Avr presentation

39
Application Visibility and Risk Report for Ekamai International School

description

 

Transcript of Avr presentation

Page 1: Avr   presentation

Application Visibility and Risk Report for Ekamai International School

Page 2: Avr   presentation

INSTRUCTIONS TO SEs (Please delete)

Factory Reset box and upgrade to latest version of PAN-OS before starting AVR

Turn on all Threat Prevention / URL Filtering / Data Filtering / Wildfire

Make sure tapped zone has interesting data – User Zones

Make sure there’s data in all logs / ACC before leaving customer site

Run no more than 3-5 days of data collection

Download Raw Logs from monitor tab for further analysis

Fix presentation date to key stakeholders the following week of the AVR data collection

2 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 3: Avr   presentation

Agenda

How was the AVR captured ?

Summary applications found

Business Risks Introduced by High Risk Application Traffic

Top Applications (Bandwidth)

Applications that use HTTP (Port 80)

Top URL Categories

Top Threats

Recommendations

3 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 4: Avr   presentation

How was the AVR captured ?

Port Mirror

Non-Intrusive

Data Gathering 3-5 days

Report Generation

Report contains no IP information, purely statistic data collection

4 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 5: Avr   presentation

How was the AVR captured ?

5 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 6: Avr   presentation

Summary Of Applications Found

Personal applications are being installed and used Elevates business and security risks

Applications that can be used to conceal activity Hides activity that can be malicious (intended or unintended)

Applications that can lead to data loss Security risks, data loss, compliance and copyright infringements

Applications for personal communications Productivity loss, compliance and business continuity loss

Bandwidth hogging, time consuming applications Consumes corporate bandwidth and employee time

6 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 7: Avr   presentation

Business Risks Introduced by High Risk Application Traffic

7 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 8: Avr   presentation

Business Risks Introduced by High Risk Application Traffic

Data Loss (24%) - application file transfer can lead to data leakage

Compliance (24%) - ability to evade detection or tunnel other applications can lead to compliance risks

Operational Cost (12%) - high bandwidth consumption equates to increased costs

Productivity (18%) - social networking and media apps can lead to low productivity

Business Continuity (23%) - applications that are prone to malware or vulnerabilities can introduce business continuity risks.

“Identifying the risks an application poses to is the first step towards effectively managing the related business risks.”

8 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 9: Avr   presentation

High Risk Application Traffic – Key Observations

Key observations on the 85 high risk applications:

Activity Concealment:

Proxy (1) and remote access (3) applications were found. In addition, non-VPN related encrypted tunnel applications were detected.IT savvy employees are using these applications with increasing frequency to conceal activity and in so doing, can expose EIS tocompliance and data loss risks.

File transfer/data loss/copyright infringement:

P2P applications (12) and browser-based file sharing applications (6) were found. These applications expose EIS to data loss,possible copyright infringement, compliance risks and can act as a threat vector.

Personal communications:

A variety of applications that are commonly used for personal communications were found including instant messaging (8), webmail(6), and VoIP/video (3) conferencing. These types of applications expose EIS to possible productivity loss, compliance and business continuity risks.

Bandwidth hogging:

Applications that are known to consume excessive bandwidth including photo/video (14), audio (1) and social networking (11) were detected. These types of applications represent an employee productivity drain and can consume excessive amounts of bandwidth and can act as potential threat vectors.

9 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 10: Avr   presentation

Activity Concealment – Compliance, Data Loss Risks

10 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 11: Avr   presentation

ACC – Concealment (Example : tor)

11 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 12: Avr   presentation

File Transfer / Data Loss / Copyright Infringement- Data Loss, Copyright Infringement, Compliance Risks

12 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 13: Avr   presentation

ACC – Concealment (Example : bittorrent)

13 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 14: Avr   presentation

Personal Communications – Productivity Loss, Compliance, Business Continuity Risks

14 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 15: Avr   presentation

Personal Communications – (Example : Gmail)

15 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 16: Avr   presentation

Bandwidth Hogging – Productivity Loss Risks

16 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 17: Avr   presentation

Bandwidth Hogging – (Example : rtmp)

17 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 18: Avr   presentation

Bandwidth Hogging – (Example : youtube-base)

18 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 19: Avr   presentation

Top 35 Applications (Bandwidth Consumption)

19 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 20: Avr   presentation

Applications that use HTTP

20 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 21: Avr   presentation

Top URL Categories

21 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 22: Avr   presentation

URL Sites (example : Social Networking)

22 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 23: Avr   presentation

Top Application Vulnerabilities

23 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 24: Avr   presentation

Vulnerability ( SMB: User password Brute-Force Attempt )

Research from Internet – Google, Yahoo, Ect

24 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 25: Avr   presentation

Extract from ACC

Vulnerability ( SMB: User password Brute-Force Attempt )

25 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 26: Avr   presentation

Spywares and Virus discovered

26 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 27: Avr   presentation

Spyware and Virus ( Conficker )

27 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 28: Avr   presentation

Extract from ACC

Spyware and Virus ( Conficker )

28 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 29: Avr   presentation

APT / Zero Day Malware Detected by WildFire

29 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 30: Avr   presentation

APT / Zero Day Malware Detected by WildFire

30 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 31: Avr   presentation

WildFire Malware Analysis

31 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 32: Avr   presentation

WildFire Malware Analysis

32 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 33: Avr   presentation

WildFire Malware Analysis

33 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 34: Avr   presentation

WildFire Malware Analysis

34 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 35: Avr   presentation

WildFire Malware Analysis

35 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 36: Avr   presentation
Page 37: Avr   presentation
Page 38: Avr   presentation

Recommendations

Implement safe application enablement policies

Address high risk areas such as P2P and browser-based filesharing

Implement policies dictating use of activity concealment applications

Regain control over streaming media applications

Seek Application Visibility and Control

38 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 39: Avr   presentation

Thank You