White Paper 6-04 How AirDefense Ensures Compliance with the DoD Wireless Directive The purpose of this whitepaper is to summarize the wireless policies defined by DoD Directive 8100.2, dated April 14, 2004, and to explain how a 24 x 7 monitoring solution ensures that DoD organizations can comply with the directive. 1. Purpose of the DoD Wireless Directive The Department of Defense (DoD) Directive Number 8100.2 was issued on April 14, 2004. The Directive covers the use of commercial wireless devices, services, and technologies in the DoD Global Information Grid (GIG). The Directive spells out policies for deploying secure wireless networks, and requires monitoring of those wireless networks for compliance. Additionally, the Directive states that wireless networks are banned from use in certain areas, and it covers policies for banned and authorized wireless networks. The Directive is effective immediately. 2. Scope of the Directive The Directive applies to all DoD personnel, contractors, and visitors that enter DoD facilities or that have access to DoD information. The DoD Wireless Directive applies to all DoD organizations, including the Office of the Secretary of Defense, the Military Departments, the Chairman of the Joint Chiefs of Staff, the Combatant Command, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other DoD organizations. The Directive refers to these agencies collectively as the DoD Components. The Directive applies to all commercial wireless devices, services, and technologies, including voice and data capabilities. This includes, but is not limited to, commercial wireless networks and Portable Electronic Devices (PEDs) such as laptop computers with wireless capability, cellular/Personal Communications System (PCS) devices, audio/video recording devices, scanning devices, remote sensors, messaging devices, Personal Digital Assistants (PDAs), and any other commercial wireless devices capable of storing, processing, or transmitting information. 3. Responsibilities The Assistant Secretary of Defense for Networks and Information Integration, as the DoD Chief Information Officer, shall monitor and provide oversight and policy development of all DoD wireless activities. Directive: Include intrusion detection methodologies for wireless systems. The DoD Wireless Directive requires heads of the DoD Components to submit to the DoD CIO, within 180 days of this Directive, specific implementation timelines for compliance, and ensure that all new commercial wireless procurements comply with this Directive immediately. The Directive asks DAAs (Designated Approving Authorities) to: ¾ Ensure that wireless networks do not introduce wireless vulnerabilities that undermine the assurance of interconnected systems ¾ Include intrusion detection methodologies for the wireless systems. 4. Need for the DoD Wireless Directive - Risks of Wireless Networks Along with the many conveniences and cost saving advantages to wireless LANs, there are also many inherent risks and vulnerabilities. These exist in the nature of the wireless medium, and in insecure wireless LAN devices and configurations. “Wireless LANs are a breeding ground for new attacks because the technology is young and organic growth creates the potential for a huge payoff for hackers.” Pete Lindstrom, Spire Security Wireless Medium – Uncontrolled & Shared Traditional wired networks use cables to transfer information, which are protected by the buildings that enclose them. To gain access to a wired network, a hacker must bypass the physical security of the building or breach the firewall. On the other hand, wireless networks use the air, an uncontrolled medium. Wireless LAN signals can travel through the walls, ceilings, and windows of the building. This renders the entire network accessible from another floor of the building, from an adjoining building, from the parking lot, or from across the street. Radio signals from a single access point can travel up to thousands of feet outside of the building walls. Wireless networks use a shared medium, i.e., any wireless device in the network can “see” all the traffic of all other wireless devices in the network. The risks of using a shared medium is increasing with the advent of readily available “hacker’s tools.” A variety of specialized tools and tool kits enable hackers to “sniff” data and applications, and to break both encryption and authentication. Insecure Wireless LAN Devices “Through year-end 2004, the employee’s ability to install unmanaged access points will result in more than 50% of enterprises exposing sensitive information through wireless networks.” Gartner Insecure wireless LAN devices, such as access points and user stations, can seriously compromise both the wireless network and the wired network, making them popular targets for hackers. Insecure Access points can be insecure due to improper user configuration, or insufficient default configurations, which do not have strong encryption or authentication. They become gateways that hackers use to access both the wireless and the wired network. Insecure wireless user stations pose even a bigger risk than insecure access points. These devices, which often have either no security configuration or are using an insufficient default configuration, easily come and go in the enterprise. Hackers can convert laptops into “soft” access points (soft APs) by either using a variety of software programs, such as HostAP, Hotspotter, or Airsnarf, or, by simply using a USB wireless adapter. By inserting a soft AP into a wireless network, a hacker can cause legitimate users in the network to connect to hacker’s soft AP, compromise the user laptop, and use it as a bridge to breach the network backbone. “The problems with rogue access points will wane — though accidental network associations and attacks against mobile laptops will increase. This makes it very important to understand the risks of wireless LAN laptops and other devices that are present in every organization.” Gartner Wireless LANs Allow Strangers Easy Access Accidental association takes place when a wireless laptop running the LAN-friendly Windows® XP or a mis-configured client automatically associates and connects to a user station in a neighboring network. This enables intruders to connect to innocent user’s computers often without their knowledge, www.airdefense.net 2 Copyright 2004, AirDefense, Inc compromise sensitive documents on the user station, and expose it to even further exploitation. This danger is compounded if the station is connected to a wired network, which is also now accessible. Ad hoc networks are peer-to-peer connections “Unmanaged wireless LANs can between devices with wireless LAN cards that do not jeopardize entire enterprise networks, require an access point or any form of authentication data, and operations." from other user stations. While these ad-hoc networks Forrester can be convenient for transferring files between stations or to connect to network printers, since they lack security, they enable hackers to easily compromise an innocent user’s station or laptop. 5. Summary of Policy Requirements The DoD Wireless Directive covers several areas of policy requirements. These are listed under sections 4.1 through 4.10. Table 1 summarizes key policies under the directive. Section Policy Area 4.1.1, 4.1.2 & 4.1.3 Need for strong encryption (FIPS 140-2 compliant) and authentication policies. 4.1.4 Mitigation of Denial of Service and other disruptions or attacks. 4.2 & 4.3 Banning wireless devices in designated areas. 4.4 Removing Wireless Personal Area networks (WPAN) / Bluetooth Devices from designated areas. 4.5 Active monitoring of unauthorized access of DoD IS (monitoring for unauthorized wireless devices). 4.6, 4.7, 4.8 Mobile code, PED (concurrent) connectivity, and Anti-virus guidelines. 4.10 Establishing a knowledge management process. Table 1. Summary of DoD Policy Directives 6. Role and Overview of the AirDefense Solution The goal of the DoD Wireless Directive is to protect its computers and network from vulnerabilities caused by wireless devices and networks. This is achieved via policies. Every network has to have a well defined and documented policy. Without proper monitoring and enforcement, policies are no more than a paperweight. The DoD Directive defines wireless policies. AirDefense can help DoD organizations monitor and enforce this policy directive. Define Policy DoD directive has defined policy very well Monitor Policy Use monitoring tools to ensure compliance Enforce Policy Enforce policy by using proper technologies www.airdefense.net 3 Copyright 2004, AirDefense, Inc With a distributed and cooperative processing “RF Monitoring has emerged as a architecture of remote smart sensors that work in legitimate and often times required tandem with a server appliance, AirDefense passively component of the enterprise WLAN.” monitors all wireless LAN activity in real time for the MetaGroup highest level of security, policy enforcement, and operational support. The architecture provides the secure foundation for AirDefense to offer a scalable and manageable solution for wireless LANs in a single office, a campus, or hundreds of locations around the globe. AirDefense provides for 24x7, real-time monitoring of all 802.11 protocols for any vendor and any device. While AirDefense proactively notifies IT personnel of alarms for security threats, policy violations, and performance issues, the system also allows for network administrators to access a single interface for a complete view of the wireless LAN and management-critical intelligence. The system also allows IT managers to take proactive actions to enforce policies. Figure 1. AirDefense Solution uses cooperative architecture that provides scalability and reliability with centralized management. 7. How AirDefense Ensures Compliance with the Directive The goal of the DoD wireless Directive is to protect its computers and network from vulnerabilities caused by wireless devices and networks. Wireless network policies form the base of all wireless LAN deployments. AirDefense allows organizations to manage customized wireless LAN policies based on the desired security and acceptable uses for each wireless LAN device. AirDefense allows enterprises to customize policies for each device as part of its centralized policy manager, which defines, monitors, and enforces the device-centric policies. This section summarizes how AirDefense enables compliance with most of the DoD Wireless Policy Directives. www.airdefense.net 4 Copyright 2004, AirDefense, Inc 4.1.1 Monitoring for Strong Authentication Per Section 4.1.1, strong authentication, non-repudiation, and personal identification is required for access to a DoD IS in accordance with published DoD policy and procedures. Identification and Authentication (I&A) measures shall be implemented at both the device and network level. I&A of unclassified voice is desirable; voice packets across an Internet protocol [e.g., Voice over Internet Protocol (VoIP)] shall implement I&A in accordance with published DoD policy and procedures. AirDefense allows organizations to set authentication and personal identification policy and monitor for its compliance. If any wireless LAN device is found noncompliant, AirDefense generates a notification. AirDefense has specific detection for VPN or 3-factor authentication solutions, such as AirFortress. AirDefense has detected situations in which customers configured strong authentication along with “open” authentication (no authentication), a mistake that totally negates the value of strong authentication, leaving the network vulnerable. Only automated real-time monitoring ensures that proper authentication is always in place. 4.1.2 Monitoring for Strong Encryption Per Section 4.1.2, encryption of unclassified data for transmission to and from wireless devices is required. At a minimum, data encryption must be implemented end-to-end over an assured channel and shall be validated under the Cryptographic Module Validation Program as meeting requirements per Federal Information Processing Standards (FIPS) 140-2. Screenshot of AirDefense DoD Policy Reports that were created specifically to ensure compliance with DoD Directive 8100.2. AirDefense allows organizations to set encryption policies and monitor for its compliance. If any of the wireless LAN devices is found non-compliant, AirDefense generates a notification. AirDefense has specific detection for FIPS 140-2 compliant solutions such as AirFortress. 4.1.4 Mitigation of Denial of Service and other Disruptions or Attacks Per section 4.1.4, measures shall be taken to mitigate denial of service attacks. These measures shall address not only external threats, but potential interference from friendly sources. AirDefense identifies network reconnaissance activity, suspicious wireless LAN activity, impending threats, and attacks against the wireless LAN. Attacks against Wireless LANs: AirDefense uses four intrusion detection technologies with correlation across sensors to identify attacks. With correlation among its four key detection technologies, AirDefense dramatically reduces false positives and gives accurate results. As the leader in wireless LAN intrusion detection, AirDefense alerts IT security personnel to a range of attacks that include: ¾ Identity MAC spoofing ¾ Out-of-Sequence communication triggered by AirDefense’s four intrusion detection session hijacking or Man-in-the-Middle technologies and correlation engines make attacks it the most effective IDS. ¾ Multiple forms of De-Authenticate and Disassociate Denial-of-Service Attacks ¾ Multiple forms of Denial-of-Service Attacks with Excessive MAC addresses ¾ Dictionary attacks from excessive failed authentication attempts www.airdefense.net 5 Copyright 2004, AirDefense, Inc Suspicious Activity & Impending Threats: AirDefense correlates information from all remote sensors over time to identify suspicious activity, such as: ¾ A user station on the watch list entering an organization’s air space at any location ¾ A suspicious station repeatedly attempting to connect with multiple access points ¾ Anomalous traffic from unusual off-hours activity or large downloads to a station Reconnaissance Activity: AirDefense recognizes multiple forms of wireless LAN scans including scans from Netstumbler, Wellenreiter, and Windows XP. Wireless Health Monitoring: By constantly monitoring all wireless activity, AirDefense provides a comprehensive solution to monitor the health of the wireless LAN and provide operational support that maximizes network performance. ¾ Performance Monitoring, to identify usage characteristics, interference from neighboring wireless LANs, and channel overlap ¾ Network Use & Abuse of traffic patterns over time, potential abuse of the network, and access point utilization ¾ Alert network administrators to unplugged, stolen, or failing access points 4.2 & 4.3 Banning Wireless Devices in Designated Areas Section 4.2 of the Directive states that wireless devices shall not be allowed into an area where classified information is discussed or processed. Section “Perform wireless intrusion detection to 4.3 states that wireless devices used for storing, discover rogue access points, foreign devices processing, and/or transmitting information connecting to corporate access points and shall not be operated in areas where classified accidental associations to nearby access points information is electronically stored, processed, in use by other companies.” Gartner or transmitted The Directive is needed because unauthorized “rogue” wireless LANs represent one of the biggest threats to an organization’s network security. Rogue wireless LANs create an open entry point (backdoor) to the enterprise network by bypassing all existing security measures. Identification of these rogue wireless LANs is paramount for all organizations. AirDefense provides full rogue detection that goes beyond simple alerts of broadcasting access points. Detection of All Rogue WLAN Devices & Activity: AirDefense recognizes all wireless LAN devices, which include access points, wireless LAN user stations, soft APs (where stations function as access points), and specialty devices (such as wireless bar code scanners for shipping or inventory applications). AirDefense also identifies rogue behavior from ad hoc, peer-to-peer networking between user stations, and accidental associations from user stations connecting to neighboring networks. Detecting a rogue access point is trivial. Figuring out what damage was done by it requires strong forensics capabilities. Analysis of Rogue Connections: AirDefense analyzes all connections made by rogue activities to understand the communication among all wireless LAN devices. By identifying the stations that connect to rogue wireless LANs, AirDefense enables IT personnel to assess which devices are at risk. Risk & Damage Assessment: AirDefense tracks all rogue communication and provides forensic information to identify when the rogue first appeared, how much data was exchanged, and the direction of traffic (downloads from the enterprise network vs. uploads). With detailed analysis, AirDefense assists IT personnel assess the risk and damage from the rogue. Packet capture can also be enabled for further analysis of the rogue devices using a network analyzer such as Ethereal or Sniffer. www.airdefense.net 6 Copyright 2004, AirDefense, Inc 4.4 Removing Wireless Personal Area networks (WPAN) / Bluetooth Devices Section 4.4 requires that DAAs shall ensure that Wireless Personal Area Network (WPAN) capability is removed or physically disabled from a device unless FIPS PUB 140-2validated cryptographic modules are implemented. Class 1 Bluetooth devices that easily form Wireless Personal Area Networks have a range of 330 feet. Bluetooth devices are rapidly growing. With Class 1 Bluetooth devices having a range of 330 feet, they can cause security issues that are similar to those of wireless LAN devices. Bluetooth networks in many enterprises connect back to a wired network at some point. Hackers can use an insecure networked Bluetooth laptop as an entry point into the entire enterprise network, gaining access to sensitive information that may not even exist on the Bluetooth network. AirDefense BlueWatch can enable individual users and enterprises to identify rogue and insecure Bluetooth devices in their air space. AirDefense BlueWatch is a Windows-based software program that scans for the presence of Bluetooth devices and their key attributes. BlueWatch can enable individual users and enterprises to identify rogue and insecure Bluetooth devices in their air space, enabling them to take proactive steps to mitigate the risk of security breaches. 4.5. Active Monitoring of Unauthorized Access of DoD IS Per Section 4.5, the DoD Components shall actively screen for wireless devices. Active electromagnetic sensing at the DoD or contractor premises to detect/prevent unauthorized access of DoD ISs shall be performed to ensure compliance. AirDefense allows enterprises to customize policies for each device as part of its centralized policy manager that defines, monitors, and enforces the device-centric policies. Wireless LAN Devices & Roaming Policies: AirDefense allows IT managers to define policies for authorized user stations, their configuration, how stations connect to the wireless LAN, and recognized threats. A network roaming policy for user stations recognizes roaming policy violations when a user station tries to connect with unapproved access points within the enterprise. 24x7 active monitoring using passive sensors and a strong centralized Channel Policies: AirDefense allows enterprises to policy manager ensures that WLANs establish channel policies for: are conforming to the security policy. ¾ Ad Hoc networks between stations, and to specify the channels for authorized ad hoc networks ¾ Authorized channels for each access point, and to identify all WLAN traffic on unsanctioned channels ¾ Off-hours traffic monitoring for certain wireless devices and locations Vendor Policies: Because wireless LANs should be deployed using enterprise-class infrastructure, AirDefense allows IT managers to define approved hardware vendors for devices using the wireless LAN. With a list of accepted vendors, AirDefense then recognizes all hardware from unapproved vendors when they enter the enterprise airspace. 4.10 Wireless Knowledge management (KM) Section 4.10 states that a DoD wireless KM process shall be established to increase sharing of DoD wireless expertise to include information on vulnerability assessments, best practices, and procedures for wireless device configurations and connections. The KM process shall be utilized by DAAs to help determine acceptable uses of wireless devices and employ appropriate mitigating actions. The DoD Components shall use the KM process to coordinate, prioritize, and avoid duplication of vulnerability assessments of wireless devices. www.airdefense.net 7 Copyright 2004, AirDefense, Inc AirDefense maintains a historical database that powers robust reporting and analysis for historic trends and forensics that enables realization of KM process. Some of the key information for Knowledge Management provided by AirDefense includes: ¾ Historical Data for Trends and Forensics reports for specific trends and forensics ¾ Automated Summary email reports (daily and weekly) for management, security, and network administrators ¾ Device-Centric Reports for missing devices, ad hoc networks, probing stations, individual access point and user station snapshot ¾ Security & Rogue Detection Reports for vulnerability assessment, rogue summaries, rogue details, and unauthorized access points ¾ Policy Reports that accumulate access point policy violations and policy summaries Summary As we discussed in this white paper, wireless network risks are real. A $40 access point or an insecure wireless-ready laptop connected to the secure network can open serious security holes or backdoors, rendering useless millions of dollars spent on securing the network backbone using firewalls and intrusion detection systems. The goal of the DoD Wireless Directive is to take proactive steps to prevent such security holes. That is best accomplished by defining a policy that protects DoD computers and networks. To benefit from this policy, DoD organizations should: ¾ Monitor for the presence of rogue user stations or access point and their activity ¾ Deploy wireless LAN technologies that comply with the policy (e.g., FIPS 140-2 compliant encryption) ¾ Monitor wireless network infrastructure for compliance with the policy 24 X 7 monitoring using distributed sensors working with a “AirDefense offers the only central server is the only practical way to monitor for enterprise-class solution for 24x7 compliance. The AirDefense solution is designed for real-time monitoring.” wireless LAN monitoring, to proactively detect threats and Kendra Warren, CIO, DeCA attacks and ensure policy compliance and enforcement. AirDefense has recently created reports that are specifically designed to assess compliance of wireless devices and networks with the DoD Directive (see the report samples on the next page). Dozens of Federal bodies, including a number of DoD organizations, are already taking advantage of AirDefense to ensure proper security and peace of mind. www.airdefense.net 8 Copyright 2004, AirDefense, Inc AirDefense DoD Compliance Report Samples Figure 2. Summary, Operational Support, and Authentication Reports Figure 3. Availability, Vulnerability, and Encryption Reports About AirDefense, Inc. Founded in 2001, AirDefense pioneered the concept of 24x7 monitoring of the airwaves and provides the most advanced solutions for rogue wireless LAN detection, policy enforcement, intrusion protection and monitoring the health of wireless networks. Blue chip companies and government agencies rely upon AirDefense solutions to secure and manage wireless networks around the globe. For more information or feedback on this white paper, please contact Email: info@airdefense.net; Phone: 770.663.8115 All trademarks are the property of their respective owners. www.airdefense.net 9 Copyright 2004, AirDefense, Inc