business productivity and automated security controls

20
Optimizing Business Productivity Through Automated Security Controls Heather Axworthy Network Security Engineer [email protected] 1 © 2010 Heather L. Axworthy

Upload: heatherax

Post on 24-Jun-2015

459 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Business Productivity and Automated Security Controls

Optimizing Business Productivity Through Automated Security Controls

Heather Axworthy

Network Security Engineer

[email protected]

1© 2010 Heather L. Axworthy

Page 2: Business Productivity and Automated Security Controls

Bio Ten Years Experience In Networks And Security

Secured Many Sensitive And Strategic Networks For Fortune 50 Companies

Sr. Security Engineer

Worked On Multiple IDS/IPS And Security Platforms

Really Good Cook, Tried Flying A Helicopter, And Love To Hike

Blog Http://Chickbits.Blogspot.Com

Linkedin: Http://Www.Linkedin.Com/In/Heatheraxworthy

Twitter: Haxworthy

2© 2010 Heather L. Axworthy

Global Financial Services Managed Security Services B2C Retailer

B2B Start-up Large University

Page 3: Business Productivity and Automated Security Controls

Agenda

3© 2010 Heather L. Axworthy

1. Security Continuum

2. Where To Respond To A Threat?

3. Single Security-Strategy Risks

4. Protection & Costs

5. Deployment Considerations

6. Recommendations To Your Clients

7. What Is IPS?

8. Architecture And Deployment

9. Event Monitoring/Tuning

10. Ensuring Success

Page 4: Business Productivity and Automated Security Controls

Security Continuum

© 2010 Heather L. Axworthy 4

Prevention Detection Response

IPS IDS & Desktop People

Page 5: Business Productivity and Automated Security Controls

Security Continuum

© 2010 Heather L. Axworthy 5

Human Analogy Security AppliancesPREVENTION Skin:

Openings: Eyes, Nose, Mouth, Ears, Cuts, Etc.

Firewall:Open Ports (25, 80, 110, 443,etc.

DETECTION Immune System:Detects Organic Viruses

Intrusion Detection Systems (IDS): Watches Network Traffic – Alerts I.T. Staff

RESPONSE Antibodies:Mitigates & Eliminates An Organic Virus

Security Incident And Event Management (SIEM): Automates Threat Responses. Significant Human Effort Is Still Required

Page 6: Business Productivity and Automated Security Controls

Security Assets

Equipment Processes People

•Firewall•IPS•IDS•Log monitoring

•Change Management•Vulnerability Management•Incident Response

•IT resources•User Awareness Training

© 2010 Heather L. Axworthy 6

Page 7: Business Productivity and Automated Security Controls

Composition of Threat Response

© 2010 Heather L. Axworthy 7

Internet Traffic

Page 8: Business Productivity and Automated Security Controls

Composition of Threat Response:Computers, IT, and Users

Security Involves Variable Human Interaction

Perimeter Security Block Malicious Traffic From Entering The Network.

– IPS Provides Active Blocking & Minimizes User Involvement, Reducing Response Urgency

– I.T. Employees Involved With Deployment And Maintenance

Intrusion Detection (IDS) Alerts I.T. To Malicious Traffic But Does Not Prevent It From Penetrating The Network.

– IDS Requires Higher IT Employee Interaction To React To Alerts.

Desktop Security Controls Involve The Highest Participation From Users.

© 2010 Heather L. Axworthy 8

Page 9: Business Productivity and Automated Security Controls

Single Security-Strategy Risks

© 2010 Heather L. Axworthy 9

Page 10: Business Productivity and Automated Security Controls

Single Security Strategy

Organizations Often Decide To Deploy Only One Security Technology

– Different Security Methods Are Not Equal– Each Provides Different Levels Of Protection

If You Deploy One Technology, It’s Best To Have A Proactive Technology Like IPS At The Perimeter.

– IPS Reduces The Amount Of Malicious Traffic That Gets To The End User

– Employees See Less Alerts – More Time To Focus On The Business

Previous Chart Illustrates Risk Levels For Deploying Only One Security Technology.

– For Example, Deploying Only Desktop Security Technologies Results In The Highest Risk Because The Threat Has Already Entered Your Network

User-centric Measures Are Inconsistent Because Users Do Not The Same Thing Every Time.

© 2010 Heather L. Axworthy 10

Page 11: Business Productivity and Automated Security Controls

Protection & Equipment Costs

© 2010 Heather L. Axworthy 11

Page 12: Business Productivity and Automated Security Controls

Protection & Equipment Costs

IPS Technologies Are Proactive– Higher Initial Cost – Higher Level Of Protection

IDS Technologies Are Reactive – Lower Initial Cost – Many Tools Are Open Source – Majority Of The Cost Is Hardware. – Protection Level Is Lower: IDS Only Alerts I.T. To Malicious Traffic And I.T.

Must Spend Large Amounts Of Time Investigating, Which Can Incur Extra Costs For Additional Response Training.

Desktop Security Is Reactive – Quantity Of Desktops Drive Costs. – Relatively Inexpensive SW– User-training Costs Must Be Considered

© 2010 Heather L. Axworthy 12

Page 13: Business Productivity and Automated Security Controls

Deployment Considerations

© 2010 Heather L. Axworthy 13

criteria

partial

Page 14: Business Productivity and Automated Security Controls

Recommendation To Your Clients

IPS….IDS….Desktop SW….Security Awareness Training….Log Management & Monitoring ????

© 2010 Heather L. Axworthy 14

Keep The Threats Out!

Page 15: Business Productivity and Automated Security Controls

What is IPS?

IPS = Intrusion Prevention System/Service.

Designed To Be Deployed Inline.

Proactive Approach To Traffic Monitoring.

Preventing The Attack Packet From Penetrating Your Network.

15© 2010 Heather L. Axworthy

Page 16: Business Productivity and Automated Security Controls

Architecture Capacity Planning – Biggest Mistake Purchasing Hardware That Is

Too “Small” For Your Network.

Look At The Traffic Load Of The Segments You Want To Monitor. If The Segments (vlans) You Want To Monitor Register Bandwidth In Excess Of 100MB Each, A Small 400MB Device Is Not Large Enough.

Most Devices Have A Maximum Throughput Which Is Often An Aggregate Of All Interfaces On The Device.

16© 2010 Heather L. Axworthy

Page 17: Business Productivity and Automated Security Controls

Deployment

17© 2010 Heather L. Axworthy

Page 18: Business Productivity and Automated Security Controls

Event Monitoring/Tuning

My Device Is In Place, What Do I Do Next?

Tuning – The Time Period When You Look At Your Events And Weed Out Any False Positives And Modify Signatures.

Best Practice Is At Least 30 Days Of Looking At Traffic On A Daily Basis.

This Will Enable You To Filter Out Signatures That Are “Noisy” And See Events That Show Valid Attacks.

Once Tuning Period Is Over, Put The Device Into Block “IPS” Mode.

18© 2010 Heather L. Axworthy

Page 19: Business Productivity and Automated Security Controls

Ensuring Success

Company Buy-in, From Top Executive Management To End User. IPS Will Make “Us” More Secure.

Staffing Levels – Proper Staffing Must Be In Place To Support The IPS Device(s) And The Monitoring Of Events On A Daily Basis.

If The IPS Device Stops One Botnet Outbreak, Or A SQL Injection Attack, It Has Paid For Itself!

19© 2010 Heather L. Axworthy

Page 20: Business Productivity and Automated Security Controls

Q & A

Heather Axworthy

Network Security Engineer

[email protected]

20© 2010 Heather L. Axworthy