SAFE SIMPLIFIES SECURITY August 2015 SAFE Simplifies Security | Introduction 2 Compliance Security Intelligence Segmentation Threat Defense Management Secure Services The Key to SAFE organizes the complexity of holistic security into Places in the Network (PINs) and Secure Domains. PINs are reference examples of locations found in networks, and Secure Domains are the taxonomical areas used to protect them. Introduction SAFE is a secure architectural framework example for business networks. SAFE simplifies complexity using a model that focuses on the areas that a company must secure. Each area is treated with holistic discussion of today’s threats and the capabilities needed to secure them. Critical challenges have been deployed, tested, and validated at Cisco. These solutions provide guidance, complete with configuration steps, to ensure effective and secure deployments for our customers. For more information, visit cisco.com/go/safe SAFE Simplifies Security | Secure Domains Compliance Security Intelligence Management Segmentation Threat Defense Secure Services Secure Domains Secure Services Threat Defense Segmentation Provides technologies such as access control, virtual private networks, and encryption. It includes protection for insecure services e.g., applications, collaboration, and wireless. Provides visibility into the most evasive and dangerous cyber threats. It uses network traffic telemetry, reputation, and contextual information for that visibility. Enables assessment of the nature and the potential risk of the suspicious activity so that the correct next steps for cyber threats can be taken. Establishes boundaries for both data and users. Traditional manual segmentation uses a combination of network addressing, VLANs, and firewalling for policy enforcement. Advanced segmentation leverages identity-aware infrastructure to enforce policies in an automated and scalable manner, greatly reducing operational challenges. Compliance Security Intelligence Management Addresses policies, both internal and external. It shows how multiple controls can be satisfied by a single solution. Examples of external compliance include PCI, HIPAA, and Sarbanes-Oxley (SOX). Provides global detection and aggregation of emerging malware and threats. It enables an infrastructure to enforce policy dynamically, as reputations are augmented by the context of new threats. This enables accurate and timely security protection. Management of devices and systems using centralized services is critical for consistent policy deployment, workflow change management, and the ability to keep systems patched. Management coordinates policies, objects, and alerting. xt -G e N n tio ra e ne w al Fi re In t E er ng n in et e Se S a e rc rv h ic e 9 | Secure Cloud 10 | External Zones ud lo C N n tio ra ne e xt -G e l w al re Fi e g d E S Sh e ar rv e i d Z ce o s ne e S d e liz ua irt V s tie ili ab ap C p P lia C Z nce I o ne ab Z ase o ne at 7 | Secure Data Center r Z ve o r ne p p A m o C D e nt ra liz e l w al re Fi d M an ag e m e nt r ut e R o a at D r nt e e C W A N C r le nt ro o n tio ra ne e xt -G e N l w al Fi re ut e R o r C am p us h S w itc W ire le ss C le nt ro o r e N e xt -G ne n ra tio Fi re w al / ut e R o r B ra nc h Best Practice Security Capability Flows Overview C n tio ra ne e xt -G e N h itc 6 | Secure Campus S w ss le W ire 5 | Secure Branch C C lou C R d lo M -b ud S as e e W rv d e ic b e S e cu rit y S Sh e ar rv e i d Z ce o s ne S Pu e b rv lic Z er o s ne SAFE Simplifies Security | Best Practice Security Capability Flows Overview 4 8 | Secure Edge SAFE Simplifies Security | Branch 5 Manager researching product information Wireless Controller Return to Overview L2/L3 Network Host-based Security Wireless Intrusion Prevention Wireless Posture Access Assessment Control + TrustSec Flow Analytics Next-Generation Firewall/Router Switch Host-based Security Posture Access Assessment Control + TrustSec Flow Analytics L2/L3 Network Clerk processing credit card transaction Firewall Next-Gen Intrusion Prevention System AntiMalware Flow Analytics AVCApplication Visibility Control Web Security Services Threat Intelligence VPN WAN To Data Center To Cloud Secure Branch Key Security Challenge Branches are typically less secure than their campus and data center counterparts. Economics often dictate that it is cost prohibitive to duplicate all the security controls typically found at larger locations when scaling to hundreds of branches. However, this makes them prime targets and more susceptible to a breach. In response, it is important to include vital security capabilities while ensuring cost effective designs in the branch. Top Threats Mitigated • Endpoint malware (e.g., POS malware) • Wireless infrastructure exploits (e.g., rogue AP, MitM) • Unauthorized/malicious client activity • Exploitation of trust Capability Product Capability Product Capability Product Cloud Web Security, Meraki MX, FirePOWER URL Cisco Advanced Malware Protection for Networks AnyConnect Agent, Centralized Identity Services Engine Adaptive Security Appliance, Integrated Services Router, Meraki MX Wireless Controller/Catalyst Switch, Centralized Identity Services Engine Cisco Advanced Malware Protection for Endpoint, AnyConnect, Anti-Virus (partner) Cisco Collective Security Intelligence, Cisco Talos Security Intelligence Cisco FirePOWER Services on Adaptive Security Appliance, UCS-E, or FirePOWER Appliance Centralized Mobility Services Engine, Centralized Wireless LAN Controller, Meraki Integrated Services Router, Adaptive Security Appliance, Wireless LAN Controller, Catalyst Switch Adaptive Security Appliance, Integrated Services Router, Meraki MX FirePOWER Services Module or Appliance, Meraki MX SAFE Simplifies Security | Campus 6 CEO sending email to shareholders Wireless Controller Return to Overview L2/L3 Network Hostbased Security Wireless Identity Wireless Intrusion Prevention Mobile Device Management Posture Assessment Access Control + TrustSec Flow Analytics Switch Identity Hostbased Security Posture Assessment Access Control + TrustSec Next-Generation Firewall Flow Analytics L2/L3 Network Salesmen accessing customer database Firewall Next-Gen AntiMalware Intrusion Prevention System Access Control + TrustSec Router Threat Access Intelligence Control + TrustSec Flow Analytics VPN WAN To Data Center Secure Campus Key Security Challenge Campuses contain large user populations with a variety of device types and traditionally little internal security controls. Due to the large number of security zones (subnets and VLANs), secure segmentation is difficult. Because of the lack of security control, visibility, and guest/ partner access, campuses are prime targets for attack. Top Threats Mitigated • Phishing • Web-based exploits Capability • Unauthorized network access • Malware propagation Product • BYOD — Larger attack surface/increased risk of data loss • Botnet infestation Capability Product Capability Product Cloud Web Security, Centralized Web Security Appliance Cisco Advanced Malware Protection for Networks AnyConnect Agent, Identity Services Engine Adaptive Security Appliance, Integrated Services Router, Meraki MX Wireless Controller/ Catalyst Switch, Identity Services Engine Cisco Advanced Malware Protection for Endpoint, AnyConnect, Anti-Virus (partner) Cisco Collective Security Intelligence, Cisco Talos Security Intelligence Cisco FirePOWER Services on Adaptive Security Appliance, UCS-E, or FirePOWER Appliance Mobility Services Engine, Wireless LAN Controller Integrated Services Router, Wireless LAN Controller, Catalyst Switch Adaptive Security Appliance, Aggregation Services Router, Meraki MX Identity Services Engine, Meraki Mobile Device Management SAFE Simplifies Security | Data Center 7 Next-Gen Intrusion Load Prevention Firewall Balancer Switch System Host-based Security Database Zone To Campus Flow Analytics Threat Intelligence Next-Gen Access Intrusion Control + AntiPrevention Firewall TrustSec Malware System Access Control + L2/L3 Network TrustSec VPN PCI Compliance Zone Next-Generation Firewall App Server Zone Router WAN L2/L3 Network Centralized Management Web Application Firewall Flow Analytics Shared Services Zone Policy/ Configuration Visibility/ Context Analysis/ Correlation Analytics Threat Intelligence Vulnerability Management Monitoring Virtualized Capabilities Logging/ Reporting To Edge Return to Overview Secure Data Center Key Security Challenge Data centers contain the majority of information assets and intellectual property. These are the primary goal of all targeted attacks, and thus require the highest level of effort to secure. Data centers contain hundreds to thousands of both physical and virtual servers, segmented by application type, data classification zone, and other methods. Creating and managing proper security rules to control access to (north/south) and between (east/west) resources can be exceptionally difficult. Top Threats Mitigated • Data exfiltration (data loss) • Malware propagation Capability • Unauthorized network access (e.g., application compromise, data loss, privilege escalation, reconnaissance) Product Capability Product • Botnet infestation (e.g., scrumping) Capability Product Adaptive Security Appliance, Virtual Security Gateway, Firepower 9300 Appliance Adaptive Security Appliance, Aggregation Services Router Web Application Firewall Technology Partner FirePOWER Services Module, Appliance, Virtual, Firepower 9300 Appliance Adaptive Security Appliance, Aggregation Services Router, Firepower Appliance Load Balancer Technology Partner Cisco Collective Security Intelligence, Cisco Talos Security Intelligence Cisco Advanced Malware Protection for Networks Cisco Advanced Malware Protection for Endpoint, AnyConnect, Anti-Virus (partner) Netflow Generation Appliance, Lancope FlowSensor, Adaptive Security Appliance Nexus/Catalyst Switch SAFE Simplifies Security | Edge 8 To Campus Return to Overview Flow Analytics Email Security Web Security Next-Generation Firewall Public Servers Zone Hostbased Security Load Web Transport Application Balancer Layer Firewall Security Off-Load L2/L3 Network AntiMalware Next-Gen Firewall Intrusion Prevention System Access Control + TrustSec Distributed L2/L3 Threat AVCDenial of Network Application Intelligence Service Visibility VPN Control Concentrator To External Zones To Cloud Secure Edge Internet Key Security Challenge The Internet Edge is the highest risk PIN because it is the primary ingress point for public traffic and the primary egress point to the Internet. Simultaneously, it is the critical resource that businesses need in today’s Internet-based economy. Top Threats Mitigated • Webserver vulnerabilities • Data loss Capability • DDoS • Man-in-the-Middle Product Capability Product Capability Product Adaptive Security Appliance, Aggregation Services Router Cisco Advanced Malware Protection for Networks Web Application Firewall Technology Partner Cisco Collective Security Intelligence, Cisco Talos Security Intelligence Web Security Appliance, Cloud Web Security Cisco Advanced Malware Protection for Endpoint, AnyConnect, Anti-Virus (partner) Adaptive Security Appliance, Aggregation Services Router, Catalyst Switch Email Security Appliance, Cloud Web Security FirePOWER Services Module or Appliance, Meraki MX Adaptive Security Appliance, Firepower 9300 Appliance, Meraki MX Transport Layer Security Offload Technology Partner FirePOWER Services Module or Appliance Distributed Denial of Service Technology Partner SAFE Simplifies Security | Cloud 9 To Branch To Edge Host-based Security Internet Shared Services Zone Cloud-based CRM Service Cloud Web Security Internet Search Engine Service Threat Intelligence Anomaly Detection AVCApplication Visibility Control Web Reputation/ Filtering Internet Anti-Malware Return to Overview Secure Cloud Key Security Challenge The majority of cloud security risk stems from loss of control, lack of trust, shared access, and shadow IT. Service Level Agreements (SLAs) are the primary tool for businesses to dictate control of security capabilities selected in cloud-offered services. Independent certification and risk assessment audits should be used to improve trust. Top Threats Mitigated • Webserver vulnerabilities • Virus and malware Capability Product • Loss of access • Man-in-the-Middle Capability Product Capability Product Adaptive Security Appliance, Integrated Services Router, AnyConnect, Meraki MX Cisco FirePOWER Services on ASA and UCS-E Cloud Web Security, Web Security Appliance, Meraki MX, Partner OpenDNS Adaptive Security Appliance, Integrated Services Router, Meraki MX Advanced Malware Protection Cisco Advanced Malware Protection for Endpoint, Anti-Virus (partner), AnyConnect SAFE Simplifies Security | External Zones 10 Internet To Edge EXTERNAL ZONES Customers Key Security Challenge Field engineer submitting work order Host-based Security Identity Posture Assessment Securing connections to service offerings is the primary goal when establishing communications with customers outside of the corporate enterprise. A breach or loss of data creates an immediate and heightened lack of trust resulting in loss of commerce. VPN Remote Workers Next-Generation Firewall Technician remotely checking logs Host-based Security Firewall Next-Gen Intrusion Prevention System Web AntiReputation/ Malware Filtering Key Security Challenge VPN Securing remote access for employees connecting to the corporate enterprise from untrusted sites (such as coffee shops and hotels) is critical for maintaining data security. Identity-aware access controls, posture assessments, and encryption enforce a consistent set of policies before allowing access. Third-Party Vendors and Partners Key Security Challenge Customer updating profile Host-based Security Return to Overview Insecure access by partners and vendors can quickly compromise business operations. Implement granular access controls, anomaly detection, and SLAs to block unauthorized access and exploitation of trust. External Zones Businesses are Connected to Risk Recent breaches underscore the need to consider the full ecosystem of your partners, customers, vendors, and employees. Traditional perimeter defenses are not sufficient for the attack vectors present today. Identity aware, policy enforced, and threat anomalies must accompany relationships to secure trust. Top Threats Mitigated • Endpoint malware • Unauthorized/malicious client activity Capability Product • Exploitation of trust • Man-in-the-Middle Capability Product Capability Product Adaptive Security Appliance, Integrated Services Router, AnyConnect, Meraki MX Cisco FirePOWER Services on ASA and UCS-E Cloud Web Security, Web Security Appliance, Meraki MX, Partner OpenDNS Adaptive Security Appliance, Integrated Services Router, Meraki MX Advanced Malware Protection Cisco Advanced Malware Protection for Endpoint, Anti-Virus (partner), AnyConnect