30
Securing Remote Access With SSL VPNs: A Best Practice Primer Sikhi Gundu and Kartik Kumar, Juniper Networks India Pvt Ltd

Securing Remote Access With SSL VPNs: A Best Practice Primer

  • Upload
    beulah

  • View
    55

  • Download
    0

Embed Size (px)

DESCRIPTION

Securing Remote Access With SSL VPNs: A Best Practice Primer. Sikhi Gundu and Kartik Kumar, Juniper Networks India Pvt Ltd. Preliminaries. Target audience: IT org managers, admins; not developers/implementers Introductory/high level overview Essentially tutorial. Agenda. Motivation - PowerPoint PPT Presentation

Citation preview

Page 1: Securing Remote Access With SSL VPNs: A Best Practice Primer

Securing Remote Access With SSL VPNs: A Best Practice Primer 

Sikhi Gundu and Kartik Kumar, Juniper Networks India Pvt Ltd

Page 2: Securing Remote Access With SSL VPNs: A Best Practice Primer

Preliminaries

• Target audience: IT org managers, admins; not developers/implementers

• Introductory/high level overview• Essentially tutorial

Page 3: Securing Remote Access With SSL VPNs: A Best Practice Primer

Agenda

• Motivation• 30000ft view of SSLVPN Technology• Security with SSLVPN: Athentication• Security with SSLVPN: Endpoint Integrity

• Security with SSLVPN: Authorization• Security with SSLVPN: User Education

Page 4: Securing Remote Access With SSL VPNs: A Best Practice Primer

Agenda

• Motivation• 30000ft view of SSLVPN Technology• Security with SSLVPN: Authentication• Security with SSLVPN: Endpoint Integrity

• Security with SSLVPN: Authorization• Security with SSLVPN: User Education

Page 5: Securing Remote Access With SSL VPNs: A Best Practice Primer

Motivation

• Usecase• Remote access for Employees, Partners & Customers 

• Why not IPSEC• Requires client software to be installed.• IPSEC VPNs are good for site-to-site, not so good for clients to server

• is layer 3; remote access users get layer 3 access!

• Why SSL VPN• Client less remote access (browser is the client)• Easy on the IT shop (roll-out, config)•  Layer 4 access with notion of a " user "  

Page 6: Securing Remote Access With SSL VPNs: A Best Practice Primer

Agenda

• Motivation• 30000ft view of SSLVPN Technology• Security with SSLVPN: Authentication• Security with SSLVPN: Endpoint Integrity

• Security with SSLVPN: Authorization• Security with SSLVPN: User Education

Page 7: Securing Remote Access With SSL VPNs: A Best Practice Primer

– SSLVPN device acts as a reverse proxy–  SSL provides data confidentiality and integrity on the public network

Enterprise Network

SSLVPN basic workflow

Employees with Corporate/Home

Laptops

SSL VPN

App Server

Internet

https

https

http

http

Page 8: Securing Remote Access With SSL VPNs: A Best Practice Primer

SSL VPN typical deployment 

EnterpriseNetwork

Internet

Firewall

Router

SSL VPN

Applications Server

Application Server

Employees with Corporate Laptops

Employeeswith Home PCs

Employees with Mobile Devices

Page 9: Securing Remote Access With SSL VPNs: A Best Practice Primer

SSLVPN – Typical End-user Flow• User connects to the gateway • User Authenticates

• SSLVPN presents portal frontending accessible resources

• User signs out.

Page 10: Securing Remote Access With SSL VPNs: A Best Practice Primer

Essential functionality: Rewriting 

• <body bgcolor=#ffffff text=#000000 link=#0000cc vlink=#551a8b alink=#ff0000 onload="try{!google.j.b&&document.f.q.focus()}catch(e){};if(document.images)DanaPutSrc(new Image(),'/images/srpr/nav_logo14.png',0)" ><textarea id=csi style=display:none></textarea><script>if(google.j.b)document.body.style.visibility='hidden';</script><iframe name=wgjf style=display:none src="/dana-cached/help/empty.html" onload="google.j.l()" onerror="google.j.e()"></iframe><textarea id=wgjc style=display:none></textarea><textarea id=wwcache style=display:none></textarea><textarea id=csi style=display:none></textarea><textarea id=hcache style=display:none></textarea><span id=main><div id=ghead><div id=gog><div id=gbar><nobr><b class=gb1>Web</b> <a 

href="https://sslvpn.mycompnay.com/,DanaInfo=10.204.50.40+imghp?hl=en&tab=wi" onclick=gbar.qs(this) class=gb1>Images</a> <a href="https://sslvpn.mycompnay.com/,DanaInfo=10.204.50.40+?hl=en&tab=wv" onclick=gbar.qs(this) class=gb1>Videos</a> <a href="https://sslvpn.mycompnay.com/,DanaInfo=10.204.50.40+maps?hl=en&tab=wl" onclick=gbar.qs(this) class=gb1>Maps</a> <a href="https://sslvpn.mycompnay.com/,DanaInfo=10.204.50.40+nwshp?hl=en&tab=wn" onclick=gbar.qs(this) class=gb1>News</a> <a

• <body bgcolor=#ffffff text=#000000 link=#0000cc vlink=#551a8b alink=#ff0000 onload="try{!google.j.b&&document.f.q.focus()}catch(e){};if(document.images)new Image().src='/images/srpr/nav_logo14.png'" ><textarea id=csi style=display:none></textarea><script>if(google.j.b)document.body.style.visibility='hidden';</script><iframe name=wgjf style=display:none src="" onload="google.j.l()" onerror="google.j.e()"></iframe><textarea id=wgjc style=display:none></textarea><textarea id=wwcache style=display:none></textarea><textarea id=csi style=display:none></textarea><textarea id=hcache style=display:none></textarea><span id=main><div id=ghead><div id=gog><div id=gbar><nobr><b class=gb1>Web</b> <a 

href="http://10.204.50.40/imghp?hl=en&tab=wi" onclick=gbar.qs(this) class=gb1>Images</a> <a href="http://10.204.50.40/maps?hl=en&tab=wl" onclick=gbar.qs(this) class=gb1>Maps</a> <a href="http://10.204.50.40/nwshp?hl=en&tab=wn" onclick=gbar.qs(this) class=gb1>News</a> <a href="http://10.204.50.40/Home.aspx?hl=en&tab=w0" class=gb1>Arekkut</a> <a href="http://10.204.50.40/bkshp?hl=en&tab=wp"

• Layer 4

Page 11: Securing Remote Access With SSL VPNs: A Best Practice Primer

Essential Functionality: Rewriting Contd.• Layer 3

Src IP11.13.1.1

Dst IP12.2.2.3

Src IP11.13.1.1

Dst IP12.2.2.3

Src IP12.2.2.3

Dst IP10.2.2.4

Src IP12.2.2.3

Dst IP10.2.2.4

Applications Server

Src IP10.2.2.4

Dst IP12.2.2.3

Src IP10.2.2.4

Dst IP12.2.2.3

Src IP12.2.2.3

Dst IP11.13.1.1

Src IP12.2.2.3

Dst IP11.13.1.1

NAT Device

EnterpriseNetwork

Internet

Page 12: Securing Remote Access With SSL VPNs: A Best Practice Primer

Essential functionality: Granular Access Control

• Policy based access control (based on identity & other factors)

• For ex: assign role to user; assign resources to roles

• Example policies: • Web Access• UNIX file Access• Windows File Access• SSO• Terminal Services

Page 13: Securing Remote Access With SSL VPNs: A Best Practice Primer

 Essential functionality: Granualar               Access Control         Contd…

• Example Role Assignments based on• Location• Username• Login time• Group• Etc etc.... Fine Grained Access control

• SSL VPN being a layer 4 device, has an end user notion and thus Fine Grained Access control Is possible

Page 14: Securing Remote Access With SSL VPNs: A Best Practice Primer

Agenda

• Motivation• 30000ft view of SSLVPN Technology• Security with SSLVPN: Authentication• Security with SSLVPN: Endpoint Integrity

• Security with SSLVPN: Authorization• Security with SSLVPN: User Education

Page 15: Securing Remote Access With SSL VPNs: A Best Practice Primer

Security with SSL VPN: Authentication

• Remember: Internet-facing device!• Ensure Strong Authentication

• Strength of Authentication• Strength of a password policy

– Password strength– Password expiry– Blacklisted pin dictionary

• Typically, device vendor would ensure protection against:

• Dictionary attacks• Brute force attacks• Denial of service attacks

Page 16: Securing Remote Access With SSL VPNs: A Best Practice Primer

• Single factor Authentication

• Two factor

 Strong Authentication, Contd

Page 17: Securing Remote Access With SSL VPNs: A Best Practice Primer

Strength of Authentication Contd.

• Secondary Authentication

• Adaptive authentication

Page 18: Securing Remote Access With SSL VPNs: A Best Practice Primer

Strength of Authentication Contd.• Secondary Authentication

– Can  be used where stronger auth mechanism is required.

– For example :• User does primary authentication to a Auth Server [could be certificate or Machine Auth]

• Once Primary auth succeeds, he has to authenticate again to a Secondary Auth Server [which could be AD or LDAP or radius auth]

• Secondary authentication combined with 2-factor, will be even more stronger, but an overkill.

Page 19: Securing Remote Access With SSL VPNs: A Best Practice Primer

Agenda

• Motivation• 30000ft view of SSLVPN Technology• Security with SSLVPN: Authentication• Security with SSLVPN: Endpoint Integrity

• Security with SSLVPN: Authorization• Security with SSLVPN: User Education

Page 20: Securing Remote Access With SSL VPNs: A Best Practice Primer

Assess Endpoint’s security posture• Enable this feature, most vendors provide it• Enforce policy not to allow login if client not clean• Makes sure that the client has

– Trusted anitivirus software (eg: Norton AV 2010)– Trusted Anti-MalWare– Updated database virus signatures for the antivirus.– Availabilty of OS Patches.

• Ensure file system has no suspicious content or processes.

• Ensure file system has the content it is supposed to have; ie, not tampered with

Page 21: Securing Remote Access With SSL VPNs: A Best Practice Primer

Clean session termination

• Data is left behind by the session!– Browser History–  Browser Cache– Saved password and forms– Keystroke loggers– Cookies

• Use cache cleaning functionality– Cleans up all Browser data on logout

• Enable virtual keyboards during authentication

Page 22: Securing Remote Access With SSL VPNs: A Best Practice Primer

 Clean session termination   Contd.

• SVW [Secure virtual workspace]– Restricted, transient shell– Created when user login-in– Destroyed on logout– Ensures no upload of dangerous content or

download of critical data

Page 23: Securing Remote Access With SSL VPNs: A Best Practice Primer

Integrate with IDP

• Coordinated Threat control using IDP

IDP

SSL VPN

Detects intrusion

Quarantines user based on IDP instructions

Informs SSL VPN

Page 24: Securing Remote Access With SSL VPNs: A Best Practice Primer

Agenda

• Motivation• 30000ft view of SSLVPN Technology• Security with SSLVPN: Authentication• Security with SSLVPN: Endpoint Integrity

• Security with SSLVPN: Authorization• Security with SSLVPN: User Education

Page 25: Securing Remote Access With SSL VPNs: A Best Practice Primer

Security with SSLVPN: Authorization

• Can remote users have the same level of access privilege as local users? Maybe not!

• Exploit RBAC to the fullest• Role is a group of policies• Policies govern access to resources

– Web Recource Access– File Resource access [Both windows/UNIX]– Telnet/SSH Access– SSO – Terminal Services access

Page 26: Securing Remote Access With SSL VPNs: A Best Practice Primer

Role Based Access Control Contd.

• Vendors provide the ability to define roles as a function of several attributes

• For example:– Endpoint security posture– Login time– Login IP– Login Name– Directory attributes– Group– For ex: same user gets different privileges during

office hours as opposed to off-hours

Page 27: Securing Remote Access With SSL VPNs: A Best Practice Primer

Agenda

• Motivation• 30000ft view of SSLVPN Technology• Security with SSLVPN: Authentication• Security with SSLVPN: Endpoint Integrity

• Security with SSLVPN: Authorization• Security with SSLVPN: User Education

Page 28: Securing Remote Access With SSL VPNs: A Best Practice Primer

Bad people: evil outsiders and disgruntled insiders

• Remember: internet-facing web device• Vulnerable to the usual set of web attacks• Injection Attacks

– Most Common: Cross-site scripting• Parsing and detecting malicious script • Have multiple admins to verify config.

– New one XSRF• Cross site Request forgery

• Frame busting• Vendor provides some form of defence; but beware

your customization may open up holes!

Page 29: Securing Remote Access With SSL VPNs: A Best Practice Primer

Key is: Train your users

• Educate Users– Always ensure graceful exit– Don’t leave sessions unattended– Avoid logging in via Shared Computers– Don’t cache Password on browsers– Use Virtual keyboards for login

Page 30: Securing Remote Access With SSL VPNs: A Best Practice Primer

Thank you