2005 © switch the role of security in nrens christoph graf switch

20
2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH <[email protected]>

Upload: christian-stanley

Post on 11-Jan-2016

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH

The Role of Security in NRENs

Christoph GrafSWITCH

<[email protected]>

Page 2: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 2

The Origins: Insider and Outsider

Online Offline

“bad” user

“good” user“wannabees”

Internet

Page 3: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 3

Les amis de mes amis… (1)

Online Offline

“bad” user

“good” user“wannabees”

Page 4: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 4

JEKAMI (Jeder kann mitmachen = everybody can particpate)

“bad” user

“good” user

Page 5: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 5

Walls and Fortresses

Organisation A

Organisation B

Organisation C

“bad” user

“good” user

Guardian/firewall

Page 6: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 6

Les amis de mes amis… (2)

Organisation A

Organisation B

Organisation C

“bad” user

“good” user

Guardian/firewall

Page 7: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 7

Mobility and Roaming

Organisation A

Organisation B

Organisation C

Welcome toThe Present Times!

“bad” user

“good” user

Guardian/firewall

Page 8: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 8

Agenda

In 80 seconds through the ages of the INTERNET

The NREN environment

The security landscape

The security activities in GÉANT

The “netflow divide”

A sample portfolio of NREN security activities

Outlook/Trends

Page 9: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 9

The NREN Environment

NRENs (National Research and Education Networks)– Come in many flavours

– I’m wearing my NREN (SWITCH) hat... It might show

Characterising NRENS...– Designing, implementing and running services

... which are not (yet) commercially available

... including network services and security services (CSIRT)

– High level of technical expertise

– Well networked with the academic world (their customers)

– Not doing research, but collaborating with research and learning from it

– Well networked among each other (TERENA, DANTE, GÉANTx)

– Open to collaboration and information sharing, if perceived beneficial

Page 10: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 10

TI(TERENA)

Security Landscape

site security team site security teamsite security team

SWITCH-CERT

FIRST

NREN/ISP/Gov CERTs

undisclosedgroups

Industryrepresentation

Campus Security Teams

TF-CSIRT(TERENA)

CSIRTs

Focused groups

Vendor CERTs

GÉANT Security

personalinformalconcrete

direct

role-basedformal

abstractindirect

Customer relationship

Incident co-ordination

Networking, projects, knowledge

Lobbying, BCP, trust enabling, knowledge

swirt.ch(Swiss ISPs)

Admins,endusers

Page 11: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 12

Security Activities in GÉANT2

WI1: Securing GN2 network elements and services– Policy work

WI2: Building of security services– Building the “toolset”, which makes life easier for CSIRTS

WI3: Infrastructure for co-ordinated security incident handling– Set-up of an information exchange infrastructure between CSIRTs

– Reliable, secure and efficient for operational work on daily basis

WI4: Relationship with TF-CSIRT– TF-CSIRT is THE European CSIRT networking platform

– Member subsets form project groups and gather around TF-CSIRT meetings

– The GÉANT security activities do it alike (membership is a subset)

WI5: Establishment of an advisory panel– Commenting the work, observe the trends, give recommendations

Page 12: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 13

Some observations

Most teams are operationally oriented– Clear idea of existing problems and know what they want: the “toolset”

– Operationally relevant results count more than “pure” research results

The “toolset” is heavily linked to NREN networks– Anomaly detection, network forensics and other network related tasks is

where teams feel they need support

The “netflow divide”– The toolset requires network data (currently: netflow)

– Not all teams get access to netflow data

Page 13: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 14

Overcoming the “netflow divide”

Message to outsiders: try to get on board!

It’s a synergy opportunity of hosting a security team and operating a network within the same NREN!

The “toolset” helps to extract highly relevant data from the network– Hacked customer systems, anomalies, (unnoticed) attacks

– ... Often before creating operational problems

Security teams become more proactive– “the toolset” provides stuff to share

– It fosters trust within your constituency

In short: It adds value to NRENs, their customers and the rest of the world

Page 14: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 15

Business Unit Security @SWITCH

• CSIRT– Proactive CSIRT tasks (information services, community building)

– Reactive CSIRT tasks (security helpdesk, incident handling and co-ordination)

• Critical Information Infrastructure Protection (CIIP)– Threat/risk analysis

– Crisis management support

• Security Services– Anomaly detection, malware signature sensing

– Internet threat related consulting

• Laboratory– Malware analysis lab

– Network sensor development

– Security research collaboration

Incident Handling

Beratung

Labor

Interne DLHW/OS, Beratung,

E-Mail

Security

CSIRT

Security Services

Laboratory

CIIP

Page 15: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 16

Trends to Consider in Future Phases

CIIP (Critical Information Infrastructure Protection)– The criticality of the “network” is increasing

– New expectations, potentially new service needs (7x24)

Law enforcement, legal issues– Laws increasingly enforced in the “virtual” world

– New regulatory requirements looming? Mandating the “toolset”???

– Education needs, new vocabulary, new service needs

Convergence voice/data/gadgets– Old and new threats hitting an unaware community (DoS, SPIT)

– Protecting new services: education, new tools

“Grid Impact”– Lightpath/BoD: NREN/GN2 overlay networks without “toolset” protection

– High-risk parallel world, with high-bandwidth interconnects on IP layer

Page 16: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 17

Security Activities of GÉANT2: Outlook

Still driven by operational needs of GÉANT partner security teams– ... the needs of network-minded GÉANT partner security teams

Not focused on “pure” research– we are too eager for operationally relevant results

– but nevertheless moving in uncharted territory

Pushing to reach full GÉANT-coverage for some issues (BCP)– Hosting of a security team

– Equipped with a minimum set of capabilities

– Embedded in a co-ordination infrastructure

– Following agreed operational standards

Focused on the description of work– Other interesting things popping up? TF-CSIRT takes care of that

Page 17: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 18

Mobility and Roaming

Organisation A

Organisation B

Organisation C

The Present Times

Part two

“bad” user

“good” user

Guardian/firewall

Page 18: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 19

Guess, What’s This?

Page 19: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 20

It’s a Bot!

“(...) not only is it an oscilloscope, but in the background it also runs windows 2000 (without updates of course and naturally with bots as extra add-ins!). No updates, no AntiVirus, No firewall.

“It was difficult to find because it wasn't always on the net and even when we blocked the port, the user therefore didn't really notice. On top of that we were not looking for an oscilloscope!”

SWITCH-CERT customer feedback, after receiving our bot warning

Page 20: 2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH

2005 © SWITCH 21