functionality is having the ability to move connecting and connected devices between public, restricted, and quarantined VLAN’s.
•• Disable: The most definitive enforcement is to deny network access to a device which does not comply with the network security policies.
CounterACT can do this through its own blocking mechanisms or work with network elements to close connection. In the case of switch
integration, this could be accomplished through turning off the port that the device is attempting to connect to. The “virtual firewall” feature is
built into the CounterACT appliance.
Compliance and Reporting
One of the most important pieces of information for network administrators to have is a complete picture of network elements and their correlated
information. ForeScout’s CounterACT appliance not only provides this information, but gives network administrators the ability to search this
information using any piece of the correlated information for each element. This information includes important network identifiers like IP address,
MAC address, NetBIOS host name, DNS host name, etc.
The database of network information is always up to date ensuring that any change within the network is detected, logged, alerted if necessary and
stored in preparation for any future reports that will need to be generated.
Upon deployment, CounterACT immediately begins and continues to learn the network topology. The appliance populates the Network Information
Database with initial topology and inventory information. From that point on, the appliance remains in an automatic learning mode continually
updating the database with the most current network information. This information is then correlated and made available via the Network Information
Portal (see Figure 2) or through CounterACT’s standard reporting capabilities.
Figure 2: The Network Information Portal provides a current database of network information.
8
CounterACT
Network Access. Controlled.
Technical Note
Non-Disruptive Deployment of CounterACT
CounterACT seamlessly integrates with any network environment and does not require any infrastructure changes or costly equipment upgrades.
Typically spanned from a distribution layer switch for a highly scalable, cost-effective deployment, CounterACT is out-of-band and features
downstream enforcement to control devices at the access layer. The non-inline deployment method eliminates latency and point-of-failure issues.
To realize the full extent of CounterACT’s capabilities, the appliance needs to be properly deployed in the enterprise network. Since CounterACT
deployment is not inline — i.e. the network traffic does not need to flow through the appliance in order for it to realize its protection and policy
enforcement capabilities. Instead, the appliances are non-intrusively connected to the infrastructure. This is done either by connecting to monitoring
ports on switches (“SPAN” in some denominations), or by using network taps.
In order to employ the protection capabilities of CounterACT, the appliance is connected at network choke points, which separate sections of the
network that need to be protected from each other. For example, at an access layer (or distribution layer) switch serving a workgroup or a department;
at a VPN concentrator, connecting out-of-premises machines to the enterprise network; or at a WAN link connecting remote branches or different
offices. The appliances will then be able to automatically limit the spread of a threat (including a zero-day threat) to other parts of the network.
To fully utilize the NAC capabilities, the appliance will need to be able to monitor relevant network traffic. For example, to be able to monitor and
enforce Active Directory authentication, the appliance needs to monitor network traffic going to and from Domain Controllers. To monitor/enforce
policy regarding access to a specific server, the appliance needs to monitor the traffic to that server. This is achieved by using monitor ports (or
network taps) in the relevant switches — e.g. the switch where the Domain Controller is connected. To see new IP addresses (or new MAC addresses)
join the network, the appliance needs to be connected to the same LAN (technically, to the same broadcast domain) as the connecting hosts, and so
forth. CounterACT fully supports IEEE 802.1Q LAN trunking (VLAN’s), so multiple broadcast domains can be monitored via one port.
A full deployment graphic is included below, understanding that every network topology is different. With this in mind, the graphic has been created
to capture a generic example of a CounterACT deployment.
Figure 3: Typical CounterACT deployment
9
CounterACT
Network Access. Controlled.
Technical Note
Conclusion
The ever expanding number of devices that exist in and around the corporate world is increasing exponentially each year. As mobility proliferates, so
too does the requirement for network security solutions that protect organizations from not just external attacks but attacks, originating inside the
network perimeter. Policy enforcement plays an increasing role in this environment — due to both the increase in regulatory pressure and the ability
for more individuals to conduct malicious activity.
Implementing a network access control solution, such as ForeScout’s CounterACT appliance, provides organizations with the ability to automatically
enforce security policies, while still maintaining user productivity. Today, Fortune 1000 corporations and government agencies have deployed
ForeScout appliances globally to control access to their networks and resources, defend against hackers and self-propagating malware, and ensure
business continuity.
.....................................................................................................................................................
About ForeScout
ForeScout delivers pervasive network security by allowing organizations to continuously monitor and mitigate security exposures and cyber attacks.
The company’s CounterACT appliance dynamically identifies and assesses network users, endpoints and applications to provide visibility, intelligence
and policy-based mitigation of security issues. ForeScout’s open ControlFabric™ technology allows a broad range of IT security products and
management systems to share information and automate remediation actions. Because ForeScout’s solutions are easy to deploy, unobtrusive, flexible
and scalable, they have been chosen by more than 1,500 enterprises and government agencies. Headquartered in Campbell, California, ForeScout
offers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.
.....................................................................................................................................................
ForeScout Technologies, Inc.
900 E. Hamilton Ave.,
Suite 300
Campbell, CA 95008
U.S.A.
T 1-866-377-8771 (US)
T 1-408-213-3191 (Intl.)
F 1-408-371-2284
www.forescout.com
©2014 ForeScout Technologies, Inc. All rights reserved. ForeScout Technologies, the ForeScout logo, CounterACT and ControlFabric are trademarks of ForeScout Technologies, Inc. All other trademarks are
the property of their respective owners.
Doc: 2013.0068
10