How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The...

40
Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist April 2018 How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

Transcript of How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The...

Page 1: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Nikos Mourtzinos, CCIE #9763

Cisco Cyber Security Sales Specialist

April 2018

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

Page 2: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

New threat landscape

38%

62%

Organizations are at risk

Decrypt Do not decrypt

New attack vectors• Employees browsing over HTTPS: Malware infection, covert channel with command and control server, data

exfiltration • Employees on internal network connecting to DMZ servers: Lateral propagation of encrypted threats

cannot detect malicious content in

encrypted traffic

of attackers used encryption to evade

detection

of organizations have been victims of a

cyber attack

41%81% 64%

Source: Ponemon Report, 2016

Page 3: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Security Architecture

1. Firepower

1. FMC Management,

Reporting,

Analytics

1. Firepower

Page 4: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Security Architecture

1. Firepower

1. FMC Management,

Reporting,

Analytics

1. Firepower

Perimeter

VisibilitySSL Decryption

Automated NGIPS

AMP - SandboxingIndication of Compromise

Correlation

Page 5: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

IPS configuration

• Security Specialist to know customer environment

• Write down all vulnerabilities

• Configure

• Select 10.000 IPS signatures out of 50.000+ available

• Achieve high security effectiveness to block attacks

Page 6: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

September 2017 – Kick offMon Tue Wed Thu Fri Sat Sun

28 29 30 31 1

Kick-off

2 3

4 5 6 7 8 9 10

11 12 13 14 15 16 17

18 19 20 21 22 23 24

25 26 27 28 29 30

Page 7: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

September 2017 – Know the environmentMon Tue Wed Thu Fri Sat Sun

28 29 30 31 1

Kick-off

2 3

4 5 6 7 8 9 10

11 12 13 14 15 16 17

18 19 20 21 22 23 24

25 26 27 28 29 30

Page 8: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

September 2017 – Locate VulnerabilitiesMon Tue Wed Thu Fri Sat Sun

28 29 30 31 1

Kick-off

2 3

4 5 6 7 8 9 10

11 12 13 14 15 16 17

18 19 20 21 22 23 24

25 26 27 28 29 30

Page 9: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

September 2017 – Select SignaturesMon Tue Wed Thu Fri Sat Sun

28 29 30 31 1

Kick-off

2 3

4 5 6 7 8 9 10

11 12 13 14 15 16 17

18 19 20 21 22 23 24

25 26 27 28 29 30

Page 10: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

September 2017 – Configure Hardware & SoftwareMon Tue Wed Thu Fri Sat Sun

28 29 30 31 1

Kick-off

2 3

4 5 6 7 8 9 10

11 12 13 14 15 16 17

18 19 20 21 22 23 24

25 26 27 28 29 30

Page 11: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

IPS Tuning

100

80

60

40

20

0Security Effectiveness

Without Automated Tuning

Time

Page 12: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

January

Su Mo Tu We Th Fr Sa

1 2 3 4 5 6 7

8 9 10 11 12 13 14

15 16 17 18 19 20 21

22 23 24 25 26 27 28

29 30 31

February

Su Mo Tu We Th Fr Sa

1 2 3 4

5 6 7 8 9 10 11

12 13 14 15 16 17 18

19 20 21 22 23 24 25

26 27 28

March

Su Mo Tu We Th Fr Sa

1 2 3 4

5 6 7 8 9 10 11

12 13 14 15 16 17 18

19 20 21 22 23 24 25

26 27 28 29 30 31

April

Su Mo Tu We Th Fr Sa

1

2 3 4 5 6 7 8

9 10 11 12 13 14 15

16 17 18 19 20 21 22

23 24 25 26 27 28 29

30

May

Su Mo Tu We Th Fr Sa

1 2 3 4 5 6

7 8 9 10 11 12 13

14 15 16 17 18 19 20

21 22 23 24 25 26 27

28 29 30 31

June

Su Mo Tu We Th Fr Sa

1 2 3

4 5 6 7 8 9 10

11 12 13 14 15 16 17

18 19 20 21 22 23 24

25 26 27 28 29 30

July

Su Mo Tu We Th Fr Sa

1

2 3 4 5 6 7 8

9 10 11 12 13 14 15

16 17 18 19 20 21 22

23 24 25 26 27 28 29

30 31

August

Su Mo Tu We Th Fr Sa

1 2 3 4 5

6 7 8 9 10 11 12

13 14 15 16 17 18 19

20 21 22 23 24 25 26

27 28 29 30 31

Environment Changes !

Page 13: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

IPS Tuning is required !!!!

Complex Operations & Increases Costs

NSS IPS Test Key Findings:

Protection varied widely between 31% and 99,5%.

Tuning is required, and is most important for remote attacks against servers

and their applications.

Page 14: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

IPS Tuning

100

80

60

40

20

0Security Effectiveness

Without Automated Tuning

Time

Organizations that do not tune could be missing numerous

“catchable” attacks.

Page 15: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Adjust IPS policies automatically

based on network changes

Automated Tuning

Automated NGIPSTuning

• Automated Recommended

Rules based on Organization’s

Infrastructure

• Automated IPS Policies based

on Changes

• Simplifies Operations &

Reduces Costs

Page 16: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Automated NGIPS Tuning

100

80

60

40

20

0Security Effectiveness

Without Automated Tuning With Automated Tuning

Time

Page 17: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Security Architecture

1. Firepower

1. FMC Management,

Reporting,

Analytics

2. AMP for Endpoints

Remote Endpoints

Windows OS Android Mobile Virtual MAC

OS

CentOS, Red

Hat Linux for

servers and

datacenters

2. AMP for Endpoints

AMP for Endpoints can

be launched from

Cisco AnyConnect®

1. Firepower

2. AMP for endpoint

Page 18: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

What do you get with AMP for Endpoints ?

File

Reputation

Exploit

Prevention

(File-less

Attacks)

Machine

Learning

Malicious

Activity

Protection

(Ransomware)

Sandboxing

Indications of

Compromise

AV Engine

Continuous

Analysis

Command

Line

Visibility

Page 19: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

What do you get with AMP for Endpoints ?

File

Reputation

Exploit

Prevention

(File-less

Attacks)

Machine

Learning

Malicious

Activity

Protection

(Ransomware)

Sandboxing

Indications of

Compromise

AV Engine

Continuous

Analysis

Command

Line

Visibility

Page 20: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Security Architecture

1. Firepower

1. FMC Management,

Reporting,

Analytics

2. AMP for Endpoints

Remote Endpoints

Windows OS Android Mobile Virtual MAC

OS

CentOS, Red

Hat Linux for

servers and

datacenters

2. AMP for Endpoints

AMP for Endpoints can

be launched from

Cisco AnyConnect®

1. Firepower

2. AMP for endpoint

3. Stealthwatch

3. Stealthwatch

Page 21: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Organization with Only Perimeter Visibility

192.168.19.3

10.85.232.4

10.4.51.5

192.168.132.99

10.43.223.221

10.200.21.110

10.51.51.0/24

10.51.52.0/24

10.51.53.0/24

Internet

Many devices in your network

without visibility

Visibility available for traffic

transiting through perimeter

Page 22: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Enabling Visibility Inside Your Organization

192.168.19.3

10.85.232.4

10.4.51.5

192.168.132.99

10.43.223.221

10.200.21.110

10.51.51.0/24

10.51.52.0/24

10.51.53.0/24

Internet

EVERYTHING

on the network

KNOW

every host

RECORD

every conversation

Page 23: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Forrester’s Zero Trust Framework

Zero trust operates under the principle of “never trust, always verify,”

which means that trust is never assumed for any device or user on the

system.

Page 24: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Next Generation Cyber Threat Defense

Cisco StealthWatch

NetFlow TelemetrySwitches, Routers, and Firewalls

Internal Network and Borders

• Aggregating, analyzing NetFlow

• Network Behavior - Baseline

• Anomaly Detection Algorithms

• Insider Threats

Cisco Identity Services EngineIdentity, Device, Posture

Page 25: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Encryption Is Changing The Threat Landscape

Source: Thales and Vormetric

Straight lineProjection

16%

20% 19%22% 23% 23%

25%27%

30%

34%

41%

60%

Extensive deployment of encryption

50%

FY05 FY06 FY07 FY08 FY09 FY10 FY11 FY12 FY13 FY14 FY15 2017 2019

Page 26: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Encrypted Traffic AnalyticsPublished research– 18 patents filed

“Identifying Encrypted Malware Traffic with Contextual Flow Data” AISec ’16 | Blake Anderson, David McGrew (Cisco Fellow)

Page 27: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Initial Data PacketSequence of Packet

Lengths and Times

Self-Signed certificate

Data exfiltration

C2 message

Threat

Intelligence Map

Broad behavioral information about the

servers on the Internet.Initial Data Packet

Industry’s first solution with ability to find threats in encrypted traffic without decryption

Page 28: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Malware in Encrypted Traffic

Cisco Stealthwatch

Machine

Learning Malware

detection and

cryptographic

compliance

NetFlow

Telemetry for

encrypted malware detection

and cryptographic compliance

Page 29: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Malware in Encrypted Traffic

Page 30: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Cryptographic ComplianceFlow search results

Page 31: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Encrypted Traffic Analytics receives “Miercom Performance Verified” Certification

Key Conclusions

36% higher rate detection finding 100% of threats

https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/enterprise-network-

security/miercom-report-eta-perf.pdf

Page 32: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Security Architecture

1. Firepower

1. FMC Management,

Reporting,

Analytics

2. AMP for Endpoints

Remote Endpoints

Windows OS Android Mobile Virtual MAC

OS

CentOS, Red

Hat Linux for

servers and

datacenters

2. AMP for Endpoints

AMP for Endpoints can

be launched from

Cisco AnyConnect®

1. Firepower

2. AMP for endpoint

3. Stealthwatch

Perimeter

VisibilityAutomated NGIPSAMP - Sandboxing

Indication of Compromise Correlation

Inside the Organization

Know every host

Record every conversation

Everything on the network

Page 33: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco Integrated Security Portfolio

• It’s our #1 differentiator

• It solves a vital customer problem: complexity

Page 34: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco’s Integrated Security Portfolio works in concert to prevent breaches, automate response, and detect and stop threats fast

NetworkISR/ASR

AdvancedMalware

Umbrella

Web W W W

ISE

Email

NGFW/ NGIPS

Threat Grid

Stealthwatch

EventThreat IntelPolicyContext

Meraki

Cloudlock

NetworkISR/ASR

AdvancedMalware

Umbrella

Web W W W

ISE

Email

NGFW/ NGIPS

Threat Grid

Stealthwatch

Meraki

Cloudlock

Page 35: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

automation

save time

see more

detect faster

better protection

NetworkISR/ASR

AdvancedMalware

Umbrella

Web W W W

ISE

Email

NGFW/ NGIPS

Threat Grid

Stealthwatch

Meraki

Cloudlock

Page 36: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Packet BrokeringNetwork Infrastructure &

Policy Management

Performance

Management &

VisualizationMobility

Packet

Capture &

ForensicsSIEM & Analytics

Remediation

& Incident

Response

Vulnerability

Management

Custom

Detection

Firewall/Access ControlIAM/SSO

Ecosystem and Integration

Page 37: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

TALOS20,000,000,000

Vendor.

Vendor.

Vendor.

Vendor

.

Vendor

.

Vendor .

Threats blocked (daily)

Page 38: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Questions

1. Can your firewall talk to the rest of your security ecosystem to improve visibility, increase speed to detection and response, and automate tasks?

2. How do you protect yourself from traffic the firewall doesn’t see?

3. How do you protect devices when they are off the corporate network?

4. Are you prepared for Ransomware infections?

5. What if you ARE breached…What do you do next?

Page 39: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

39

Get started with Cisco Security today

Learn more about how Cisco

Security can work

with your business

1

Schedule a Proof Of Value

to identify areas in your business

where visibility or control is lacking

2

Page 40: How to Predict, Detect & Stop threats at the Edge and Behind the ... · Encryption Is Changing The Threat Landscape Source: Thales and Vormetric Straight line Projection 16% 20% 19%

Nikos Mourtzinos, CCIE #9763

Cyber Security Sales Specialist

[email protected]

Linkedin nmourtzi

Twitter: @nmourtzinos