Deploying Next Generation Firewall with ASA and Firepower services

Transcription

Deploying Next Generation Firewall with ASA and Firepower services
Deploying Next
Generation Firewall with
ASA and Firepower
services
Dragan Novaković
Security Consulting Systems Engineer
March 2015.
Threat Landscape Demands more than Application Control
60%
54%
of data
is stolen
in hours
of breaches
remain undiscovered
for months
100%
of companies connect
to domains that host
malicious files or services
It is a Community
that hides in plain sight
avoids detection
and attacks swiftly
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
2
‘Defense-in-Depth’ Security Alone Is Not Enough
Siloed
Approach
Poor
Visibility
Manual
and Static
Increased
complexity
and reduced
effectiveness
Undetected
multivector
and advanced
threats
Slow, manual
inefficient
response
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
3
Why?
Cisco Confidential
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
5
5
The Configuration Problem
•  Poor awareness of true operational environment
•  Change to environment requiring configuration/posture changes
unrecognized
•  Detection content unavailable
•  0-day
•  No anomaly detection mechanisms in place
Cisco Confidential
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
6
6
The Organizational Problem
•  False positive rates too high
•  Operator overload due to mass of equally meaningless events that must be
contextualized
•  Frequently technologies are deployed but not properly operationalized
•  Check-box security
•  In 2014, the average cost of an organizational
data breach was US$3.5 million
Source: The Ponemon Institute
Cisco Confidential
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
7
7
Integrated Threat Defense Across the Attack Continuum
Attack Continuum
BEFORE
DURING
AFTER
Control
Enforce
Harden
Detect
Block
Defend
Scope
Contain
Remediate
Firewall/VPN
NGIPS
Advanced Malware Protection
Granular App Control
Security Intelligence
Retrospective Security
Modern Threat Control
Web Security
IoCs/Incident Response
Visibility and Automation
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
8
What is Sourcefire?
From a historical perspective
•  Snort Created
•  Created by Martin Roesch in 1998
•  Open source network intrusion system
• 
Engine
• 
Rules Language
•  Sourcefire Founded
•  Founded in 2001 by Martin Roesch
•  Created a commercial version of Snort
•  Sourcefire acquires Immunet
•  Acquisition completed 2011
•  Advanced Malware Protection
•  ClamAV
•  Cisco acquires Sourcefire
•  Acquisition completed 2013
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
9
What is Sourcefire?
From a product perspective
•  Sourcefire IPS/NGFW
•  IPS powered by Snort
•  Includes NGFW features such as URL filtering and Application Visibility and
Control
•  Sensors are controlled and monitored by FireSIGHT Defense Center (on
premises)
•  AMP for Endpoints
•  Agent installed on each endpoint
•  Endpoints connected to off-premises cloud for has lookups, sandboxing
•  Managed by FIreAMP Console (cloud based)
•  Cisco products
•  Content: ESA, WSA, CWS
•  Network: ASA
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
10
Addressing The Configuration Problem
•  Visibility Architecture
•  Collect context about the operational environment
•  Continuously in real-time
•  Visibility data is used to recommend configuration of
security infrastructure
•  Real-time notifications of change to drive real-time
change in security posture
•  Content
•  Rapid development and dissemination of updated
detection is a fundamental
•  Vendor
•  Security operations teams
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
11
Addressing The Organizational Problem
•  Contextualization
•  Event loads are high due to misconfiguration
•  Even when well tuned, raw events must be contextualized automatically when possible
•  Operationalization
•  That’s your job…
•  Engagement from corporate boards is crucial
in setting security priorities and
expectations
•  Boards need to know what the cybersecurity
risks to the business are and their potential
impact
•  CIOs must ask tough questions about security
controls that are meaningful to the board and outline the business implications
Cisco Confidential
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
12
12
Introducing
Industry’s First Threat-Focused NGFW
Proven Cisco ASA firewalling
Industry leading NGIPS and AMP
Cisco ASA with FirePOWER Services
•  Integrating defense layers helps organizations
get the best visibility
•  Enable dynamic controls
to automatically adapt
#1 Cisco Security announcement of the year!
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
•  Protect against advanced threats
across the entire attack continuum
Cisco Confidential
13
ASA 5585-X SSP-60
(40 Gbps)
Introducing ASA
with FirePOWER services
ASA 5585 –X SSP-40
ASA 5585-X SSP-20
ASA 5585-X SSP-10
ASA 5555-X
ASA 5545-X
ASA 5525-X
ASA 5515-X
ASA 5512-X
FirePOWER Software module – *requires SSD disk
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
FirePOWER Hardware module
Cisco Confidential
14
Superior Integrated & Multilayered Protection
World’s most widely deployed, enterpriseclass ASA stateful firewall
Cisco Collective Security Intelligence Enabled
Clustering &
High Availability
Network Firewall
Routing | Switching
Intrusion
Prevention
(Subscription)
Advanced
Malware
Protection
FireSIGHT
Analytics &
Automation
Application
Visibility & Control
(Subscription)
WWW
URL Filtering
Granular Cisco® Application
Visibility and Control (AVC)
(Subscription)
Industry-leading FirePOWER
next-generation IPS (NGIPS)
Built-in Network
Profiling
Identity-Policy
Control & VPN
Reputation- and category-based
URL filtering
Cisco ASA
Advanced malware protection
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
15
Visibility Is the Key
T h
r
e a
h
i
t
d d e n
p
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
s
l
i
n
a
i
n
s
i
g h
t
Cisco Confidential
16
Central Management, Intelligence and Context
FireSIGHT Management Centre
•  FireSIGHT
•  Central Management
Processes
events
•  Policy Definition
•  Event Analysis
•  Correlation
•  Network Map (Users, devices, apps, etc)
Generates
events
-  IPS
•  FirePOWER
-  Intelligence
•  Realtime traffic analysis
-  File
•  Access Control
-  Malware
-  Access Control
•  Passive acquisition
-  Flow
-  Discovery
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
17
FireSiGHT Management Centre
SecOPS Workflows -FireSIGHT Management Center
FireSIGHT
NGFW/NGIPS Management
Forensics / Log Management
Network AMP / Trajectory
Vulnerability Management
Incident Control System
Adaptive Security Policy
Retrospective Analysis
Correlated SIEM Eventing
Network-Wide / Client Visibility
Visibility Categories
Threats
Users
Web Applications
Application Protocols
File Transfers
Malware
Command & Control Servers
Client Applications
Network Servers
Operating Systems
Routers & Switches
Mobile Devices
Printers
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
VoIP Phones
Virtual Machines
Cisco Confidential
18
FireSIGHT Fuels Automation
IT Insight
Impact Assessment
Spot rogue hosts, anomalies, policy
violations, and more
Threat correlation reduces actionable
events by up to 99%
Automated Tuning
User Identification
Associate users with security
and compliance events
Adjust IPS policies automatically
based on network change
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
19
Cisco Confidential
19
Impact Assessment
Correlates all intrusion events
to an impact of the attack against the target
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Administrator
Action
Why
1
Act immediately,
vulnerable
Event corresponds
to vulnerability mapped
to host
2
Investigate,
potentially vulnerable
Relevant port open
or protocol in use,
but no vuln mapped
3
Good to know,
currently not
vulnerable
Relevant port not open
or protocol
not in use
4
Good to know,
unknown target
Monitored network, but
unknown host
0
Good to know,
unknown network
Unmonitored network
Impact Flag
Cisco Confidential
20
Cisco FireSIGHT Fuels Automation
Impact Assessment and Recommended Rules Automate Routine Tasks
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
21
FireSIGHT : Detecting Anomalies
§ 
Detects if new application appears or traffic profile changes
§ 
Identify Hacked Hosts
§ 
Useful in static environments: Scada, DMZ, MEDTEC...
Reduced Risk and Cost
ssh
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
ALERT
Host has suddenly
started to use SSH
client and outgoing
traffic volume has
increased by 3
Cisco Confidential
22
FireSIGHT : Automated Responses
§ 
Use pre-defined or custom script to initiate automatic actions
§ 
E.g, Quarantine device with ISE API
Reduced Risk and Cost
change VLAN
or SGT
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
I
S
E
Indications Of Compromise
- IPS event impact 1
- Malware
- Communication with BOTNET
QUARANTINE
Cisco Confidential
23
Automated, Integrated Threat Defense
Superior Protection for Entire Attack Continuum
Context
and Threat
Correlation
Context and Threat Correlation
Dynamic
Security Control
Priority 1
Priority 2
Multi-vector
Correlation
Priority 3
Impact Assessment
Retrospective
Security
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
24
Automated, Integrated Threat Defense
Superior Protection for Entire Attack Continuum
Context
and Threat
Correlation
Dynamic Security Control
Dynamic
Security Control
http://
WEB
http://
WWW
WWW
WWW
WWW
Multi-vector
Correlation
Adapt Policy to Risks
Retrospective
Security
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
25
Automated, Integrated Threat Defense
Superior Protection for Entire Attack Continuum
Context
and Threat
Correlation
Dynamic
Security Control
Multi-vector Correlation
Host A
Admin
Request
5 IoCs
Admin
Request
Mail
Multi-vector
Correlation
Mail
PDF
Host B
3 IoCs
PDF
Early Warning for Advanced Threats
Host C
Retrospective
Security
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
26
Automated, Integrated Threat Defense
Superior Protection for Entire Attack Continuum
Context
and Threat
Correlation
Retrospective Security
Dynamic
Security Control
Multi-vector
Correlation
Shrink Time between Detection and Cure
Retrospective
Security
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
27
OpenAppID – First OSS Application and Control
•  OpenAppID Language Documentation
o  Accelerate the identification and protection for new clouddelivered applications
•  Special Snort engine with OpenAppID preprocessor
o  Detect apps on network
o  Report usage stats
o  Block apps by policy
o  Snort rule language extensions to enable app specification
o  Append ‘App Name’ to IPS events
Available now at Snort.org •  Library of Open App ID Detectors
o  Over 1000 new detectors to use with Snort preprocessor
o  Extendable sample detectors
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
28
Reduced Cost and Complexity
Annual Costs of IPS Maintenance
•  Multilayered protection
in a single device
Cisco’s FirePOWER Next-Generation IPS
collectively saves this customer $230,100 per year
•  Highly scalable
$144,000
•  Automates security tasks
–  Impact assessment
$72,000
–  Policy tuning
$59,400
–  User identification
$24,300
$18,000
$3,000
Impact Assessment of IPS Events
IPS Tuning
Typical IPS
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Linking IPS Events to Users
•  Integrates with third-party
security solutions
Next-Generation IPS
Cisco Confidential
29
Indications of Compromise (IoCs)
IPS Events
SI Events
Malware Events
Malware Backdoors
Connections
to Known CnC IPs
Malware Detections
Exploit Kits
Office/PDF/Java Compromises
Web App Attacks
Malware Executions
CnC Connections
Dropper Infections
Admin Privilege Escalations
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
30
AMP Provides Continuous Retrospective Security
Breadth of
Control Points
WWW
Email
Endpoints
Web
Telemetry Stream
IPS
Devices
Continuous Analysis
File Fingerprint and Metadata
File and Network I/O
Network
Continuous Feed
1000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00
0001110 1001 1101 1110011 0110011 101000 0110 00 0111000 111010011 101 1100001 110
0100001100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00
Process Information
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
31
The Cisco Collective Security
8 hours
after
thelearned
first
attack,
At
theCloud
same
time,
a device
with
has
An unknown fileIntelligence
is present
the
Malware endpoint
triesato re-enter
the
FireAMP
connector
this
file
is
malicious
and
on
IP:
10.4.10.183,
having
At 10:57,
the
unknown
file
is
thethe
system
Seven
hours
later
file
istothrough
reacts
to
retrospective
event
retrospective
event
is
fororiginal
been
The
filefrom
is
copied
yetthe
a raisedthe
from downloaded
IP
10.4.10.183
to
IP:
then fourth
transferred
to(10.5.60.66)
aimmediately
third
point
of entry butstops
is recognized
and
and
Firefox
device
all
four
devices
immediately
.
10.5.11.8
device
(10.3.4.51)
using
an the newly detected
and
blocked.
through
thequarantines
same
SMB
SMB applicationmalware
application a half hour later
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
32
Sample Solution Architecture with Management
FireSIGHT
Management Center
Configuration (policy)
File Trajectory
AMP Events
Correlation
Link to AMP Public Cloud
for Endpoint Connector
Events
Cisco Security
Manager or ASDM
ASA Cluster with
FirePOWER Services
File Submitted for
Dynamic Analysis
VRT Dynamic Analysis
Cloud
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Endpoint
Connectors
File Disposition
queried against AMP
Cloud
(SHA256, Spero)
AMP Cloud
Manual Dynamic Analysis
for Endpoint Connectors
Cisco Confidential
33
ASA FirePOWER Services Packet Flow
SFR
YES
1
2
Receive
PKT
3
Ingress
Interface
4
Existing
Conn
NO
5
ACL
Permit
YES
NO
8
NAT IP
Header
9
Egress
Interface
NO
DROP
© 2014 Cisco and/or its affiliates. All rights reserved.
YES
YES
Inspections
sec checks
NO
DROP
10
L3
Route
Match
Xlate
NO
DROP
7
6
DROP
11
L2
Addr
YES
XMIT
PKT
NO
DROP
Cisco Public
34
ASA FirePOWER Functional Distribution
URL Category/Reputation
NGIPS
Application Visibility and Control
File Type Filtering
Advanced Malware Protection
File Capture
TCP Normalization
NAT
TCP Intercept
Routing
IP Option Inspection
ACL
IP Fragmentation
VPN Termination
FirePOWER®
Services Module
ASA Module
Botnet Traffic Filter
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public
35
FireSIGHT Management Center Appliances
New
New
Max.
Devices
Managed*
Event
Storage
Max.
Network
Map
(hosts /
users)
Events
per Sec
(EPS)
750
1500
2000
3500
4000
Virtual
10
35
70
150
300
Virtual FireSIGHT
Management Center
Up to 25 Managed Devices
100 GB
2K/2K
2000
© 2014 Cisco and/or its affiliates. All rights reserved.
125 GB
50K/50K
6000
1.8 TB
150K/150K
12000
400 GB
300K/300K
10000
4.8/6.3 TB
600K/600K
20000
* Max number of devices is dependent upon sensor type and event rate
Virtual FireSIGHTNew
Management Center
Up to 2 or 10 Managed
Devices - Promotional PID
FS-VMW-2-SW-K9
FS-VMW-10-SW-K9
Cisco Public
36
Collective Security Intelligence
Malware
Protection
Reputation
Feeds
Cisco Talos
Vulnerability
Database Updates
(Talos Security
Intelligence and
Research Group)
IPS Rules
Sandboxing
Machine Learning
Big Data Infrastructure
Private and
Public
Threat Feeds
Sandnets
File Samples
(>1.1 Million per
Day)
Advanced Microsoft
and Industry
Disclosures
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
FireAMP™
Community
SPARK Program
Honeypots
Snort and ClamAV
Open Source
Communities
Sourcefire
AEGIS™
Program
Cisco Confidential
37
Robust Partner Ecosystem
Vulnerability Management
Full Packet Capture
Custom Detection
BEFORE
Network Access Taps
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
AFTER
DURING
Policy and
Control
Analysis and
Remediation
Identification
and Block
Visualization
Infrastructure & Mobility
Combined API Framework
38
Incident Response
NAC
SIEM
Cisco Confidential
38
Only Cisco Delivers
Unmatched
Visibility
Consistent
Control
Advanced Threat
Protection
Complexity
Reduction
Global Intelligence
With the Right
Context
Consistent Policies
Across the
Network and
Data Center
Detects and Stops
Advanced Threats
Fits and Adapts
to Changing
Business Models
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
39
Cisco ASA with FirePOWER Services
A New, Adaptive, Threat-Focused NGFW
Integrated Threat Defense
Best-in-class, multilayered protection
in a single device
Superior Visibility
Full contextual awareness
to eliminate gaps
Automation
Simplified operations and dynamic
response and remediation
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
40
Thank you.