a business driven approach to security policy management a technical perspective final

58
A BUSINESS-DRIVEN APPROACH TO SECURITY POLICY MANAGEMENT – A TECHNICAL PERSPECTIVE Joe DiPietro, SE Director

Upload: algosec

Post on 22-Feb-2017

119 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: A business driven approach to security policy management  a technical perspective final

A BUSINESS-DRIVEN APPROACH TO SECURITY POLICY MANAGEMENT – A TECHNICAL PERSPECTIVEJoe DiPietro, SE Director

Page 2: A business driven approach to security policy management  a technical perspective final

AGENDA• How to get holistic visibly of security risk and

compliance across the enterprise network• How to reduce risk and avoid application outages• How to tie cyber threats to business processes• How to enhance security processes with business

context, including impact analysis and risk assessment• How to accelerate application deployments to the cloud

Page 3: A business driven approach to security policy management  a technical perspective final

LINKING SECURITY INSIGHTS TO BUSINESS APPLICATIONS• Applications run the business• Applications run over the network• Security devices protect the data and applications• Security teams must inject business context into the

security management process to be relevant for the business to understand

• For example…

Page 4: A business driven approach to security policy management  a technical perspective final

UNDERSTANDING YOUR BUSINESS APPLICATIONS • How many security

devices are protecting your critical business applications?

• 11 for Payroll• 11 for GameStop• 5 for MobileBanking

Page 5: A business driven approach to security policy management  a technical perspective final

UNDERSTANDING YOUR BUSINESS APPLICATIONS

• What components of your business applications are being blocked by your security policies?

• No blocking for• Asset Management• Domino Server• ERP• Employee Portal

• Blocking issues for these applications:• 3 for Sequoia• 2 for MobileBanking• 1 for GameStop• 1 for Payroll

Blocked Flow

Page 6: A business driven approach to security policy management  a technical perspective final

UNDERSTANDING YOUR BUSINESS APPLICATIONS • How many critical

business applications go through each firewall device?

• Do you have a plan if these devices go down?

• What happens if any of these devices are misconfigured because of a change to their security policy?

Page 7: A business driven approach to security policy management  a technical perspective final

UNDERSTANDING YOUR BUSINESS APPLICATIONS • How often do your

business applications change?

• Do you understand the details of these changes?

• What happens if a change request occurs during a critical lock down period, like the holiday shopping season?

Page 8: A business driven approach to security policy management  a technical perspective final

UNDERSTANDING YOUR BUSINESS APPLICATIONS

• What are your most vulnerable applications?

• Applications need to be linked to security policies to understand the risks

• Are all of the components of the application accounted for?

Page 9: A business driven approach to security policy management  a technical perspective final

UNDERSTANDING YOUR BUSINESS APPLICATIONS • Which applications have

“unscanned” servers?• Unscanned servers are

potentially very high risk!

• You need to understand these details for your total application risk exposure

Page 10: A business driven approach to security policy management  a technical perspective final

UNDERSTANDING YOUR BUSINESS APPLICATIONS

Which are your most complicated applications?

Page 11: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

11 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 12: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

12 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 13: A business driven approach to security policy management  a technical perspective final

• Step 1 – Understand your applications

• There are a variety of methods to auto-discover applications

• The goal is to capture the relevant information in order to build an application diagram

EFFECTIVELY MANAGING APPLICATION CONNECTIVITY

Easily discover existing application connectivity flows

PacketBroker

ESX Server Host base sensorOn Application Server

Let’s walk through an application discovery process…

Page 14: A business driven approach to security policy management  a technical perspective final

DISCOVERY YOUR APPLICATIONS AUTOMATICALLY • “Auto discover” your

applications • Collected data is

visualized • Understanding the

connections is critical to security and business processes

• How does this device interact with the rest of the application?

Page 15: A business driven approach to security policy management  a technical perspective final

UNDERSTANDING THE APPLICATIONAre you aware that this server has

email and SSH outgoing connections?

Is this really part of the application?

Application data is verified and turned into

application flows

Page 16: A business driven approach to security policy management  a technical perspective final

APPLICATION FLOWS

• Raw connection data is translated into flows• Change management processes work on the flows• Automating security change management processes

Page 17: A business driven approach to security policy management  a technical perspective final

CHANGE MANAGEMENT MIGRATE TO THE CLOUD• Migrate time clock server to

amazon server in the cloud

Page 18: A business driven approach to security policy management  a technical perspective final

NEW CHANGE REQUEST HAS BEEN SUBMITTED

• DC Time Clock Server can not reach the Amazon cloud time clock server yet…

• So the flow is “RED”Who is blocking

this?

Page 19: A business driven approach to security policy management  a technical perspective final

FULL NETWORK VIEW OF THE APPLICATION FLOW

These devices

These devices allow the traffic

Page 20: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

20 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 21: A business driven approach to security policy management  a technical perspective final

CHANGE REQUEST HAS BEEN SUBMITTED AND IS BEING PLANNED

• This change request applies to the 4 devices blocking the traffic

Appropriate review cycle can continue for the application change request

Page 22: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

22 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 23: A business driven approach to security policy management  a technical perspective final

SECURING BUSINESS TRANSFORMATION TO THE CLOUD• Identify applications

• Extract relevant components

• Map new IP information• Automatically prepare

firewall changes for new connectivity

• Implement changes• Decommission old rules

Page 24: A business driven approach to security policy management  a technical perspective final

HELP DESK APPLICATION 1. This is the application to migrate2. Identify the flows3. Identify the relevant servers4. Prepare change requests

Help Desk Application1

2

Page 25: A business driven approach to security policy management  a technical perspective final

MIGRATING THE HELP DESK APPLICATION

Extract required servers and prepare them for the planning stage

Help Desk Application

3

Page 26: A business driven approach to security policy management  a technical perspective final

LETS MIGRATE A SERVER FROM THE APPLICATION

Page 27: A business driven approach to security policy management  a technical perspective final

SMS SERVER DC1 HAS A NEW DEFINITION

• Understanding the architecture helps you identify what components need to talk to each other

• If this server moves to a new location, these flows will be affected

Page 28: A business driven approach to security policy management  a technical perspective final

WE

We have the server definitions defined, but now we need to update the application

Page 29: A business driven approach to security policy management  a technical perspective final

OPEN REQUEST CREATED

Updated kicks off an open request to modify application connectivity

4

Page 30: A business driven approach to security policy management  a technical perspective final
Page 31: A business driven approach to security policy management  a technical perspective final

CHANGE REQUEST IS AUTOMATICALLY PLANNED

Page 32: A business driven approach to security policy management  a technical perspective final

RISK CHECKS FOR NEW SERVER MOVE (TO BE APPROVED)

This is where we can understand how much risk is introduced by the application move

Page 33: A business driven approach to security policy management  a technical perspective final

SECURITY POLICY DETAILS FOR EACH DEVICE (TO BE IMPLEMENTED)

Page 34: A business driven approach to security policy management  a technical perspective final

ANOTHER DEVICE IN THE PATH

Page 35: A business driven approach to security policy management  a technical perspective final

PROGRESSING ALONG THE PATH

Page 36: A business driven approach to security policy management  a technical perspective final

APPLICATION IS MIGRATED, NOW DECOMMISSION OLD COMPONENTS

36 | ConfidentialPlease

decommission

Legacy WebAccess

#6757 Firewall Change Request to remove WebAccess application

Page 37: A business driven approach to security policy management  a technical perspective final

MIGRATION COMPLETE

Page 38: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

38 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 39: A business driven approach to security policy management  a technical perspective final

AUTOMATING SECURITY CHANGE MANAGEMENT

•Automated process•Segregation of duties

•Embedded risk checks

Plan

Approve

ImplementValidate

Close

Request

1 2

3

4

6

5

2

Notify Reques

ter

Each Firewall Policy is automatically analyzed to see if request is already allowed

3

4•Add a new rule?•Modify an existing rule?•Create new objects?•Automatically document the rule change

5

6

Automatic “Push” to reduce misconfigurations

Page 40: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

40 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 41: A business driven approach to security policy management  a technical perspective final

TYING CYBER THREATS TO BUSINESS APPLICATIONSRequirement:

• Understand the business application involved in the security incident to put context around the business impact

• SIEM receives a security incident, what do you do?

Page 42: A business driven approach to security policy management  a technical perspective final

BUSINESS APPLICATIONS AFFECTED BY INCIDENT

• Automatically identify business applications• Identify the specific components of the application

Page 43: A business driven approach to security policy management  a technical perspective final

HOW DOES THIS ACCESS OCCUR THROUGH THE NETWORK?

Page 44: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

44 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 45: A business driven approach to security policy management  a technical perspective final

COMPLEXITY = MISCONFIGURATIONS

• Security policy clean up …• Rules• Objects• Permissions

Page 46: A business driven approach to security policy management  a technical perspective final

Regularly use recommendations to tight the security policies….

INTELLIGENTLY TIGHTEN YOUR SECURITY POLICY

Page 47: A business driven approach to security policy management  a technical perspective final

KEEP YOUR POLICIES CLEAN AS YOU GO ALONG!

Start the process of “rule re-certification” when you first make the request!

Page 48: A business driven approach to security policy management  a technical perspective final

RULE RECERTIFICATION PROJECT TO KEEP SECURITY POLICY TIGHT

Page 49: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

49 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 50: A business driven approach to security policy management  a technical perspective final

CONTINUOUS COMPLIANCE• Dashboard

s help you keep score for compliance

Page 51: A business driven approach to security policy management  a technical perspective final

COMPLIANCE DASHBOARD FOR ALL FIREWALLS

Page 52: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ADDRESSED

52 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 53: A business driven approach to security policy management  a technical perspective final

• Heterogeneous device support

• Traffic simulations

• Route lookup• Security and

networking teams working together

SINGLE PANE OF GLASS…

Page 54: A business driven approach to security policy management  a technical perspective final

SINGLE PANE OF GLASS…• Bring in the application development team into the single

pane of glass

Application Networking Security Different views of the same application

Red = high riskYellow = medium risk

What specific risks in these components?

Page 55: A business driven approach to security policy management  a technical perspective final

PROACTIVE RISK ANALYSIS• These risks are within this application flow…

• Different risk profiles can be applied to your application flows• PCI • Corporate risk policy• Etc.

Page 56: A business driven approach to security policy management  a technical perspective final

KEY BUSINESS CHALLENGES THAT MUST BE ARE ADDRESSED

56 | Confidential

Automating security change

management

Tying cyber threats to business

applications

Single pane of glass for network

security policy management

Securing business

transformation to the cloud

Ensuring continuous compliance

Effectively managing application connectivity

Reducing risk from

misconfigurations

Avoiding application

outages due to connectivity

issues

Business-Driven

SECURITY

Business-Driven

AGILITY

Page 57: A business driven approach to security policy management  a technical perspective final

MORE RESOURCES

48