SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE

Similar documents
INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE

Information Security Controls Policy

Simplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to.

Security by Default: Enabling Transformation Through Cyber Resilience

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

Security Secure Information Sharing

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Firewalls, Tunnels, and Network Intrusion Detection

Office 365 Buyers Guide: Best Practices for Securing Office 365

Internet Security: Firewall

External Supplier Control Obligations. Cyber Security

Cloud Security Standards Supplier Survey. Version 1

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

Network Security and Cryptography. 2 September Marking Scheme

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

The Common Controls Framework BY ADOBE

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

INFORMATION ASSURANCE DIRECTORATE

Cryptography and Network Security

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation

INFORMATION ASSURANCE DIRECTORATE

COMPUTER NETWORK SECURITY

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Newer Developments in Firewall Technology. The International Organization for Standardization s Open Systems Interconnect

10 FOCUS AREAS FOR BREACH PREVENTION

Cloud Security Standards

Verizon Software Defined Perimeter (SDP).

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

CSC Network Security

Indicate whether the statement is true or false.

Future-ready security for small and mid-size enterprises

Information Technology Security Guideline. Network Security Zoning

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Enterprise D/DoS Mitigation Solution offering

Security

GUIDE. MetaDefender Kiosk Deployment Guide

Securing trust in electronic supply chains

Cyber Security Requirements for Supply Chain. June 17, 2015

TEL2813/IS2621 Security Management

CDSE Workshop. CDS Concepts and Definitions. Elaine M. Caddick Principal Cybersecurity Engineer 19 July 2016

INFORMATION ASSURANCE DIRECTORATE

MESSAGING SECURITY GATEWAY. Solution overview

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Chapter 9. Firewalls

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Features. HDX WAN optimization. QoS

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Digital Health Cyber Security Centre

GDPR Update and ENISA guidelines

Product Security Briefing

Cyber Security Technologies

General Framework for Secure IoT Systems

Certification Report

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic.

Logicalis What we do

Real-time Communications Security and SDN

White paper: System security in a safety critical context

Information Security Specialist. IPS effectiveness

NIS Standardisation ENISA view

The provision of Calling Line Identification facilities and other related services over Electronic Communications Networks

CIS Controls Measures and Metrics for Version 7

20-CS Cyber Defense Overview Fall, Network Basics

DIGITAL TRUST Making digital work by making digital secure

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

The Honest Advantage

Cloud Security Standards and Guidelines

Summary of Cyber Security Issues in the Electric Power Sector

Application Firewalls

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

CIS Controls Measures and Metrics for Version 7

PCI DSS and VNC Connect

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

Mobility, Security Concerns, and Avoidance

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

NEN The Education Network

Snort: The World s Most Widely Deployed IPS Technology

Corporate Information Security Policy

Cloud Security: Constant Innovation

Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps

Industrial Control System Security white paper

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

AUTHORITY FOR ELECTRICITY REGULATION

Network Defenses 21 JANUARY KAMI VANIEA 1

NGN: Carriers and Vendors Must Take Security Seriously

New Zealand Government IBM Infrastructure as a Service

IC32E - Pre-Instructional Survey

Use this section to help you quickly locate a command.

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

A practical guide to IT security

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

CyberP3i Course Module Series

Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall

Firewalls for Secure Unified Communications

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

Transcription:

SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED

CONTENTS 3 4 5 6 8 9 10 11 12 14 15 16 INTRODUCTION THREATS RISK MITIGATION REFERENCE ARCHITECTURE TRANSFORM FLOW CONTROL VALIDATE POLICY MANAGEMENT DEPLOYMENT SUMMARY GLOSSARY ABOUT NEXOR Version 1.0 published August 2013 Version 1.1 published September 2015 Version 1.2 published May 2017 SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 2

INTRODUCTION In today s world, information sharing is key to improved productivity, efficient and accurate decision making and effective collaboration. Information is exchanged both within and between public and private sector organisations, sometimes across international boundaries. Often the networks sharing the information are owned and managed by different entities and so the data is also crossing a trust boundary. Some examples of information exchange in this context are: Defence and Intelligence environments sharing situational awareness information between coalition forces to maintain a timely and accurate common operating picture; Government Departments and Agencies exchanging information internally at different security classifications, or alternatively making information open to the public and receiving data from the public; Critical National Infrastructure providers sharing key management data from the process control systems to enable effective reporting and management of those systems. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 3

THREATS Sharing data across different networks opens up the possibility of attacks on key critical assets. There are threats of both malicious inbound data with the aim of compromising the protected network and outbound data leaking sensitive information. As shown in Figure 1, communication between systems occurs at multiple logical layers. The OSI model defines seven layers; the Internet model simplifies this to four levels. These logical layers include low level device negotiation in a single local network; internet protocols used to cross network boundaries; transport protocols to get data from host to host; and application protocols to share data between applications. Above the application protocols, there is the information layer where the actual content is being shared. Figure 1 ABSTRACTION LAYERS FOR NETWORKED COMMUNICATIONS OSI 7 Layer model APPLICATION PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICAL Internet TCP/IP model APPLICATION TRANSPORT INTERNET LINK Attacks can and will happen at one or all of these logical layers and so protecting the data transfer can be a complex problem to solve. Although the underlying logical layers change little, the variety of different transport and application mechanisms (from file sharing to web, email, chat and streaming media) and of formats of the actual information to be shared (from text, to complex document formats such as PDF and Microsoft Office) make the problem even harder. Given the complexity of the data transfer and the willingness of adversaries to compromise the confidentiality, integrity and availability of the data, attacks will happen. The risk to the organisations sharing the data will vary depending on the networks involved and the likely resources of the attackers. Traditional controls such as network firewalls have a role to play in solutions to counter the threat, but on their own cannot counter the attacks at all of the logical communications layers. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 4

RISK MITIGATION As is the case with all risk management, there is a need to put in the appropriate controls to mitigate that risk. In low threat environments where the impact of a data loss may not be great, commercial off the shelf (COTS) products that handle all data transfers within a single product may be acceptable. In higher threat environments where attacker resources are likely to be greater and the impact of loss is high, a one size fits all solution is unlikely to be adequate. Instead, multiple solutions are required to be able to focus the effort on each data transfer in a specialised way. This has to be balanced by the need for cost effective solutions. There is therefore a need to be able to re-use solution architectures and to plug in specific mechanisms as appropriate. In this way, it is possible to react to new threat types by introducing new and updated components whilst maintaining a base of approved, secure components. The key point about building solutions is to understand the problem to be solved and then to design a solution to that problem. This paper provides a high level overview of an architecture used by Nexor when designing and implementing solutions. The architecture describes the components and their role in enabling secure information exchange between domains helping to break down solutions into manageable and assurable elements. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 5

REFERENCE ARCHITECTURE OVERVIEW This section introduces the Secure Information Exchange Reference Architecture. The Reference Architecture identifies the key components of a solution and defines their functionality. The architecture is product and vendor independent. As described earlier, sharing of information is necessary to improve collaboration and ensure efficient and accurate decision making. This needs to be balanced against the threat to organisations from communicating with the outside world. A secure information exchange solution needs to be dynamic with the ability to respond to new and emerging threats. A modular solution allows for incremental improvements to be made over time. Figure 2 HIGH LEVEL SECURE INFORMATION EXCHANGE REFERENCE ARCHITECTURE POLICY MANAGEMENT UNTRUSTED TRUSTED CAPTURE TRANSFORM FLOW CONTROL VALIDATE DELIVER The components described here are the key elements to mitigate the threat of the sensitive data leakage or malicious import of data. CAPTURE - receive or collect the data from the sending network. Often a filestore or a network proxy (serverside). TRANSFORM - modify the content or protocol for interoperability or security purposes. Sometimes referred to as a gateway. VALIDATE - ensure the content (and in some cases protocol) conform to the security policy. Sometimes referred to as a guard. DELIVER - make the data available for using in the recipient network. Often a filestore or a network proxy (client-side). We will look at the Transform, Flow Control and Validate components in more detail shortly. FLOW CONTROL - ensure data only flows in the direction required to support the business process. Often delivered by a firewall (two-way data flow) or a data diode (one-way data flow). SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 6

REFERENCE ARCHITECTURE OVERVIEW CONT. The architecture described can be used for import of data, export of data and bi-directional transfer. Import Import is getting data from a less trusted network to a trusted network. When importing data, the risk is predominantly of malicious import of data that could compromise the trusted network. Functions of the Transform and Validate components can minimise this risk. The Flow Control component can ensure that data is only imported. As for Import, functions in the Transform and Validate components can minimise this risk with the Flow Control component ensuring data is not imported. Bi-directional Where two-way transfer of information is required, both of the above risks are present and the same controls can be put in place to minimise these risks. In this case, the architecture can be used to implement two separate paths, one for the import and one for the export of data. Export Export is getting data out of the trusted network. When exporting data, the risk is of losing sensitive data or data that has not been authorised for release out of the trusted network. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 7

TRANSFORM The Transform component is used to change the format of the data and potentially the actual information. Examples include transformation of emails from SMTP to X.400; transformation of documents from Microsoft Word to PDF; and translation of security labels from UK format to US format. Normalisation Transformation of data from one format to a different format can be useful to aid interoperability, but also can be useful in the overall reduction of malware by: Reducing the number of different types of data that the Validate component has to verify; Reducing the complexity of the data that the Validate component has to verify; Removing malware during the transition between the formats by only taking the relevant data and leaving behind potential malware hidden in unused areas of the format. Sanitisation This is the cleansing of data to remove parts of the data that could contain either hidden data or malicious content. When data is being imported into a domain, there is a risk of malicious code being brought in. When data is being exported from a domain, there is a risk of accidental or intended information leakage. Sanitisation of the data can be used to: Remove data that is hidden within the format. This may have been accidentally left in (for example Tracked Changes in Microsoft Word) or a deliberate attempt to hide information from manual inspection (for example sending white text on a white background or hiding text behind an image in a document); Modify data that is deemed to be sensitive to something that is benign; Remove data that is or could potentially be considered malware. One way of sanitising data is to use regeneration. Regeneration This is rebuilding of the data into the same format that it started. Regeneration works by, first, breaking the data up into its constituent parts according to the format s structure. Once this is done, it is possible to determine which sections of the content conform and which do not conform to a given policy. Finally, the data is regenerated by taking the conformant data and placing it in a completely new version of the same format. The reason for doing this is to take only the known good parts of the data and leave behind potential malware hidden in the format. Protocol Break By modifying the data either at a transport layer or higher application layer, the gateway is effectively acting as a protocol break which can disrupt certain protocol-level attacks. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 8

FLOW CONTROL The Flow Control component ensures that data is travelling in the direction that it is intended to (data import or export) and helps prevent covert channels. The Flow Control component reduces the attack surface on components further down the line by reducing the ability for unauthorised data transfer to those components. When a component is compromised, it is common for malware to try to communicate back to a control centre in order to allow remote control of the malware. The Flow Control component will reduce or remove the ability for any communication from malicious software back to such a control centre. Protocol Break Flow Control can be provided by traditional components such as network firewalls and also by data diodes which can enforce an assured one-way flow. In order to use a data diode, it will be necessary to provide proxies to manage any two-way protocol interactions (e.g. TCP). A data diode proxy listens for a given transport protocol and extracts the encapsulated data. This data is passed over the diode using a one-way protocol. The two-way protocol is then re-established on a proxy on the other side of the data diode. This protocol break at the transport layer means that attacks hidden inside the transport protocol are removed. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 9

VALIDATE The Validate component, or Guard, ensures that the data being transferred conforms to a specified security policy. The Guard reduces the risk of malware getting into a network; of sensitive data leaking out; and ensures that appropriate controls are in place for the data to be released between the networks. In order to do this, the Guard has to be able to provide detailed inspection of the data being transferred. The checks that a Guard could perform can be split into three categories: Format checks; Syntax checks; Semantic checks. Format Checks Data can claim to be of a given format in different ways, from the extension of a filename to parameters in encapsulating data (e.g. MIME types in an email). Format checks will verify that the data conforms to the format that it claims or appears to be. The type that the data claims to be is important since this will determine the end application that opens and renders it. Data can masquerade as different types to fool an end application into opening it. The format checks need to be designed to ensure that the end applications get the data that they can safely open. In order to achieve this, the end applications need to be known and thus they need to form an integral part of the overall secure information exchange solution. Syntax Checks In most scenarios, the checks need to go beyond verifying that the data is of the type it claims to be. Additional checks should validate that the data conforms to the configured security policy so that an administrator can ban fields or portions of data formats that could potentially carry threats such as malware or hidden data leakage. Equally, checks should ensure that all mandatory fields are present to ensure that end applications processing the data have everything that they expect. Semantic Policy Checks Knowing that the data is of a format that is acceptable and that the data conforms to a specified schema for that format will reduce the risk of incorrectly or maliciously formatted data from compromising applications in the destination system. In addition to this, Semantic checks ensure that the information transferred in the data conforms to the policy defined. Semantic checks ensure that the content of the data whilst valid structurally, is also allowed. Examples of these types of checks are prohibited word checking, security label checks, and release authority decisions. Complexity versus Assurance In order to get a high degree of confidence that the Guard can perform these detailed checks, it is advisable to limit the degree of complexity of the data being transferred through the Guard. In this way, the checks can still be comprehensive, but are simpler to evaluate. The Transform component, or Gateway, described earlier can be used to transform more complex data into something that can be guarded with high assurance. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 10

POLICY MANAGEMENT Applying a consistent policy across the Secure Information Exchange Architecture is key to ensuring that identified threats are mitigated and that emerging threats can be dealt with effectively. Each component in the architecture requires management to ensure that it is able to enforce the latest policy and is able to report on its current status. Dynamic and Fine Grained Policies For effective Secure Information Exchange, the ability to react to new threats is critical. It must, therefore, be possible to modify the policy dynamically. It is also important that the policy is fine grained so that changes can address specific issues. For example, being able to prevent the transfer of specific font types in a PDF document rather than banning all document transfer. Reporting Policy management is a process of continuous risk assessment. In order to be able to do this, information about the system needs to be available for review. Logging and alerts should be extracted from the components using standard formats such as SNMP and syslog for inclusion in system wide tools providing a consolidated view of the data transfer. It is important to get the volume of data right, too much and it is not possible to find key events, too little and there is an oversimplified view of the status. Management Threat The addition of system management as a requirement for Secure Information Exchange can add new threats to the overall architecture. Mixing the management traffic and the data traffic can allow for one to interfere with the other either accidentally or by deliberate actions. It is possible to compromise any management domain by sending it data that is processed during the information exchange. Compromise of a management domain can then provide new access for attackers to other systems. Additionally, by linking multiple components of an Information Exchange System to a single management domain, it is possible to set up routes to bypass the controls put in place by those components. Having secure connections to the components, use of multi-factor authentication and provision for segregation between management and data traffic, and between components and the management domain can help to mitigate these additional threats. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 11

DEPLOYMENT The modular nature of the Secure Information Exchange Architecture allows for the implementation of multiple products potentially from different vendors and using different operating systems to provide defence in depth. Compromise of any one component of the system will not necessarily lead to compromise of the next. Depending on the assurance requirements, individual components of the architecture may be deployed in multiple ways or even omitted. Co-located By combining components of the architecture together on the same operating system, a small footprint solution can be achieved. The downside of this is that a compromise in one of the components could affect others running on the same operating system. Figure 3 COMPONENTS RUNNING TOGETHER ON THE SAME OPERATING SYSTEM AND SAME PHYSICAL HARDWARE TRANSFORM / FLOW CONTROL FLOW CONTROL / VALIDATE / TRANSFORM SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 12

DEPLOYMENT CONT. Hypervisor Separated By placing individual components inside their own virtual machine, an additional layer of separation can be achieved whilst maintaining the smaller footprint solution. The security and separation properties of the hypervisor will help to determine if this is an acceptable approach. As for the co-located approach, any vulnerabilities in the hardware platform can be used to exploit multiple components. Figure 4 COMPONENTS RUNNING IN THEIR OWN OPERATING SYSTEM SEPARATED BY A HYPERVISOR BUT ON SHARED PHYSICAL HARDWARE Hypervisor Hypervisor TRANSFORM FLOW CONTROL FLOW CONTROL VALIDATE TRANSFORM Physically Separated For higher assurance environments, it may be appropriate to have complete separation up to and including the hardware. Whilst this increases the assurance, it will also increase the footprint of the solution. Figure 5 COMPONENTS RUNNING IN THEIR OWN OPERATING SYSTEM AND ALSO THEIR OWN PHYSICAL HARDWARE TRANSFORM FLOW CONTROL FLOW CONTROL VALIDATE TRANSFORM SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 13

SUMMARY Organisations in Defence, Intelligence, Government, and Critical National Infrastructure have an ever increasing need to share information whilst maintaining the security of their own networks. Attacks on these networks are becoming more prevalent and sophisticated using advanced techniques to hide inside the content being transferred. Secure methods of transferring valid content need to be employed to counter this threat and a common approach to sharing data will allow products from multiple vendors to provide secure information exchange solutions. This white paper describes a high level architecture that can support Secure Information Exchange. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 14

GLOSSARY Attack Surface COTS Covert Channel Data Diode Firewall Hypervisor IETF ITU-T OSI Malware PDF Protocol Break SMTP SNMP Syslog X.400 The parts of a system that are available for an unauthorised user to access. Commercial Off The Shelf A way of transferring information that is not legitimate A type of product that ensures data can only flow in a single direction A type of product that controls incoming and outgoing network traffic A type of product that runs and manages one or more virtual machines Internet Engineering Task Force International Telecommunications Union Telecommunications Standardisation Sector Open Systems Interconnection Malicious software designed to compromise the confidentiality, integrity or availability of a system Portable Document Format A method of preventing protocol level attacks by terminating a protocol and carrying the encapsulated data using a different protocol Simple Mail Transfer Protocol Simple Network Management Protocol An IETF standard for data logging Set of ITU-T standards for message handling systems. SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 15

ABOUT NEXOR Nexor has a rich history of deploying Secure Information Exchange solutions that support mission critical systems. With our heritage in research we continue to innovate and apply this approach to creating solutions to meet our customers specific requirements. Our innovative Secure Information Exchange solutions have created competitive advantage for our customers and on several occasions Nexor has created a solution that proves to be a technological first. Our solutions are based on our industry-leading SIXA technology portfolio, which has a modular architectural design that offers both security and flexibility. Combined with our technology integration and software engineering capabilities, this ensures that we can provide solutions to an extensive set of Secure Information Exchange scenarios. Underlying our creativity is a value set that encompasses our commitment to customer service, communication and continuous improvement. We believe in doing things properly, which is why our customers have such high levels of confidence in our trustworthy Secure Information Exchange solutions. CONTACT DETAILS Nexor Limited, 8 The Triangle, Enterprise Way ng2 Business Park, Nottingham, NG2 1AE, UK +44 (0)115 952 0500 info@nexor.com www.nexor.com SECURE INFORMATION EXCHANGE: REFERENCE ARCHITECTURE 16 WP-0063-0517