44

TechWiseTV Workshop: Cisco Stealthwatch and ISE

Embed Size (px)

Citation preview

Page 1: TechWiseTV Workshop: Cisco Stealthwatch and ISE
Page 2: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Top trends in the networks today

Trends

Challenges Growing Attack Surface Dynamic Threat Landscape Complexity & Fragmentation

Bring Your Own Device Cloud Services Internet of Things

Page 3: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Anatomy of a Breach

Reconnaissance

Victim clicks phishing email link

Malware dropped via backdoor

Lateral Movement to find Admin

Escalate Privilege to become Admin

Data Exfiltration using Admin privilege

Information monetized after breach

Page 4: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Users

DC ServersUsers

DC Servers

East to West

LateralMovement

Users

DC, Application

Servers

North to South

Page 5: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Need dynamic, effective segmentation today

Next-Gen

SegmentationLogical Isolations Dynamic Segmentation Monitor Violations

Traditional

MethodsSet and forget OPEX heavy Inefficient

Page 6: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Network as a Sensor, Network as an EnforcerTwo major solution with the integration

Cisco ISECisco SW

Effective Segmentation

Use of ISE and Stealthwatch to

profile assets, classify, model,

segment and monitor policies

Threat Containment

Controlled access on posture

compliance, analyze behavior,

quarantine on anomaly

SYSLOG

PxGRID

Page 7: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Effective Segmentation

Page 8: TechWiseTV Workshop: Cisco Stealthwatch and ISE

“Effective network segmentation… restricts communication between networks

and reduces the extent to which an adversary can move across the network.”

US-CERT

Page 9: TechWiseTV Workshop: Cisco Stealthwatch and ISE

TrustSec Simplifies Network Segmentation

Access Layer

Enterprise

Backbone

Voice

VLAN

Voice

Data

VLAN

Employee

Aggregation Layer

Supplier

Guest

VLAN

BYOD

BYOD

VLAN

Non-Compliant

Quarantine

VLAN

VLAN

Address

DHCP Scope

Redundancy

Routing

Static ACL

VACL

Security Policy based on TopologyHigh cost and complex maintenance

Voice

VLAN

Voice

Data

VLAN

Employee Supplier BYODNon-Compliant

Use existing topology and automate security policy to reduce OpEx

ISE

No VLAN Change

No Topology Change

Central Policy Provisioning

Micro/Macro Segmentation

Employee Tag

Supplier Tag

Non-Compliant Tag

Access Layer

Enterprise

Backbone

DC Firewall / Switch

DC Servers

Policy

TrustSecTraditional Segmentation

Page 10: TechWiseTV Workshop: Cisco Stealthwatch and ISE

EnforcementClassification Propagation

TrustSec in Action

Routers

ISE

DC Firewall

ApplicationServers

Wireless

RemoteAccess

SwitchDC Switch Application

Servers

Directory

Users

Network5 SGT

8 SGT

7 SGT

Page 11: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Propagation Options

WAN(GETVPN

DMVPN

IPSEC)

Sw itch Router Router Firew all DC Sw itch vSw itch ServerUser

SGT over Ethernet SGT over EthernetSGT over VPN

Classif icationSGACLClassif ication

WAN

Sw itch Router Router Firew all DC Sw itch vSw itch ServerUser

Classif icationSGFWClassif ication

SXP SXP

Heterogeneous

Network

Support

TrustSec

Fully Supported

Network

https://datatracker.ietf.org/doc/draft-smith-kandula-sxp/https://wiki.opendaylight.org/images/6/6c/SXP_Specification_and_Architecture_v00.pdf

SXP/SGToEthernet are on

Internet Draft

Page 12: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Implementing effective segmentation

12

Discover and Classify Assets

Understand Behavior

Enforce Policy

Active Monitoring

Network

Segmentation

Design and Model Policy

Page 13: TechWiseTV Workshop: Cisco Stealthwatch and ISE

1- Discover and Classify Assets

13

Network

Segmentation

Cisco ISE

(Identity Services Engine)

Profile Assets with ISE

Profile Assets with NetFlow and StealthWatch

Identity Groups

User & Device Authentications

Host GroupsServices, applications and host discovery

Page 14: TechWiseTV Workshop: Cisco Stealthwatch and ISE

ISE Provides Device Visibility via ProfilingActive Endpoint

ScanningIntegrated Profiling: Visibility in Scale

Network infrastructure provides

local sensing function

Device Feed —Identity in Scale

Manufacturers and ecosystem provide

constant updates to new devices

Active Scanning: Enhanced Accuracy

Cisco® ISE augments passive

network insight with active

endpoint data

Cisco

ISE

CDP/LLDP

DHCP

RADIUS

DNS

SNMP

NetFlow

HTTP

NMAP

Device Feed*

Cisco Device Sensor(Network Based)

Page 15: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Context build, summarize, exchange

Directory

Services

Vulnerability

Scanners

System

managers

Threat

Intelligence

Mobility

Services Engine

Mobile Device

Managers

ENDPOINTS

CISCO ISE

Visibility and Access ControlISE builds context and applies access control restrictions to users and devices

Context Reuseby eco-system partners for analysis & control

Security Group

Who

What

When

Where

How

Posture

Threat

Vulnerability

STEALTHWATCH

FIREPOWER SERVICES

WEB SECURITY

+ 3rd PARTY PARTNERS

• pxGrid

• REST API

• Syslog

Page 16: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Visibility through NetFlow

10.1.8.3

172.168.134.2

InternetFlow Information Packets

SOURCE ADDRESS 10.1.8.3

DESTINATION

ADDRESS172.168.134.2

SOURCE PORT 47321

DESTINATION PORT 443

INTERFACE Gi0/0/0

IP TOS 0x00

IP PROTOCOL 6

NEXT HOP 172.168.25.1

TCP FLAGS 0x1A

SOURCE SGT 100

: :

APPLICATION NAMENBAR SECURE-

HTTP

RoutersSwitches

NetFlow provides• Trace of every conversation in your network• An ability to collect record everywhere in

your network (switch, router, or firewall)• Network usage measurement• An ability to find north-south as well as

east-west communication• Light weight visibility compared to SPAN

based traffic analysis• Indications of Compromise (IOC)• Security Group Information

Page 17: TechWiseTV Workshop: Cisco Stealthwatch and ISE

2- Understand Behavior

17

Network

Segmentation

Understand Applications, services and protocol behavior:

during time of day per site from-to critical assets, etc.

Derive normal and abnormal traffic patterns.

Page 18: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Understanding behavior with StealthWatch

18

Full list of all hosts talking with Web Servers:Who, What, When, Where and How

Page 19: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Cisco ISE provides context to Stealthwatch

Cisco ISEMitigation Action

Context Information

Cisco SW

Page 20: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Network as a SensorDemo

Page 21: TechWiseTV Workshop: Cisco Stealthwatch and ISE

3- Design and Model Policy

21

Network

Segmentation

Classify Objects into Security Groups

• Directory server search / group mapping

• Device Profiling (Device type certainty)

• Other attributes: Access Time, Location, Method, etc.

Design Policy

• Leverage group definitions from profiling activities

• Monitor mode deployment

Model Policy with StealthWatch

• Passively model policy

Page 22: TechWiseTV Workshop: Cisco Stealthwatch and ISE

The SGACL enforcement policy

22

BRKCRS-2891

Page 23: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Design and Model PolicyMonitor Mode:

23

Catalyst® Switches (3K/4K/6K)

Users,Endpoints

PCI Server

Production Server

N7K

SRC \ DSTPCI Serv er

(2000)

Prod Serv er

(1000)

Dev Server

(1010)

Employees (100) Permit all Permit all Permit all

PCI User (105) Permit all Permit all Permit all

Unknown (0) Permit all Permit all Permit all

Monitor Mode: Irrespective of authentication status (pass/fail), endpoints gets IP address.

Successful authentication gets specific SGTs and failures will be classified as ‘Unknown’ SGT

CampusNetwork

Monitor Mode

Tagged traffic traverses the network allowing monitoring and validation that:

Assets are correctly classified

Traffic flows to assets are as predicted/expected

Development Server

Page 24: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Policy Enforcement

ISE

Campus

NetworkWAN

• SGACL Policy CoA (Change of Authorization) to push policy change from ISE to appropriate devices

Supported platforms

• Catalyst Switches (See Link Below)

• WLC 8.4

• Nexus 7K (7.2+)

http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/trustsec-platform-matrix.pdf

CoA

Page 25: TechWiseTV Workshop: Cisco Stealthwatch and ISE

4- Enforce Policy

25

Network

Segmentation

Move to active policy enforcement

• Strategic rollout

• Security Group Access Control Lists

• Firewall policy

cts role-based enforcement

cts role-based enforcement vlan-list <VLANs>

For SGT policy enforcement, if switch has to access control

Push and enforce Security policies from ISE

Page 26: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Enforce Policy

26

Catalyst® Switches (3K/4K/6K)

Users,Endpoints

PCI Server

Production Server

N7K

SRC \ DSTPCI Serv er

(2000)

Prod Serv er

(1000)

Dev Server

(1010)

Employees (100) Permit all Permit all Permit all

PCI User (105) Permit all Permit all Permit all

Unknown (0) Permit all Permit all Permit all

When you know you wont disrupt any legitimate access, enable enforcement for real

CampusNetwork

Tagged traffic traverses the network allowing monitoring and validation that:

Assets are correctly classified

Traffic flows to assets are as predicted/expected

Development Server

SRC \ DSTPCI Serv er

(2000)

Prod Serv er

(1000)

Dev Server

(1010)

Employees (100) Deny all Deny all Permit all

PCI User (105) Permit all Permit all Permit all

Unknown (0) Deny all Deny all Permit all

Page 27: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Policy Enforcement

Use Destination SGT received

from Switches connected to

destination

Use Network Object (Host, Range,

Network (subnet), or FQDN)

SGT Defined in the ISE or locally

defined on ASA

Trigger IPS/CX based on

SGT

BRKCRS-2891

Page 28: TechWiseTV Workshop: Cisco Stealthwatch and ISE

5- Active Monitoring

28

Network

SegmentationMonitor Network Activity

• Detect suspicious and malicious activity

• Network Behaviour and Anomaly Detection

• Policy Violations

• Monitor Policy configuration and misconfiguration

• Monitor for business continuity

Adaptive Network Control

• Identify and remediate threats

• Dynamically segment network threats

Page 29: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Segmentation monitoring with Stealthwatch

29

WAN

Rule name and

description

DGTSGT

Trigger on traffic in both directions;

Successful or unsuccessful

Custom event

triggers on traffic

condition

Page 30: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Threat Containment

Page 31: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Using ‘NetFlow’ to detect anomalies

Page 32: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Host

Reputation

Change

Inside Host Potentially

Compromised

Denial of

Service

SYN Half Open; ICMP/UDP/Port

Flood

Stealthwatch can detect

Botnet

Detection

When Inside Host Talks to Outside

C&C Server

Fragmentation

Attack

Host Sending Abnormal # Malformed Fragments

Worm

Propagation

Worm Infected Host Scans, etc.

Large Outbound File Transfer VS.

Baseline

Data

Exfiltration

Network

Scanning

TCP, UDP, Port Scanning Across

Multiple Hosts

Page 33: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Stealthwatch

Endpoint

ConcentratorAnyConnect with

Network Visibility

Module

vzFlow

Attributing a flow to: • Process name• Process hash• Process account• Parent process name• Parent process hash• Parent process account

Extending flow analysis to endpoint process

Stealthwatch Deployment

NEW

Page 34: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Stealthwatch Packet Analyzer

Flow

Collector

Intelligent packet capture to complement flow analysis for added security context

Enterprise

Network

NetFlow

SPAN

Management

Console

Stealthwatch

Packet Analyzer

Flow Analysis

Pa

cke

t A

na

lysis

NEW

Page 35: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Stealthwatch Incident Response

SECURITYEVENTS (94 +)

ALARMCATEGORY RESPONSE

Addr_Scan/tcp

Addr_Scan/udp

Bad_Flag_ACK**

Beaconing Host

Bot Command Control Server

Bot Infected Host - Attempted

Bot Infected Host - Successful

Flow_Denied

.

.

ICMP Flood

.

.

Max Flows Initiated

Max Flows Served

.

Suspect Long Flow

Suspect UDP Activity

SYN Flood

.

Concern

Exfiltration

C&C

Recon

Data Hoarding

Exploitation

DDoS Target

Alarm Table

Host Snapshot

Email

Syslog / SIEM

Mitigation

COLLECT AND

ANALYZE FLOWS

FLOWS

Mitigation

Page 36: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Quarantine from StealthWatch

Page 37: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Integrated Threat Defense (Detection & Containment)

Employee

Employee

Supplier

Quarantine

Shared

Server

Server

High Risk

Segment

Internet

Lancope

StealthWatch

Event: TCP SYN Scan

Source IP: 10.4.51.5

Role: Supplier

Response: Quarantine

ISE

Change Authorization

Quarantine

Network Fabric

Page 38: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Network as an EnforcerDemo

Page 39: TechWiseTV Workshop: Cisco Stealthwatch and ISE

VRF-GUEST

Path selection based on SGT

EnterpriseWAN

Inspection Router

Router / Firewall

Network A

Policy-based

Routing based

on SGT

SGT-based VRF

Selection

User B

Suspicious

Redirect traffic from malware-infected hosts• Contain threats• Pass traffic through centralized analysis

and inspection functions

Security Example

To map different user groups to different WAN service

Other Example

User C

Guest

User A

Employee

Segment traffic to different VRFs based on context

Available Today: Cisco IOS XE Release 3.16S (ASR 1000) as well as ASA5500-X (9.5.1)

Page 40: TechWiseTV Workshop: Cisco Stealthwatch and ISE

FirePOWER Services RedirectCreate service policy to forward

suspicious traffic to FirePOWER services

Page 41: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Rapid Threat Containment

Policy based Routing / QoS Restricted Access for Remediation

pxGrid: QUARANTINE

Malware activity Suspicious Behavior DoS attacks Rogue access

Other partners

Trustsec_Host_SGTQuarantined_Host_SGT

Page 42: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Network as a Sensor and Enforcer Overview

42

Network Sensor

(Stealthwatch)

Campus/DCSwitches/WLC

Cisco Routers / 3rd Vendor Devices

Threat

pxGRID

Network Sensors Network EnforcersPolicy & Context

Sharing

TrustSec

Software-Defined Segmentation

Cisco Collective

SecurityIntelligence

ConfidentialData

NGIPS

pxGRID

ISE

NGFW

Page 43: TechWiseTV Workshop: Cisco Stealthwatch and ISE

Network as a Sensor-Enforcer on CCO:

http://www.cisco.com/c/en/us/solutions/enterprise-networks/enterprise-network-security/net-sensor.html

Cisco ISE Community

http://cs.co/ise-community

Resources

Page 44: TechWiseTV Workshop: Cisco Stealthwatch and ISE