家中等职业教育改革发展示范学校.ppt_第1页
家中等职业教育改革发展示范学校.ppt_第2页
家中等职业教育改革发展示范学校.ppt_第3页
家中等职业教育改革发展示范学校.ppt_第4页
家中等职业教育改革发展示范学校.ppt_第5页
已阅读5页,还剩39页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Risk Management using Network Access Control and Endpoint Control for the Enterprise,Kurtis E. Minder Mirage Networks,i,Agenda,Drivers of NAC Key Elements of NAC Solutions Identify Assess Monitor Mitigate NAC Landscape,Business Needs Drive Security Adoption,3 Ubiquitous Security technologies Anti-vi

2、rus - Business driver: File sharing Firewalls - Business driver: Interconnecting networks (i.e. Internet) VPNs - Business driver: Remote connectivity Todays top security driver - Mobile PCs and devices Broadband access is everywhere Increased percentage of the time devices spend on unprotected netwo

3、rks Perimeter security is rendered less effective because mobile devices bypass it and arent protected by it Mobility of IP devices is driving the need for Network Access Control solutions Leading source of network infections More unmanaged devices on the network than ever - guest and personal devic

4、es,The Traditional Approach to Network Security Isnt Enough,The Problem NAC Should Address,Today, endpoint devices represent the greatest risk to network security by propagating threats or being vulnerable to them.,Infected Devices,Unknown Devices,Out-of-Policy Devices,propagate threats, resulting i

5、n loss of productivity may not check all IP devices In-line security appliance/switch Pros: Sees all devices both managed and unmanaged and doesnt require agent based software Cons: If it is not inline with, or does not replace the access switch then it will not see the device as it comes on the net

6、work Out of band appliances with network awareness Pros: Sees all devices as they enter the network both managed and unmanaged; easier to implement than many of the other approaches Cons: May require switch integration for mitigation of problems,Assess,Assess Endpoint Integrity,Question: Even if a d

7、evice is allowed on my network, how do I ensure it meets my security policies and risk tolerance? Answer: Endpoint integrity checks Operating system identification and validation checks Typically requires an agent Must establish a policy relating to acceptable patch level (latest patch on company SM

8、S server, no older than X months, most recent patch available from software vendor) What do you do for unknown devices? Usually requires an agent for these checks Security software checks - AV, personal firewall, spyware, etc. Is it up and running Is it in the right configuration Is it up to date -

9、both the software and the database Usually requires an agent for these checks,Assess Endpoint Integrity cont.,Endpoint integrity checks cont. Endpoint configuration - find unauthorized servers and services Web servers, FTP servers, mail servers, etc. Vulnerable or high risk ports, i.e. port 445 expl

10、oited by Zotob These checks can be done from the network or with an agent Threat detection Scan the device for active infections or backdoors Not commonly implemented on entry to the network Too much latency Risk profile substituted for deep scans (i.e. AV is up to date and had a current scan) Eleme

11、nts for endpoint integrity checks Network scanning server (Optional) Endpoint software - permanent or transient (Optional) Policy server (Required) - must have somewhere to define what is allowed/disallowed,Monitor,Monitoring Post Network Entry,The forgotten element of Network Access Control Why is

12、monitoring a critical element of NAC? Cant effectively check for all threats on entry - takes too long Security policy state can change post entry - users initiate FTP after access is granted Infection can occur post entry - e-mail and web threats can change security state of the device What Gartner

13、 says in their paper “Protect Your Resources With a Network Access Control Process” “The network traffic and security state of systems that are connected to the network must be monitored for anomalous behavior or system changes that bring them out of compliance with security policies.” Why isnt this

14、 simply another network security function? Monitoring is both for threats and policy adherence - takes advantage of policy definition of NAC solution Works hand in hand with NAC quarantine services,Traditional Approach to Network Security,Traditional Approach Firewall/IPS at the Perimeter AV, HIDS/H

15、IPS on the Endpoint,External Environment New technologies New threats Regulatory requirements,Exploiting the Networks Weakness,Infected endpoints bypass the perimeter generating rapidly propagating threats that take over a network in minutes,bringing business to a halt and creating costly cleanup.,M

16、onitoring Approaches,Agent based approaches Host Intrusion Prevention Systems Personal firewalls Both require integration with a network policy server to be an element of NAC Doesnt cover unknown/unmanaged/unmanageable devices Network based approaches In-line: Typically evolution of IPS vendors into

17、 NAC capabilities; also includes Network Based Anomaly Detection (NBAD) vendors Out-of-band: Most commonly NBAD and old Distributed Denial of Service (DDoS) security vendors Key considerations Does the security device watch for policy violations as well as threats? Does it see devices as they enter

18、the network? Can they work across both voice and data networks without negatively impacting quality and performance? What is the management overhead associated with both approaches?,Mitigate,Mitigation Approaches for NAC,Two elements for NAC mitigation Quarantine capabilities (required) On-entry res

19、trict access for devices not meeting requirements Post-entry take a device off the network and send to quarantine zone if they violate policy or propagate a threat Ideally should be able to assign to different quarantine server based on problem, i.e. registration server for guests, AV scanner for in

20、fected devices, etc. Remediation services for identified problems (optional) Additional diagnostic tools for deeper checks - Vulnerability scanners AV scanners, etc. Tools for fixing identified problems OS patch links AV signature update and malware removal tools Registration pages for unknown devic

21、es,Quarantine Approaches,DHCP integration Uses DHCP process for identification and endpoint integrity checks on entry to the network. Pros: Assigns appropriate IP and VLAN according to their risk level Cons: After IP address is assigned they dont have an independent quarantine capability; Static IPs

22、 bypass their enforcement Switch integration Uses either ACLs or 802.1x ACLs - not commonly used because of negative performance impact and access requirements in the network 802.1x - forces device to re-authenticate and assigns new VLAN Pros: Effective both pre and post admission, uses standards ba

23、sed approach in 802.1x Cons: Can negatively impact switch performance; Usually not granular in quarantine server assignment; If using broadcast quarantine VLAN there is a cross-infection risk,Quarantine Approaches cont.,In-line blocking with web redirect Pros: Improved performance over ACLs; Can gra

24、nularly block suspect traffic; has the capability of sending web traffic to appropriate quarantine server based on problem Cons: Doesnt see downstream traffic so can only block and redirect traffic that comes through it; May require additional integration with network for mitigation because of this

25、ARP management Security appliance selectively goes inline for a single host and becomes its default gateway by ARP manipulation Pros: No network integration required for full quarantine capabilities; enables surgical, problem specific quarantine without cross-infection risk; effective both pre and p

26、ost admission Cons: If implemented improperly network equipment can misidentify this as an attack and drop this traffic,Todays NAC Landscape,Evolving proprietary standards Cisco Network Admission Control (CNAC) Three critical elements - Cisco Trust Agent (CTA), updated Network Access Device (NAD), C

27、isco Access Control Server (ACS) Integration with endpoint agents to communicate with ACS regarding appropriate access level to the network Microsoft Network Access Protection (NAP) Available in Vista Endpoint needs System Health Agent (SHA) SHA reports to System Health Validator (SHV) to do policy

28、checks Network isolation through enforcement integrations DHCP Quarantine Enforcement Server (QES) VPN QES 802.1x Trusted Network Connect open standard TNC compliant client required on endpoints Policy Decision Point (PDP) for security policy comparisons Policy Enforcement Point (PEP) for quarantining,Summary,NAC is an

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论