“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14 Agenda • Today’s threat landscape is next generation • Definition of Next Generation Security • What really makes it different • 20 things your next generation security must do • Closing & Questions ISACA June Training Seminar Today’s Threat Landscape Organized Attackers Remediation is broken Must prevent attacks across perimeter, cloud and mobile Limited correlation across disjointed security technologies. Limited security expertise Increasing Volume Sophisticated CSO challenges ISACA June Training Seminar SaaS - Apps are moving off the network ISACA June Training Seminar CLOUD + VIRTUALIZATION Servers are moving to private and public clouds Verizon Cloud ISACA June Training Seminar BETA ENCRYPTION Traffic is increasingly being encrypted Over 27% of applications can use SSL encryption Which represents nearly 25% of enterprise bandwidth ISACA June Training Seminar MOBILITY Users are moving off the network Over 300 new malicious Android APKs discovered per week by our Threat Research Team ISACA June Training Seminar COMMODIZATION OF THREATS Advanced tools available to all Sophisticated & multi-threaded Changing application environment SSL encryption Zero-day exploits/Vulnerabilities Lateral movement Clear-text Evasive command-and-control Limited or known protocols Known malware & exploits Known threats Known vulnerabilities Known command-and-control BEFORE TODAY’S APT ISACA June Training Seminar Enterprise risk Unknown & polymorphic malware Tectonic Shifts Create the Perfect Storm SaaS ENCRYPTION SOCIAL + CONSUMERIZATION CLOUD + VIRTUALIZATION MOBILITY + BYOD Massive opportunity for cyber attackers COMMODIZATION OF THREATS ISACA June Training Seminar Target data breach – APTs in action Recon on companies Target works with Spear phishing third-party HVAC contractor Breached Target with stolen payment credentials Moved laterally & installed POS Malware Maintain access ISACA June Training Seminar Compromised internal server to collect customer data Exfiltrated data C&C servers over FTP Agenda • Today’s threat landscape is next generation • Definition of Next Generation Security • What really makes it different • 20 things your next generation security must do • Closing & Questions ISACA June Training Seminar Definition of a Next Generation Firewall (NGFW) From the Gartner IT Glossary, a NGFW is a: • Deep-packet inspection firewall, • Moves beyond port/protocol inspection and blocking, • Adds application-level inspection, • Adds intrusion prevention, and • Brings intelligence from outside the firewall. ISACA June Training Seminar Definition of a Next Generation Firewall (NGFW) Should not be confused with: • A stand-alone network intrusion prevention system (IPS), which includes a commodity or nonenterprise firewall, or • A firewall and IPS in the same appliance that are not closely integrated. ISACA June Training Seminar Agenda • Today’s threat landscape is next generation • Definition of Next Generation Security • What really makes it different • 20 things your next generation security must do • Closing & Questions ISACA June Training Seminar 20 Years of Security Technology Sprawl • Ports and IP addresses aren’t reliable anymore • More stuff has become the problem • Too many policies, limited integration • Lacks context across individual products UTM Internet IPS AV URL Proxy Sandbox DLP Enterprise Network ISACA June Training Seminar Sample of a True Next Generation Architecture • Single Pass • Identifies applications • User/group mapping • Threats, viruses, URLs, confidential data • One policy to manage • Correlates all security information to Apps and Users ISACA June Training Seminar Next Generation vs. Legacy Firewalls App-ID Legacy Firewalls Firewall Rule: ALLOW SMTP SMTP ✔ SMTP Firewall Rule: ALLOW Port 25 SMTP Firewall Bittorrent ✔ SMTP Firewall ✗ Bittorrent SMTP=SMTP: Allow Bittorrent≠SMTP: Deny ✔ Bittorrent Packet on Port 25: Allow Visibility: Bittorrent detected and blocked Packet on Port 25: Allow Visibility: Port 25 allowed ISACA June Training Seminar Next Generation vs. Legacy Firewall + App IPS App-ID Legacy Firewalls Firewall Rule: ALLOW SMTP SMTP ✔ SMTP Firewall Rule: ALLOW Port 25 Application IPS Rule: Block Bittorrent SMTP Firewall Bittorrent ✔ Bittorrent SMTP=SMTP: Allow ✔ SMTP App IPS Firewall ✗ ✔ SMTP Bittorrent ✗ Packet on Port 25: Allow Bittorrent ≠ SMTP: Deny Bittorrent: Deny Visibility: Bittorrent detected and blocked Visibility: Bittorrent detected and blocked ISACA June Training Seminar Next Generation vs. Legacy Firewall + App IPS App-ID Legacy Firewalls Firewall Rule: ALLOW SMTP Firewall Rule: ALLOW Port 25 Application IPS Rule: Block Bittorrent Firewall SMTP Bittorrent SSH, Skype, Ultrasurf ✔ ✗ ✗ ✔ ✔ ✔ App IPS Firewall SMTP SMTP Bittorrent SSH, Skype, Ultrasurf SMTP=SMTP: Allow Skype≠SMTP: Deny SSH≠SMTP: Deny Ultrasurf≠SMTP: Deny Visibility: each app detected and blocked SMTP Bittorrent SSH, Skype, Ultrasurf ✔ ✗ ✔ Packet on Port 25: Allow Packet ≠ Bittorrent: Allow Visibility: Packets on Port 25 allowed ISACA June Training Seminar SMTP SSH, Skype, Ultrasurf Next Generation vs. Legacy Firewall + App IPS App-ID Legacy Firewalls Firewall Rule: ALLOW SMTP Firewall Rule: ALLOW Port 25 Application IPS Rule: Block Bittorrent Firewall SMTP Bittorrent C&C ✔ ✗ ✗ ✔ ✔ ✔ App IPS Firewall SMTP SMTP Bittorrent C&C SMTP=SMTP: Allow Bittorrent C&C ✔ ✗ ✔ Packet on Port 25: Allow Command & Control ≠ SMTP: Deny Visibility: Unknown traffic detected and blocked SMTP C & C ≠ Bittorrent: Allow Visibility: Packet on Port 25 allowed ISACA June Training Seminar SMTP C&C Next Generation Closes the Loop for Threats • Scan ALL applications, including SSL – Reduces attack surface, and Provides context for forensics • Prevent attacks across ALL attack vectors – Exploits, Malwares, DNS, Command & Control, and URLs • Detect zero day malware – Turn unknown into known, and update the firewall ISACA June Training Seminar Sandboxing for Turning Unknown into Known ISACA June Training Seminar Security Context from Next Generation Policies: • Allowing 10.1.2.4 to 148.62.45.6 on port 80 does not provide context. Allowing Sales Users on Corporate LAN to access Salesforce.com but look for threats and malware inside the decrypted SSL tunnel, and easily seeing you have done so is context. Threats: • Seeing you had 10 tunneling apps, 15 IPS hits, and 4 visits to malware sites no context. Seeing Dave Smith visited a malware site, downloaded 0-day Malware, and his device is visiting other known malware sites, and using tunneling apps that is context. ISACA June Training Seminar Next Generation and the Attack Kill-chain Attack kill-chain BREACH PERIMETER DELIVER MALWARE ENDPOINT OPERATIONS EXFILTRATE DATA Initial compromise Deliver malware and communicate with attacker Move laterally and infect additional hosts Steal intellectual property Prevent attacks by stopping one step in the kill-chain ISACA June Training Seminar Agenda • Today’s threat landscape is next generation • Definition of Next Generation Security • What really makes it different • 20 things your next generation security must do • Closing & Questions ISACA June Training Seminar 20 Things Your Next Gen Security Must Do 1. Control applications and components regardless of Port or IP 2. Identify users regardless of IP address 3. Protect real-time against threats and exploits 4. Identify Circumventors (Tor, Ultrasurf, proxy, anonymizers) 5. Decrypt SSL Traffic 6. Packet shape traffic to Prioritize Critical Applications or De- Prioritize Unproductive applications 7. Visualize Application Traffic 8. Block Zero Day Malware, Botnets, C&C and APT’s 9. Block Peer-to-Peer 10. Manage Bandwidth for a group of Users ISACA June Training Seminar 20 Things Your Next Gen Security Must Do 11. Prevent or Monitor Data Leakage 12. Single Pass Inspection 13. Same security at mobile end-point 14. Central management console with relay logs & events 15. Policy for unknown traffic 16. Be cost effective by combining multiple functionalities 17. Deliver protection today, tomorrow, and in the future by being firmware upgradeable 18. Interface with other end-point solutions to have a consistent protection 19. Sinkhole DNS capabilities 20. Block base on URL ISACA June Training Seminar Agenda • Today’s threat landscape is next generation • Definition of Next Generation Security • What really makes it different • 20 things your next generation security must do • Closing & Questions ISACA June Training Seminar