So.ware Defined Perimeter Internet- scale Security for the Internet2 Community. Junaid Islam Co- Chair SDP Workgroup Cloud Security Alliance

Similar documents
Software Defined Perimeter & PrecisionAccess. Secure. Simple.

Defeating All Man-in-the-Middle Attacks

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

PrecisionAccess Trusted Access Control

Building a More Secure Cloud Architecture

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Vidder PrecisionAccess

TLS 1.1 Security fixes and TLS extensions RFC4346

32c3. December 28, Nick goto fail;

TLS1.2 IS DEAD BE READY FOR TLS1.3

ADC im Cloud - Zeitalter


F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Verifying Real-World Security Protocols from finding attacks to proving security theorems

Introduction. The Safe-T Solution

Make Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks)

DenyAll Protect. accelerating. Web Application & Services Firewalls. your applications. DenyAll Protect

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

Attacks on SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dez. 6th, 2016

Verizon Software Defined Perimeter (SDP).

SSL/TLS: Still Alive? Pascal Junod // HEIG-VD

Identiteettien hallinta ja sovellusturvallisuus. Timo Lohenoja, CISPP Systems Engineer, F5 Networks

SECURE YOUR APPLICATIONS, SIMPLIFY AUTHENTICATION AND CONSOLIDATE YOUR INFRASTRUCTURE

SAP Security in a Hybrid World. Kiran Kola

Exposing The Misuse of The Foundation of Online Security

Are You Flirting with Risk?

Magento Commerce Architecture and Security Model Last updated: Aug 2017

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Attacks Against Websites 3 The OWASP Top 10. Tom Chothia Computer Security, Lecture 14

Lessons from the Human Immune System Gavin Hill, Director Threat Intelligence

O365 Solutions. Three Phase Approach. Page 1 34

App Gateway Deployment Guide

Segmentation for Security

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Topics. Ensuring Security on Mobile Devices

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

En partenariat avec CA Technologies. Genève, Hôtel Warwick,

Are You Flirting with Risk?

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Next Generation Authentication

Jordan Levesque - Keeping your Business Secure

SECURE YOUR INTEGRATIONS. Maarten Smeets

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

SSL Report: ( )

Cloud Security Myths Paul Mazzucco, Chief Security Officer

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Keep the Door Open for Users and Closed to Hackers

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Aerohive and IntelliGO End-to-End Security for devices on your network

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Who s Protecting Your Keys? August 2018

War Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert

Curso: Ethical Hacking and Countermeasures

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Coming of Age: A Longitudinal Study of TLS Deployment

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Configuring OpenVPN on pfsense

Business White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise

Security Improvements on Cast Iron

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

Copyright

Crypto meets Web Security: Certificates and SSL/TLS

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

Novell Access Manager 3.1

IEEE Sec Dev Conference

Endpoint Security - what-if analysis 1

Security for the Cloud Era

CIS 5373 Systems Security

Designing an Enterprise GIS Security Strategy

Centrify Identity Services for AWS

BIG-IP V11.3: PRODUCT UPDATE. David Perodin Field Systems Engineer III

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

Don t blink or how to create secure software. Bozhidar Bozhanov, LogSentinel

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Security

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

Jordan Levesque Making sure your business is PCI compliant

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

Why bother? Causes of data breaches OWASP. Top ten attacks. Now what? Do it yourself Questions?

Yubico with Centrify for Mac - Deployment Guide

Dyadic Security Enterprise Key Management

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young

Minfy MS Workloads Use Case

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

SSL/TLS Security Assessment of e-vo.ru

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

Transcription:

So.ware Defined Perimeter Internet- scale Security for the Internet2 Community Junaid Islam Co- Chair SDP Workgroup Cloud Security Alliance

The challenge: How do you secure an open network? 2

Solution Requirements for Internet2 Open Large Experimental No secrets Highly scalable Any infrastructure 3

Current Perimeter Security Model Here is the app server Who you are Please verify your identity Connect to Application Denial of Service Provide Credentials Creden0al The3 Server Exploita0on Multifactor Token Connec0on Hijacking APT/Lateral Movement 4

Software Defined Perimeter Connect to ApplicaAon Provide CredenAals MulAfactor Token 5

Software Defined Perimeter Security Model Tell me who you are Multifactor Token Let s check your status Here is the app server Provide Credentials Connect to Application 6

SDP Changes The Connection Model for the Internet TCP/IP still works as normal BUT connections are only established with known devices/users IP servers are black as there is no DNS or open ports to allow cyber attackers to find and connect to servers SDP supports SAML federation and can be scaled up leveraging public clouds to stop network attacks 7

SDP Architecture 0. One Ame on- boarding Client root of trust Digital arafacts & thin client 1. Device AuthenAcaAon & AuthorizaAon SPA: ana DDoS, defeats SSL awacks mtls & fingerprint: ana credenaal they 2. User AuthenAcaAon & AuthorizaAon Enterprise idenaty: separaaon of trust SAML IdP integrated with LDAP groups 3. Dynamically Provisioned ConnecAons ApplicaAons isolated and protected Usability: portal page of applicaaons Gateway Client Crypto IP s SDP Controller 3. Dynamic Connec;on SDP Gateways Enterprise IdP Hos;ng & IaaS SDP 3. Dynamic Connec;on DMZ & Data Center 8

Key SDP Features 64 bit id is not secret (can be listed) SPA can carry payload for Auto/IoT applications Attacks can be detected in the first packet 9

10 SDP Provides Real Time Threat Detection

Attacks on SSL/TLS Name Date AEack SDP Mi;ga;on SSLstrip Feb 2009 hwp to hwps No hwp DigiNotar Sept 2011 MitM forged certs Pinned certs BEAST Apr 2012 Java Applet oracle Client- based CRIME Sept 2012 MitM SPDY compressing oracle No compression Lucky 13 Feb 2013 MitM CBC padding oracle GCM TIME Mar 2013 Browser JavaScript Aming oracle Client- based RC4 biases Mar 2013 MitM RC4 oracle No cypher negoaaaon BREACH Aug 2013 Website redirect, compression No redirect or compression Triple Handshake Mar 2014 Server MitM on client cert Pinned dedicated cert Heartbleed Apr 2014 OpenSSL bug Not single- ended SSL BERserk Sept 2014 MitM PKCS#1.5 padding Not Mozilla NSS Poodle Oct 2014 MitM SSLv3 oracle No cypher negoaaaon Poodle++ Dec 2014 MitM JavaScript Aming oracle Client- based FREAK Mar 2015 MitM negoaaaon 512 bit key No key negoaaaon Bar- mitzvah Mar 2015 View RC4 No RC4 logjam May 2015 MitM downgrade to 512 bit key No suite negoaaaon 11

Attacks Defea;ng on Enterprises Server exploitaaon MisconfiguraAons VulnerabiliAes InjecAons Denial of Service CredenAal they Phishing Key loggers Brute force ConnecAon hijacking Man- in- the- Middle CerAficate forgery DNS poisoning : constant awacks 500 digital ceraficates were forged from this Dutch ceraficate authority. The real- word effect of this awack is sall unknown. InjecAon awack on the web admin interface resulted in the public dumping of PII of 60K government workers. Turk Telekom was ordered to hijack Google s DNS servers at IP address 8.8.8.8 by the Turkish government. As a result of a spear phishing awack on Melbourne IT, the website of The New York Times was unavailable for two days. SQL InjecAon on a public website used to gain access to a database of 150K customer password hashes. Heartbleed enabled awackers to VPN into CHS and steal 4.5M paaent records. A Russian cyber gang acquired 4.5B stolen credenaals, cracked many of the passwords, and posted them online. A phishing awack on an employee of the South Carolina Dept. of Revenue and the resultant credenaal they resulted in the loss of 75GB of data. Chinese awackers performed a massive man- in- the- middle awack on U.S. ISPs stealing unknown amounts of emails and passwords. 12

Defeating Attacks on the Extended Enterprise Server Isola;on SPA, Dynamic FW Transparent MFA mtls, Fingerprint Encryp;on, Pinned Certs, No DNS Server exploitation: constant attacks Misconfigurations Vulnerabilities Injections Denial of Service Credential theft: ⅔ of Verizon DBIR Phishing Keyloggers Brute force Connection hijacking: stealthiest Man-in-the-Middle Certificate forgery DNS poisoning User name Password 13

Global Beverage Company Business Objec;ve: Minimize operaaonal costs and maximize flexibility SDP Solu;on: ü Secures partner employee access to the required apps ü Protects against DDOS and server vulnerability awacks ü Brings visibility into which individuals are accessing which applicaaons, from where, and when ü MiAgates credenaal they and eases password management with transparent MFA ü Delivers a single soluaon for both web- based and fat applicaaons SDP Controller AWS ERP Apps (SAP) SDP Gateway Browser Data Center Supply Chain Partners 14

Chip Design Company Business Objec;ve: Accelerate chip design process by leveraging public clouds SDP Solu;on: ü Secures design engineers access to cloud- based environment at customer sites ü Single tenant SDP federates to each IAM ü Customer VPC enclaves not reachable from Internet ü Flexible SDP deployment enables dynamic customer use SDP Controller AWS VPC Enclave C VPC Enclave B Browser App App SDP Gateway Company B Company A VPC Enclave A Company C 15

Global Automotive Company Business Objec;ve: Enable in field vehicle upgrades to retain customers and "sell" new features SDP Solu;on: ü Vehicle status delivered in a single SPA packet ü Provides a common access plaoorm for apps regardless of where they are deployed: in internal data center or (mulaple) cloud sites ü OpAmizes packet path to opamize user experience SDP Controller AWS SDP Gateway SDP Gateway 16

Closing comments SDP is really simple SDP supports a wide range of applications 17