coi based networking @lsec

Upload: lleysen1207

Post on 06-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 COI Based Networking @LSEC

    1/30

    Secure network provisioning on demand

    Providing secured Community of Interest based virtual networks based

    on the user (or his role) that logs on

    LSEC - Future Internet (Security) Architecture Seminar

    10 Septembre 2010

    Luc Leysen

  • 8/2/2019 COI Based Networking @LSEC

    2/30

  • 8/2/2019 COI Based Networking @LSEC

    3/30

    Agenda

    Introduction

    Current network challenges Future network vision

    Upcoming solution to the challenges

    Advantages of COI based networking Unisys Stealth solution

    Questions / Answers

    2010 Unisys Corporation. All rights reserved. Page 3

  • 8/2/2019 COI Based Networking @LSEC

    4/30

    Current networking challengesDesign

    Availability and capacity

    Security has high

    impact

    segmentation

    E.g. separate

    administration

    networks

    Case high security:

    2008 Unisys Corporation. All rights reserved. Page 4

    WAN 3

    WAN 2

    WAN 1

    GIG LAN Infrastructures Users

    DC 1

    DC 3

    DC 2

    Data Center

    E.g. Military, government Multiple networks

    More difficult/costly to maintain scalability & redundancy

    Different equipment for different networks

  • 8/2/2019 COI Based Networking @LSEC

    5/30

    Current networking challengesFading network frontiers

    Reasons

    Homeworking growth /office-space reduction

    3rd party local access

    (Internet, their Company

    network)

    Projects involvingcustomers, partners,

    Outsourcing, Cloud

    IT Consumerization

    2008 Unisys Corporation. All rights reserved. Page 5

    Consequences

    Secure network design requires fast updating while complexity increases

    More external access to Internal networkUnencrypted Internal network => higher risk

  • 8/2/2019 COI Based Networking @LSEC

    6/30

    Current networking challengesSecurity

    Edge protection : mature but complex

    Internal network protection => often limited

    ACL, less frequently Firewalls

    NAC/NAP

    Often not yet in place Current Implementations: 802.1X 2001,2004

    Vulnerabilities

    MiTM, MAC Spoofing, EAPOL Logoff attacks

    Waiting for 802.1X 2010: MACSec IEEE

    802.1AE => encryption

    Certificates => PKI => complex

    No encryption/ barely segmented

    => Vulnerable to attacks

    2008 Unisys Corporation. All rights reserved. Page 6

  • 8/2/2019 COI Based Networking @LSEC

    7/30

    Current networking challengesNew connection needs

    Various Reasons

    Partner connection

    Visitor : Internet access

    Separate wireless network

    Internal move : different access

    Reorganization: building/organization

    New servers: projects,

    Extra equipment may be required

    Extra network equipment

    Extra end-user equipment

    If different security level

    Extra wiring /space/power/HVAC

    Page 7

  • 8/2/2019 COI Based Networking @LSEC

    8/30

    Current networking challengesNew connection needs

    Extra effort:Involvement of both

    Network team(s) Security team(s)

    Extra physical access controls

    Time to setup

    Response to urgent needs ? E.g. projects

    Too often leads to: No answer to business need

    Business finds workarounds

    => Non-compliant with policies

    IT provides shortcut solution

    Not in line with requirements and/orpolicy

    Needs of the few?

    e.g. Financial results exchange between CxO

    High setup cost per person

    Page 8

    People

  • 8/2/2019 COI Based Networking @LSEC

    9/30

    Current networking challengesMachine based

    Other user => same network access

    Location restrictions Specific port / specific location

    Physical access controls required to

    limit unauthorized access

    User Role change => New/changed

    connection needs

    Insufficient Time restrictions

    Often not enforced Procedures periodic review device

    network access requirements ?

    2008 Unisys Corporation. All rights reserved. Page 9

  • 8/2/2019 COI Based Networking @LSEC

    10/30

    Agenda

    Introduction

    Current network challenges Future network vision

    Upcoming solution to the challenges

    Advantages of COI based networking Unisys Stealth solution

    Questions / Answers

    2010 Unisys Corporation. All rights reserved. Page 10

  • 8/2/2019 COI Based Networking @LSEC

    11/30

    Future networking Vision

    Your logon Identity will determine which other

    devices you see:

    Wherever they and you are

    Encryption will be used practically all the time

    Identity & access management systems determine

    the scope of what you see on the network of your

    end device

    Trust relationships such as Federation between IAM

    systems will control the network access to 3rd partysystems.

    Communities Of Interests (COI) will form instantly

    based on connection needs.

    Future?

    Today : Unisys Stealth is pretty close

    COI Based networking

    NAC type of policy checking will occur before

    allowing access, checking endpoint security,

    possibly also location

    2008 Unisys Corporation. All rights reserved. Page 11

    My

    BANK

    My

    Office

  • 8/2/2019 COI Based Networking @LSEC

    12/30

    Agenda

    Introduction

    Current network challenges Future network vision

    Upcoming solution to the challenges

    Advantages of COI based networking Unisys Stealth solution

    Questions / Answers

    2010 Unisys Corporation. All rights reserved. Page 12

  • 8/2/2019 COI Based Networking @LSEC

    13/30

    Upcoming solution to the challengesCommunity of Interest based networking

    Physical Network design simplified

    =>Management & Cost reduction

    User Identity determines COI access

    through role assignments

    Encryption + Data dispersal

    mechanism guarantees militarygrade isolation of COI => Increased

    security

    Allows dynamic creation of secureVirtual Networks => Huge flexibility

    Role provisoning = Network

    provisioning => Business in control

    2008 Unisys Corporation. All rights reserved. Page 13

    COI1

    COI2

    COI3

    IAM

    solution

  • 8/2/2019 COI Based Networking @LSEC

    14/30

    Upcoming solution to the challengesCommunity of Interest based networking

    Integration in the network

    without changes to routers or

    applications

    Hence transparent to

    protocols such as DHCP,

    RIP, OSPF...

    2008 Unisys Corporation. All rights reserved. Page 14

  • 8/2/2019 COI Based Networking @LSEC

    15/30

    Agenda

    Introduction

    Current network challenges Future network vision

    Upcoming solution to the challenges

    Advantages of COI based networking Unisys Stealth solution

    Questions / Answers

    2010 Unisys Corporation. All rights reserved. Page 15

  • 8/2/2019 COI Based Networking @LSEC

    16/30

    Advantages of COI based networkingNetwork design

    Availability and capacity

    Consolidated, more "flat"networks

    only 1 network to

    maintain

    optimal scalability &redundancy

    Improved overall SLA

    More focused

    standardization

    Easier management

    Simplified design

    2008 Unisys Corporation. All rights reserved. Page 16

    GIG LAN Infrastructure UsersData Center

    WAN 2

    WAN 1 DC

    Security

    Confidentiality and integrityguaranteed by COI

    Edge security between

    uncontrolled and controlled

    network

  • 8/2/2019 COI Based Networking @LSEC

    17/30

    Advantages of COI based networkingNo more Fading network frontiers

    Network frontiers are

    implicit per COI

    Can go beyond traditional

    network frontiers

    Over 3rd party/untrusted

    physical networks

    Physical access to

    network infrastructure

    doesn't mean access tothe "networks" anymore

    2008 Unisys Corporation. All rights reserved. Page 17

  • 8/2/2019 COI Based Networking @LSEC

    18/30

    Advantages of COI based networkingNew connection need

    Controlled by Identity

    Connectivity limited to explicitly

    required scope

    Also at network layer

    No attack possible ontransport/session/application layers

    outside assigned COI

    Most cases : No extra equipment

    need Extra VM if different security level

    More GREEN solution

    2008 Unisys Corporation. All rights reserved. Page 18

  • 8/2/2019 COI Based Networking @LSEC

    19/30

    Advantages of COI based networking

    New connection need

    Limited management effort

    Definition of a COI mapped to an ADgroup:

    Only when a new COI is needed

    Add user to AD/LDAP group

    Can be automated through IAMworkflow

    Delegation to business possible

    Hence very quick

    Easy to fulfil urgent needs (e.g.

    Project) or the needs of the few (e.g.

    CxO) without extra cost

    2008 Unisys Corporation. All rights reserved. Page 19

    AD/LDAP

    CxO group

    CxO COI

  • 8/2/2019 COI Based Networking @LSEC

    20/30

    Advantages of COI based networkingUser based

    Other user logs on =>Different

    connectivity

    No location Restrictions

    Any socket anywhere

    Time restrictions imposed easily Logon restrictions for end user

    Automatic deprovisioning of user

    through IAM at end of assignment

    Automatic removal of accessible

    "networks

    2008 Unisys Corporation. All rights reserved. Page 20

  • 8/2/2019 COI Based Networking @LSEC

    21/30

    Agenda

    Introduction

    Current network challenges

    Future network vision

    Upcoming solution to the challenges

    Advantages of COI based networking

    Unisys Stealth solution

    Questions / Answers

    2010 Unisys Corporation. All rights reserved. Page 21

  • 8/2/2019 COI Based Networking @LSEC

    22/30

    Unisys Stealth solution

    What is it?

    2010 Unisys Corporation. All rights reserved. Page 22

    The Unisys Stealth Solution is a

    transformational data protectionsolution

    Stealth uses certified encryption,

    then bit-splits data into multiple

    slices or shares as it movesthrough the network or is written to

    local or remote storage

    Beyond encryption, the Stealth

    Solution allows multiple

    communities of interest to share

    the same infrastructure without

    fear of another group accessing

    their data

    The result is a much simpler

    infrastructure, increased agility

    to react to new requirements, and

    enhanced security of your data

  • 8/2/2019 COI Based Networking @LSEC

    23/30

    Page 23

    Unisys Stealth solution

    How does it work?

    100

    S(01010011)

    00 111

    Bit-split into slices

    Clear text TCP/IP Packet

    G(01000111)

    Encrypt (AES-256)

    Clear textStealth Hdr

    2009 Unisys Corporation. All rights reserved.

    Each slice is authenticated (HMAC) before being transmitted

  • 8/2/2019 COI Based Networking @LSEC

    24/30

    Unisys Stealth solution

    Standard ++ security mechanisms

    Cryptographic module

    FIPS 140-2 certified

    AES-256 cryptographic algorithm

    Unique patent pending bit-level splitting solution

    Integrity control with hash code

    Optional resilience mechanism

    EAL 4+ Certification in progress (Oct 2010)

    Session keys automatic management Entirely invisible for users

    No end-user certificates required => no PKI

    2010 Unisys Corporation. All rights reserved. Page 24

  • 8/2/2019 COI Based Networking @LSEC

    25/30

    Unisys Stealth solutionData access by COI

    Enterprise

    Information

    Bus

    Stealth

    Network

    Appliance

    Stealth SAN Appliance

    2010 Unisys Corporation. All rights reserved. Page 25

    Community of Interest 1

    Community of Interest 2Community of Interest 3

  • 8/2/2019 COI Based Networking @LSEC

    26/30

    Unisys Stealth solutionThe rest remain cloaked : Stealth

    Enterprise

    Information

    Bus

    Stealth

    Network

    Appliance

    Stealth SAN Appliance

    2010 Unisys Corporation. All rights reserved. Page 26

    Community of Interest 1

    Community of Interest 2Community of Interest 3

  • 8/2/2019 COI Based Networking @LSEC

    27/30

    Page 27

    Unisys Stealth solutionPossible architecture

    Blue Community of Interest (COI) for Development

    Yellow COI for Marketing

    Green COI for Human Resources

    Red COI for Stealth Administration

    Legacy (e.g.

    Linux) systems

    VM

    Shared database servers

    Stealth

    Appliance

    Stealth

    Appliance

    VM

    VM

    Shared physical

    infrastructure

    Dedicated

    server

    platforms

    Administrativ

    e PC

    SAN

    Regional Office

    EMEA

    Remote OfficeCalifornia

    Corporate Office

    New York

    Stealth

    Appliance

    Global Datacenter

  • 8/2/2019 COI Based Networking @LSEC

    28/30

    Unisys Stealth solution

    Supported operating systems

    Currently supported systems

    Windows XP Windows Server 2003

    Windows 7

    Windows Server 2008

    Linux Red Hat

    On-demand supported systems

    Vista

    Other Linux editions

    All other systems are supported by Stealth appliances

    2010 Unisys Corporation. All rights reserved. Page 28

  • 8/2/2019 COI Based Networking @LSEC

    29/30

    Unisys Stealth solution

    Stealth appliances functions

    Stealth appliances play four distinct roles :

    a) Gateway to and from a non Stealth Network (ex: Internet,Mesh network)

    b) Front-end for non Stealth devices to integrate them in the

    Stealth network (e.g.: printers, mainframes, legacy systems,

    Unix)c) Licences management at user/server logon

    d) Logging

    Only c) and d) are mandatory functions

    2010 Unisys Corporation. All rights reserved. Page 29

  • 8/2/2019 COI Based Networking @LSEC

    30/30

    QUESTIONS & ANSWERSThank you for your attention

    2010 Unisys Corporation. All rights reserved. Page 30