From Enterprise Perimeter to Distributed, Virtual Enterprise - - PowerPoint PPT Presentation

from enterprise perimeter to distributed virtual
SMART_READER_LITE
LIVE PREVIEW

From Enterprise Perimeter to Distributed, Virtual Enterprise - - PowerPoint PPT Presentation

From Enterprise Perimeter to Distributed, Virtual Enterprise Security Ed Amoroso SVP, CSO AT&T eamoroso@att.com Page 1 Sandbags Piled in Front of AT&T Building 12/15/41 Page 2 Original Perimeter Objective (Circa 1995)


slide-1
SLIDE 1

From Enterprise Perimeter to Distributed, Virtual Enterprise Security

Ed Amoroso SVP, CSO – AT&T eamoroso@att.com

Page 1

slide-2
SLIDE 2

Sandbags Piled in Front of AT&T Building – 12/15/41

Page 2

slide-3
SLIDE 3

Enterprise Perimeter Untrusted External Actor “Inside the Firewall” “Outside the Firewall”

Original Perimeter Objective (Circa 1995)

Page 3

slide-4
SLIDE 4

Web (External) Untrusted External Actor

Enabling Browser Access to Enterprise Website

Page 4

slide-5
SLIDE 5

Web (External) Untrusted External Actor

Page 5

Rule Added to Firewall to Allow Inbound Access to TCP/Port 80 (http) Packets from Browsers “Anywhere” Enter the Perimeter “Off the Shelf” Web Software and Tools with Potentially Exploitable Vulnerabilities

slide-6
SLIDE 6

FW SIEM Proxy A/V IPS DLP UTM Firewall Router Enterprise Access to Web Server Admin Access to Web Server RBAC 2FA Log “Allowed” A/S PKI Scan

Perimeter Design

Page 6

Web (External)

slide-7
SLIDE 7

Page 7

Web (External)

slide-8
SLIDE 8

VPN

Enabling External VPN Access to Enterprise

Page 8

Web (External) Designed for VPN/RA Client

slide-9
SLIDE 9

FW SIEM Proxy A/V IPS DLP UTM Firewall Router Enterprise Access to Web Server Admin Access to Web Server RBAC 2FA Log “Allowed” A/S PKI Scan SIEM Proxy A/V IPS DLP UTM A/S PKI Scan FW Admin Access to VPN Server RBAC 2FA Log Firewall Router Enterprise Access to VPN Server “Allowed” Integrate into Common Physical Perimeter

Page 9

Perimeter Design

Web (External) VPN

slide-10
SLIDE 10

Page 10

Web (External) VPN

slide-11
SLIDE 11

Third Party Gateway

Adding Third Party Gateway Access to Enterprise

Page 11

Web (External) VPN Designed for Third Party Care, Contact, Support, etc.

slide-12
SLIDE 12

FW SIEM Proxy A/V IPS DLP UTM Admin Access to Third Party Gateways A/S PKI Scan SIEM Proxy A/V IPS DLP UTM A/S PKI Scan FW 2FA Log RBAC SIEM Proxy A/V IPS DLP UTM A/S PKI Scan FW Typically Source IP-Based Authentication Enterprise Access to Third Party Gateways “Allowed”

Page 12

Web (External) VPN Third Party Gateway Integrate into Common Physical Perimeter Integrate into Common Physical Perimeter

Perimeter Design

slide-13
SLIDE 13

Enterprise Assets

Page 13

Web (External) VPN Third Party Gateway

slide-14
SLIDE 14

Enterprise Assets Email

Page 14

Web (External) VPN Third Party Gateway

Adding Inbound Email to Enterprise

slide-15
SLIDE 15

FW SIEM Proxy A/V IPS DLP UTM A/S PKI Scan SIEM Proxy A/V IPS DLP UTM A/S PKI Scan FW Integrate into Common Physical Perimeter SIEM Proxy A/V IPS DLP UTM A/S PKI Scan FW Enterprise Access to Mail “Allowed” FW SIEM Proxy A/V IPS DLP UTM A/S PKI Scan Integrate into Common Physical Perimeter Allow Exchange with any Sender or Receiver

Page 15

Email Integrate into Common Physical Perimeter Web (External) VPN Third Party Gateway

Perimeter Design

slide-16
SLIDE 16

Enterprise Assets

Page 16

Web (External) VPN Third Party Gateway Email

slide-17
SLIDE 17

Enterprise Assets Additional Firewall Rule Exceptions Additional Firewall Rule Exceptions

Page 17

Web (External) VPN Third Party Gateway Email

“Hundreds” to “Millions” of Rules (1995 – 2015)

slide-18
SLIDE 18

Enterprise Assets

Page 18

Web (External) VPN Third Party Email

Expanded Third Party Gateways

Additional Firewall Rule Exceptions Additional Firewall Rule Exceptions Additional Third Parties, Retail Dealers, Outsourcing, Offshoring

slide-19
SLIDE 19

Enterprise Assets Additional Remote Access, Employee Telework, Road Warriors

Page 19

Web (External) VPN Third Party Email

Expanded Employee Remote Access

Additional Firewall Rule Exceptions Additional Firewall Rule Exceptions Additional Third Parties, Retail Dealers, Outsourcing, Offshoring

slide-20
SLIDE 20

Enterprise Assets Unauthorized Network Connections (Internet Exposing) Network Misconfigurations (Internet Exposing)

Page 20

Web (External) VPN Third Party Email

Network Vulnerabilities

Additional Firewall Rule Exceptions Additional Firewall Rule Exceptions Additional Remote Access, Employee Telework, Road Warriors Additional Third Parties, Retail Dealers, Outsourcing, Offshoring

slide-21
SLIDE 21

Enterprise Assets Enterprise Use of Mobility

Page 21

Web (External) VPN Third Party Email

Employee Use of Mobile

Additional Firewall Rule Exceptions Additional Firewall Rule Exceptions Additional Remote Access, Employee Telework, Road Warriors Additional Third Parties, Retail Dealers, Outsourcing, Offshoring Unauthorized Network Connections (Internet Exposing) Network Misconfigurations (Internet Exposing)

slide-22
SLIDE 22

Enterprise Assets

Page 22

Web (External) VPN Third Party Email

Typical State of the Practice Enterprise Design

Additional Firewall Rule Exceptions Additional Firewall Rule Exceptions Unauthorized Network Connections (Internet Exposing) Network Misconfigurations (Internet Exposing) Enterprise Use of Mobility Additional Remote Access, Employee Telework, Road Warriors Additional Third Parties, Retail Dealers, Outsourcing, Offshoring

slide-23
SLIDE 23

Enterprise Perimeter Outside

Page 23

Enterprise Perimeter Reality (Circa 2015)

slide-24
SLIDE 24

North/South Exploit (Perimeter) East/West Exploit (Enterprise) Successfully attack this . . . and gain access to this . . . Phishing Attack Data Exfiltration

Page 24

Nation State Exfiltration Attacks

slide-25
SLIDE 25

North/South Exploit (Perimeter) East/West Exploit (Enterprise)

Page 25

Nation State Exfiltration Attacks

Inbound Filtering Outbound Filtering Many Solutions Exist to Reduce Risk Inbound Many Solutions Exist to Reduce Risk Outbound No Good Solutions Exist to Reduce Traversal Risk

slide-26
SLIDE 26

Page 26

Baseline Perimeter

slide-27
SLIDE 27

Page 27

Web

Enabling Browser Access to Web Server

slide-28
SLIDE 28

Virtual Micro Perimeter

Page 28

Web

Micro-Perimeter Design (Web Server)

slide-29
SLIDE 29

Step 1: Provision Web Server into Integrated Cloud FW SIEM Proxy A/V IPS DLP UTM A/S PKI Scan Step 2: Provision Virtual Micro-Perimeter into Run Time System

Page 29

Web

Micro-Perimeter Provisioning to Cloud

slide-30
SLIDE 30

Tenant Security Orchestration . . . Hypervisor FW Proxy A/S FW Web Cloud Virtual Appliances

Page 30

East-West Protection for Web

Virtual Perimeter

Sampling of Vendors with Virtual Appliances

slide-31
SLIDE 31

Virtual Micro Perimeter

Page 31

Web

slide-32
SLIDE 32

Security C&C Virtual Micro Perimeter Virtual Micro Perimeter

Page 32

Web

Adding Security Command & Control – Virtual

slide-33
SLIDE 33

Step 1: Provision Security Cmd/Ctrl into Virtual Data Center Step 2: Provision Virtual Micro-Perimeter into Run Time System FW SIEM Proxy A/V IPS DLP UTM A/S PKI Scan FW SIEM Proxy A/V IPS DLP UTM A/S PKI Scan Integrate into Common Virtual Perimeter Security C&C

Page 33

Web

Micro-Perimeter Provisioning to Cloud

slide-34
SLIDE 34

Tenant Security Orchestration . . . Hypervisor Web Server Tenant Security Alerting Security Reporting Risk Compliance Virtual Appliances Security APIs SIEM Tenant Security Orchestration . . . Hypervisor C&C Virtual Appliances FW Proxy A/S FW FW Proxy A/S FW Security APIs

Page 34

East-West Protection for Web and C&C

Cloud

slide-35
SLIDE 35

Enterprise Assets Virtual Micro Perimeter Virtual Micro Perimeter SOC

Page 35

Web

slide-36
SLIDE 36

Enterprise Assets Gateway Virtual Micro Perimeter Virtual Micro Perimeter Virtual Micro Perimeter SOC

Page 36

Web

Adding Gateway – Virtual

slide-37
SLIDE 37

Tenant Security Orchestration . . . Hypervisor Web Server Tenant Security Alerting Security Reporting Risk Compliance Cloud Virtual Appliances Security APIs SIEM Tenant Security Orchestration . . . Hypervisor SOC Virtual Appliances FW Proxy A/S FW FW Proxy A/S FW Security APIs Tenant Security Orchestration . . . Hypervisor Gate way Virtual Appliances FW Proxy A/S FW

Page 37

East-West Protection for Web, C&C, and Gateway

slide-38
SLIDE 38

Enterprise Assets Gateway Virtual Micro Perimeter Virtual Micro Perimeter Virtual Micro Perimeter SOC

Page 38

Web

slide-39
SLIDE 39

North/South Exploit (Perimeter) East/West Exploit (Enterprise) Successfully attack this . . . and gain NO access to this . . .

Page 39

East-West Traversal Mitigated by Virtual Perimeter

slide-40
SLIDE 40

Enterprise Assets Gateway Legacy Assets Virtual Micro Perimeter Virtual Micro Perimeter Virtual Micro Perimeter SOC

Page 40

Web

Legacy Assets Dependent on Existing Perimeter

slide-41
SLIDE 41

Gateway Legacy Enterprise Perimeter (Legacy Assets) SOC

Page 41

Web

Legacy Assets Dependent on Existing Perimeter

slide-42
SLIDE 42

Gateway Legacy Enterprise Perimeter Has Less to Defend SOC

Page 42

Web

slide-43
SLIDE 43

Gateway Legacy SOC

Page 43

Web

slide-44
SLIDE 44

Gateway Legacy Web Back-End SOC

Page 44

Web

slide-45
SLIDE 45

Gateway Legacy Web Back-End SOC (Primary) SOC (Backup)

Page 45

Web

slide-46
SLIDE 46

Gateway Legacy Web Back-End SOC (Primary) SOC (Backup)

Page 46

Web

slide-47
SLIDE 47

Gateway Legacy Web Back-End SOC (Primary) SOC (Backup)

Page 47

Web

slide-48
SLIDE 48

Gateway Legacy Web Back-End SOC (Primary) SOC (Backup)

Page 48

Web

slide-49
SLIDE 49

Gateway Legacy Web Back-End SOC (Primary) SOC (Backup)

Page 49

Web

slide-50
SLIDE 50

Gateway Legacy Web Back-End SOC (Primary) SOC (Backup)

Page 50

Web

slide-51
SLIDE 51

Ring (Gateway) Ring (Legacy) Ring (Back-End) Ring (Web Server) SOC (Primary) SOC (Backup)

Page 51

slide-52
SLIDE 52

SOC (Primary) SOC (Backup)

Page 52

slide-53
SLIDE 53

Page 53

slide-54
SLIDE 54

Page 54

slide-55
SLIDE 55

Page 55

slide-56
SLIDE 56

Page 56

slide-57
SLIDE 57

Security Command and Control (C&C) Micro-Domain Rings Micro-Domain Rings

Page 57

slide-58
SLIDE 58

Security Command and Control (C&C) Micro-Domain Rings Robust, Secure Communication with Multiple C&C Micro-Domain Rings Security Software Drop Locations

Page 58

slide-59
SLIDE 59

Botnet Command and Control (C&C) Bots Robust, Secure Communication with Multiple C&C Botnet Software Drop Locations Bots

Page 59

slide-60
SLIDE 60

ZeroAccess Botnet (Click Fraud) Massive Industry Botnet Takedown Effort Resilient!!

Page 60

Resilience of Botnets

slide-61
SLIDE 61

Security Command and Control (C&C) Micro-Domain Rings Robust, Secure Communication with Multiple C&C Security Software Drop Locations Micro-Domain Rings

Page 61

Distributed, Virtual Enterprise Perimeter Design