SDP - CSAジャパン

advertisement
SDP
ソフトウェアー・ディファインド・ペリメーター
(Software Defined Perimeter)
ベライゾンジャパン合同会社
テクニカルソリューション本部 エンタープライズアーキテクト
工藤 清仁
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Enterprise Needs are Changing
Latency
Topology
Connectivity
s
users
Data
Center
location
requirements End Points
cost
Risks
resource
s
customer
tolerance
fixed
Strategy
QoS
balance
Mobile
suppliers
Performance
devices
CPE
applications
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
2
Software Defined Perimeter
Temporal Networks as an Open Standard
What Is A Software Defined Perimeter?
 A Security Framework that Protects Application Infrastructure from Network-Based Attacks
 Need-to-Know Connectivity Model With Dynamic Network Assembly
 No visible DNS or IP Addressing
 Cloud based SDPs Create Secure Containers That Hide Workloads and Applications Inside
SDP is open standard created by the Cloud Security Alliance (CSA). Verizon is
a member of the CSA and a contributor to the SDP standard. In reality, SDP is
more of a workflow of existing protocols than a new protocol. It’s based on a
whole set of existing standards.
Opportunity
 Presently shaping the primary emerging standard for Secure Cloud Connectivity
 We will provide the only automated delivery framework for SDP based solutions
 Position Verizon as the primary ‘trust broker’ and dynamic network creation ‘Orchestrator’ for all
secure cloud connected devices within the Internet of Things (IoT)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
3
Software Defined Perimeter (SDP)
Why Do We Need SDP?
Traditional Enterprise Perimeters are Broken
– Phishing, BYOD, SaaS, IaaS
– SDP recreates the perimeter anywhere
Traditional fixed perimeters are broken
Traditional Enterprise Network
– Visibility & connectivity to everything
Outside
The Perimeter
Inside
– Security tools to prevent access
SDP Approach
SaaS
– No visibility or connectivity to anyone
– Authenticate, then dynamically build networks
Employees
Servers
Partners
– Mitigates network-based attacks
– Unifying architecture:
• Internet/intranet, PC/mobile, Managed/BYOD
SDP is an Open Standard
Sales Persons
Telecommuters
Contractors
BYOD
Cloud Security Alliance (CSA)
Workflow based on proven standards
• SPA, TLS, SAML, PKI, DHE, RSA, AES, SHA, etc.
SDP Enables Your Enterprise to Maintain Strict Access Control
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
4
セキュアな発見できないネットワーク
ニュース
"We believe SDP can be a
game changer"
Bob Flores former CTO of the CIA
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
5
The Software Defined Perimeter (SDP)
What Is It? Defining a New Approach.
• SDP is Based on an Open Standard
– Formed Under the Cloud Security Alliance (CSA)
– Workflows Developed on Proven Standards
• SPA, TLS, SAML, PKI, DHE, RSA, AES, SHA, etc.
• Dynamically Provisioned, Real-Time Networks
– Based on Verizon’s Global Network, Secure Cloud Interconnect and
Other Technologies – But These are Only the Foundation.
– Built Anywhere in the World
– In the Cloud, On the DMZ, In the Data Center, Across the Enterprise
– Or across all these places at the same time
• Our Approach Bridges Public and Private IP
– Public Internet
– Satellite, Wireless, Private IP, CDN
You Can’t Attack What You Can’t See!
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
6
Software Defined Perimeter
疎結合なネットワーク環境下でのセキュアな接続の確立
セキュア リソース コンテナ
Verizonの
SDPアプリを選択
ユーザ/デバイスと
場所の有効性確認
経路の確立と
アクセスの有効化
トンネルの確保と
リソースへの接続
発見できないネットワークアクセスの実現
5種類の適用方法
Dynamically Configured Browser-Based
Desktop Application(s)
Mobile Device Client Application(s)
Server Client (Protected Server)
Embedded Devices (sensors etc.)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
7
Software Defined Perimeter
Components
Creating the Secure Cloud On-Ramp
1.
Device Attestation
2.
Identity & Role Verification
3.
Application Access Policy
4.
Real-Time Network Provisioning
5.
Dynamic Tunnel Creation
Five Ways to Connect
A.
Dynamically Configured Browser-
B.
Desktop Application(s)
C.
Mobile Device Client Application(s)
D.
Server Client (Protected Server)
E.
Embedded Devices (sensors etc.)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
8
SDP Architecture
How It Works – Workflow (Animation)
PKI
Fingerprint
Service
Software
Attestation
Location,
Time of Day
SAML
IdP
Assertion
AD
Groups
SDP Controller
Client
Gateway
Crypto
IP’s
SDP Gateways
SPA
Device
Geo
User
Mutual
Fingerprint
Attestation
Get
Location
Identity
Page
SPA
TLS
Browser
Apps Software
SDP
Single Packet Authorization
mTLS Control Channel
mTLS Data Channel
Device Authentication & Validation
Single Packet Authorization
Client-specific pinhole in firewall
Mutual TLS
Device Fingerprint
Software attestation
Geo Location, Time of Day
User Authentication & Authorization
Secure Browser
SAML to IdP
Member of Groups
Dynamic Provisioning
Client-specific crypto artifacts
Gateway Addresses
Single Packet Authorization
Mutual TLS
Application binding
Transparent SAML
SDP Enables Your Enterprise to Maintain Strict Access Control
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
9
How it Works
Secure Non Discoverable Network, Software Defined Perimeter
Five Layers of Security Controls
Dynamic Firewalls
Device Validation (DV)
SDP dynamically binds users to devices, and
then dynamically enables those users to
access protected resources by dynamically
creating and removing firewall rules in the
SDP gateways.
Device validation proves that the key is held
by the proper device. In addition, device
validation attests to the fact that the device
is running trusted software and is being used
by the appropriate user.
Mutual Transport
Layer Security (mTLS)
TLS is typically only used to authenticate
servers to clients, not clients to servers. SDP
uses the full TLS standard to provide mutual,
two-way cryptographic authentications.
Single Packet Authorization
(SPA)
SPA enables SDP to reject all traffic to it from
unauthorized devices. It requires that the
first packet to the controller
cryptographically verifies that it is an
authorized device before being considered
for access to the protected service.
Application Binding (AppB)
After authenticating and authorizing both
the device and the user, SDP creates
encrypted TLS tunnels to the protected
applications. Application binding constrains
authorized applications so they can only
communicate through those encrypted
tunnels, and, simultaneously, blocks all other
applications from using those tunnels.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
10
RSA, CSA Conference - 2014
SDP Activities… ‘Mother of All Hackathons’
The 1st Time One Cloud has Protected all Others
Verizon
Verizon
Internet
MPLS
Azure
IPsec
AWS
•
•
•
•
•
•
2月に米国で開かれたRSA会議で、
これらの仕組を紹介してトライアル
しましたが、どこの国からもアタッ
クされることはありませんでした。
また、9月に米国で開かれたCSA会
議でも、これらの仕組を試しました。
3
Clouds
104
Countries
30
Days
100,000
Highly Sophisticated Attacks
11,000,000 Advanced Method Attacks
15
Billion Attacks in all
Zero Compromises !
With one SDP Orchestrator and Multiple SDP Gateways in the Cloud, SDP can
Protect ALL Resources in Multiple Clouds
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
11
RSA Conference - 2015
SDP Activities…
All attacks have failed:
•
•
•
Random commands hitting SDP gateway (this is caused by attackers running automated scripts)
Server exploits attempts on SDP gateway (this is caused by attackers focusing on a specific vector)
Failed SPA attempts (attackers are trying to replay the PCAP)
1157 unique IP addresses from the following countries:
Source Countries:
Japan
Albania, Argentina, Australia, Austria
Belarus, Belgium, Bosnia and Herzegovina, Brazil, Bulgaria
Canada, Chile, China, Colombia, Costa Rica, Croatia, Cyprus, Czech Republic
Denmark, Ecuador, France, Germany, Greece, Hong Kong, Hungary
Iceland, India, Indonesia, Iran, Iraq, Ireland, Israel, taly
Kazakhstan, Kenya, Korea, Latvia, Lithuania, Luxembourg
Macao, Malaysia, Mexico, Moldova, Morocco, Nepal, Netherlands
Peru, Philippines, Poland, Portugal, Puerto Rico, Romania, Russian Federation
Saudi Arabia, Seychelles, Singapore, Slovakia, Somalia, South Africa, Spain, Sweden, Switzerland
Taiwan, Thailand, Turkey, Ukraina, United Kingdom, United States, Uruguay
Venezuela, Viet Nam, Yemen
With one SDP Orchestrator and Multiple SDP Gateways in the Cloud, SDP can
Protect ALL Resources in Multiple Clouds
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
12
SDP and Compliance
Reducing Security Control Complexity
SDP Integrates 14 of the SANS 20 Critical Security Controls
SDP Provides a Cost Effective Compliance Solution
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
13
Multiple Use Cases
– One Architecture –
 SDP Case Studies… How Is It Being Used Today?
 SDP in Review… How Can It Be Used?
Internet
Internal
• Business & partner portals
• Outsider access
– Issue: Poor passwords & app vulnerabilities
– Issue: Network and VPN connectivity
– SDP: Private Internet portal
– SDP: Precision pinhole access
• Cross-entity collaboration
• BYOD access
– Issue: DoS, SQL injection, man-in-the-middle
– Issue: Malware on uncontrolled devices
– SDP: Invisible to the Internet
– SDP: App access without network access
• Cloud migration
• Internal isolation
– Issue: IaaS develop & deploy, SaaS use &
service
– Issue: Protecting 100% of clients vs. 5% critical
access
– SDP: Private cloud service
– SDP:  Attack surface,  Cost,  Usability
SDP is the Solution to Invitation-Only App Access
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
14
Case1
Coca-Cola: “Network 2020”
What Verizon Delivers
Objective:
 Re-Define the Connected Consumer Experience
 Protect the Brand and Corporate IP
 Provide Unprecedented Business Agility
 Virtualize Everything – Outsource the Burdens
 Produce Trusted, Real-Time Actionable Knowledge
Managed VPN Service
PKI Infrastructure
SCI Based Accesss to Data Centers
Any Device to Any Infrastructure
SDP
4GLTE
WiFi
Verizon
Trust Broker
Benefits
Consumer
Experience
Business
Operations





100% Secure Interactions
Real-Time Network Creation
Dynamic Hybrid Cloud Ready
Fast & Easy to Implement
Verizon Trust Orchestration
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
15
Case2
Key Drivers



What Verizon Delivers
Secure UCC for Anyone on Any Network
Any Device – Mobile to PC
Simple Access – 1 Button Click to Join
Industrial Espionage & Corporate Surveillance >$100B
Impact
Sensitive Communications Capability Required
Regardless of Location or Device
Current Solutions: One-off, High Cost, Inflexible
Benefits





Single Click Ease of Use
Existing Technology – No Learning Curve
Hides in Open View
Pure Software – No Special CPE
Instantly Provisioned ‘Black Comms’
Containers
Government & Corporations Need a New Kind of ‘Private’ Communications Assurance
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
16
Case3
Key Drivers



What Verizon Delivers
Industrial Espionage & Corporate Surveillance >$100B
Impact
Massive Volumes of Consumer Data - Need to Protect
Big Data and Related Information Stores
“Insider Threat” Counter-Measures being sought in
Government and Commercial Enterprises
Insider Attack Shield
Hidden Assets within Hidden Networks
Secure Big Data Apps in Public Cloud
Hidden Data Input
Hidden Analysis
Input
Benefits




Invisible Network Access
Invisible Servers Within SDP
Data Temp Decrypted in RAM Space Only
Reduces Brand Damage Risk Potential
Government & Corporations Need a New Kind of ‘Private’ Communications Assurance
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
17
Case4
Key Drivers



Industrial Espionage & Corporate Surveillance <$100B
Impact
Sensitive Communications Capability Required
Regardless of Location or Device
Current Solutions are Purpose Built, High Cost and
Inflexible
‘Hidden’ Benefits






Single Click Ease of Use
Existing Technology – No Learning Curve
Hides in Open View
Pure Software – No Special CPE
Instantly Provisioned ‘Black Comms’
Containers
Government & Corporations Need a New Kind of ‘Private’ Communications Assurance
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
18
Download