+ All Categories
Home > Documents > Cyber Security 2016 - data.eventworld.cz · Cisco Systems [email protected] CSE Security, CCIE...

Cyber Security 2016 - data.eventworld.cz · Cisco Systems [email protected] CSE Security, CCIE...

Date post: 27-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
45
Cyber Security 2016 Využití aplikačních rozhraní pro analýzu malwaru a automatizovanou odezvu na hrozby Jiří Tesař Cisco Systems [email protected] CSE Security, CCIE #14558, SFCE #124266
Transcript
Page 1: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Cyber Security 2016 Využití aplikačních rozhraní pro analýzu malwaru a automatizovanou odezvu na hrozby

Jiří Tesař Cisco Systems [email protected] CSE Security, CCIE #14558, SFCE #124266

Page 2: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Endpoint User

NGFW/UTM

Filter

URL

DATACENTER

I00I

00I

0II0

II

00

0II

0 0

0II

0II

0I0

00

0I0

0I 0

0I0

I II0

00

0I0

I0I0

00

I0I0

00

I0I0

I

0II I

I0I0

II00

I0I0

000

0000

II0I

I0 0

0II0

I 000

000I

I

0II I

I0I0

II00

I0I0

000

0000

II0I

I0 0

0II0

I 000

000I

II

I0II0I II0II0 0I 0 I

000II000I0I

000II000I0I

0I 0I 00 II 0II 0I 0I0I0

0II I0II00I0 II00I0

NGFW

NGIPS/AMP

00I0II0I0II0I00II0I

NGIPSv NGFWv

00 III 0 II0I0 II 0I0 00 III0I0 0 II 000

NGIPS/ AMP

NGIPSv

Roaming User

BEFORE Discover

Enforce

Harden

DURING Detect

Block

Defend

AFTER Scope

Contain

Remediate

Page 3: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Before During After Internet

NGFW

NGIPS

AMP

NG..

Management

Client SW

SSL

802.1x

AVC

URL SIEM

Data Sources

DC

Page 4: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

ASA/Firepower

Firepower MC

AnyConnect

SSL

802.1x

DC

NGFW

NGIPS

AMP

AVC

URL

Before During After

Page 5: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

What does their traffic look like over time?

What operating systems?

Page 6: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

View all application traffic… Look for risky applications…

Page 7: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Geolocation for source and destination

URL …

Page 8: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Intrusion events by impact, priority, hosts, users …

Page 9: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

File analysis

Malware detection

Page 10: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Identify Where to Start

If this is all there was then the “Order of Investigation” is easy.

From the FMC Dashboard

Page 11: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Identify Where to Start

Indications of Compromise Is often a better place to start. If it was always so easy.

From the FMC Context Explorer

Page 12: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I
Page 13: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

An unknown file is present on IP: 10.4.10.183, having been downloaded from Firefox

Page 14: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

At 10:57, the unknown file is from IP 10.4.10.183 to IP: 10.5.11.8

Page 15: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Seven hours later the file is then transferred to a third device (10.3.4.51) using an SMB application

Page 16: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

The file is copied yet again onto a fourth device (10.5.60.66) through the same SMB application a half hour later

Page 17: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

The Cisco Collective Security Intelligence Cloud has learned this file is malicious and a retrospective event is raised for all four devices immediately.

Page 18: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

At the same time, a device with the FireAMP endpoint connector reacts to the retrospective event and immediately stops and quarantines the newly detected malware

Page 19: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

AMP

Internet

ASA/Firepower

Firepower MC

AnyConnect

SSL

802.1x

NAC

CWS

DC

NGFW

NGIPS

AMP

AVC

URL

Before During After

Page 20: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

AnyConnect

AMP

ASA/Firepower

Firepower MC NGFW

NGIPS

AMP

AVC

URL

DC SSL

802.1x

NAC

CWS

Before During After

Page 21: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

AnyConnect

AMP

ASA/Firepower

Firepower MC NGFW

NGIPS

AMP

AVC

URL

DC SSL

802.1x

NAC

CWS

TALOS Before During After

Page 22: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

AnyConnect

AMP

ASA/Firepower

Firepower MC NGFW

NGIPS

AMP

AVC

URL

DC SSL

802.1x

NAC

CWS

TALOS Before During After

Page 23: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I
Page 24: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Device Trajectory

• Gives you deep visibility into file activity on a single device/endpoint

Looks DEEP into a device and helps answer:

• How did the threat get onto the system?

• How bad is my infection on a given device?

• What communications were made?

• What don’t I know? • What is the chain of events?

Page 25: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

AnyConnect

AMP

ASA/Firepower

Firepower MC NGFW

NGIPS

AMP

AVC

URL

DC SSL

802.1x

NAC

CWS

TG

TALOS Before During After

Page 26: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I
Page 27: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I
Page 28: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

AnyConnect

AMP

ASA/Firepower

Firepower MC NGFW

NGIPS

AMP

AVC

URL

DC SSL

802.1x

NAC

CWS

TG

TALOS Before During After

Page 29: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

AnyConnect

AMP

ASA/Firepower

Firepower MC NGFW

NGIPS

AMP

AVC

URL

DC SSL

802.1x

NAC

CWS

TG

TALOS Before During After

Page 30: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

8 hours after the first attack, the Malware tries to re-enter the system through the original point of entry but is recognized and blocked.

Page 31: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

802.1x

Internet

Switch WLC

Cisco Access Layer

AnyConnect

AMP

SSL

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

Page 32: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Switch WLC

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

Identity Services Engine

AAA

Page 33: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Network Resources Role-based policy

access

Traditional TrustSec

BYOD Access

Secure Access

Guest Access

Role-based Access

Identity Profiling

and Posture

Who

Compliant

What

When

Where

How

Quick Reminder – What is ISE?

A centralized security solution that automates context-aware access

to network resources and shares contextual data

Network

Door

Context ISE pxGrid

controller

Page 34: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Switch WLC

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

Identity Services Engine

AAA Guest PROF POST

AD

Page 35: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Switch WLC

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

Identity Services Engine

AAA Guest PROF POST

AD

PxGrid

Page 36: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Identity Services Engine

AAA Guest PROF POST

AD

Lancope

MDM

Switch WLC

PxGrid

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

Page 37: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Identity Services Engine

AAA Guest PROF POST

AD

Lancope

MDM

Switch WLC

PxGrid

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

Page 38: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Access denied

per security

policy

Based on the new

tag, ISE enforces

policy on

FMC detects

suspicious file and

alerts ISE using pxGrid

by changing the

Security Group Tag

(SGT) to suspicious

FMC scans the

user activity and

file

Enable Rapid Threat Containment With Cisco Firepower Management Center (FMC) and Identity Service Engine (ISE)

Corporate user

downloads file

Page 39: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Identity Services Engine

AAA Guest PROF POST

AD

Lancope

MDM

Switch WLC

PxGrid

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

ESA WSA

AMP

Page 40: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

AMP AMP

Internet

Identity Services Engine

AAA Guest PROF POST

AD

Lancope

MDM

Switch WLC

ESA WSA

PxGrid

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

Page 41: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Identity Services Engine

AAA Guest PROF POST

AD

Lancope

MDM

Switch WLC

ESA WSA

PxGrid

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

AMP AMP

Page 42: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

CWS

Internet

Identity Services Engine

AAA Guest PROF POST

AD

Lancope

MDM

Switch WLC

ESA WSA

PxGrid

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

AMP AMP

AMP/CTA

CWS OpenDNS

Page 43: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Internet

Identity Services Engine

AAA Guest PROF POST

AD

Lancope

MDM

Switch WLC

ESA WSA

PxGrid

Cisco Access Layer

AnyConnect

AMP

SSL

802.1x

NAC

CWS

ASA/Firepower

NGFW

NGIPS

AMP

AVC

URL

TG

TALOS

FPMC

Before During After

AMP AMP

AMP/CTA

CWS OpenDNS

Page 44: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

53 C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

VPN

WiFi/LAN

Content GW

Firewall

IPS

Threat Management

Meraki

Secure Access

Secure Transfer

Secure Inside

Meraki

TrustSec

Encryption

01001

110

TALOS

ISE

Security

Policy Management

& Monitoring

S2S VPN

DMVPN

GET VPN

Flex VPN

MacSec

SGT/SGACL

SourceFire

ASA/IPS

Switches

WLC

ASA 5500-X

ASA 5585-X

ASA-SM

ASAv

ASR

ISR, CSR

FireAMP

AMP for mobile

LanCope

AMP

AMP

AMP

ISE

AMP

TG

TG

TG

CWS

WSA/VM

SMA/VM

ESA/VM

ASA-SFR

CWS

CWS

AnyConnect

ASA

CWS

AMP

TG

CWS

AMP

TG

TG

Page 45: Cyber Security 2016 - data.eventworld.cz · Cisco Systems jitesar@cisco.com CSE Security, CCIE #14558, SFCE #124266 . Internet Endpoint User NGFW/UTM Filter URL DATACENTER 0 I I I0II0I

Děkuji za pozornost


Recommended