Office of Information Technologies CAMP: Bridging Security and Identity Management Christopher Misra 14 February 2008 Tempe, AZ Protecting Network Assets.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

1 OpenFlow Research on the Georgia Tech Campus Network Russ Clark Nick Feamster Students: Yogesh Mundada, Hyojoon Kim, Ankur Nayak, Anirudh Ramachandran,
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
SALSA-NetAuth SALSA-FWNA BoF Kevin Miller Duke University Internet2 Member Meeting May 2005.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Information Security Policies and Standards
The State of Security Management By Jim Reavis January 2003.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Security and Policy Enforcement Mark Gibson Dave Northey
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
Network Architecture for Automatic Security and Policy Enforcement Internet2 Members Meeting Fall 2005 Eric Gauthier ~ Boston University Kevin Amorin ~
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Selecting the Right Network Access Protection Architecture
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
70-411: Administering Windows Server 2012
Implementing Network Access Protection
SALSA-FWNA Activity Update Kevin Miller Duke University Internet2 Member Meeting May 2005.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 8: Configuring Network Access Protection
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Configuring Network Access Protection
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
IS3220 Information Technology Infrastructure Security
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Network Admission Control: A Survey of Approaches Educause 2008
Implementing Network Access Protection
Firewalls.
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Protecting Network Assets
Network Access Control
Presentation transcript:

Office of Information Technologies CAMP: Bridging Security and Identity Management Christopher Misra 14 February 2008 Tempe, AZ Protecting Network Assets

Agenda- DRAFT, needs to be updates  Automated Security and Policy Enforcement History New Challenges  Background/Roles of: NAC IdM Network Segmentation  What might we do? Firewall traversal  Grid case  Standards

Session Abstract  Can IAM be helpful in managing network intrusions and access policies?  Can IAM correctly correlate identity to an endpoint device by combining network registration and personal identification?  Can coupling network capabilities and IAM replace the use of IP addresses as the criterion for access with identity, roles, and related attributes?  This session will explore these questions and how one can identify the person behind the device or address.

Managing Network Intrusions?  Initial NAC deployments were not driven by architectural decisions Large numbers of unmanaged systems connected to campus network Primarily in residence halls Battle scars from Code Red, Nimda, and Blaster  However, we did leverage campus IAM successfully And we effectively created a device registry Even if we didn’t integrate this data with our IAM

How we got here…or, before NAC was cool…  Why “Automate Security and Policy Enforcement”? From the SALSA-Netauth document Strategies for Automating Network Policy Enforcement: “(A) major security challenge facing university residential networks and other large-scale end-user networks is the thousands of privately owned and unmanaged computers directly connected to an institution's relatively open, high-speed Internet connections. Security policy enforcement is often lax due to a lack of central control over end-user computers and an inability to tie the actions of these computers to particular individuals. A few times a year there are surge events, including the predictable start of each semester and the unpredictable and increasingly frequent reactions to large-scale security incidents, that require massive support intervention.

Even though it wasn’t cool, we implemented NAC

And here we are…I guess NAC is cool now.. Network Access Control: Vendor Definitions  “Using the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources” – Cisco  “…combines user identity and device security state information with network location information, to create a unique access control policy…“ - Juniper

Why did we implement NAC systems?  Only automated approaches can scale and respond rapidly to large-scale incidents.  Preventative policy enforcement reduces risk: overall number of security vulnerabilities the success of any particular attack technique.  Automated remediation systems have a positive impact on a large number of hosts with a relatively small time investment from computing staff.

Network Access Control  Higher education created many early systems of what is now termed NAC (Network Access Control) Southwestern Netreg, CMU Netreg, Packetfence, others  Currently there are many commercial offerings in the space 30+ vendors at last count Major deployments by Cisco, Microsoft, Juniper and others

Network Access Control in Higher Ed  Characteristics of higher ed networks lead to unique challenges Large numbers of unmanaged systems connected to campus network Residence halls Heterogeneous computing base Frequently no ubiquitous administration structure Complex network Use Cases

Network Access Control in Higher Ed  Associating a device with an identity Is the user a member of the campus community? Leveraging campus IdM  Determining a host’s posture Is the host compliant with local policy? Measuring device state against campus IT security standards  Role-based network assignment What network perimeter is appropriate for this host? vLAN, subnet, firewalls, ids

NAC Basics  Registration options include: Open DHCP (“free love”) DHCP with MAC registration (“netreg”) Web middlebox (“portal”) 802.1x (“supplicant”)  Enforcement types include: vLAN isolation/DHCP scope isolation Network-based firewall/Host-based filters Class of Service (rate limit)

NAC: Posture assessment  Original implementations used active network-based scanning Windows XP SP2 rained on this parade But security staff didn’t compliance  Many sites migrated to client-based posture assessment Running code on endpoints to validate compliance Could be implemented in the 802.1x supplicant

NAC is Complicated

Federations have a role here also  Enable members of one institution to authenticate to the wireless network at another institution using their home credentials E,g, eduroam which stands for Education Roaming, is a RADIUS-based infrastructure that uses 802.1X security technology to allow for inter-institutional roaming. “Being part of eduroam allows users visiting another institution connected to eduroam to log on to the WLAN using the same credentials(username and password) the user would use if he were at his home institution. “  Effectively need to achieve identity discovery  Also applicable to Grid environments

Correlating identity to device to privilege  We’ve done a pretty effective job so far But the drivers were not traditional IAM drivers  Can we assign a meaningful Level of Assurance to this correlation? Not so sure.  Are we willing to use this correlation to grant privileges? Dynamic vLAN assignments? Firewall traversal capabiltiies?

Correlating identity to device to privilege  We need to understand the relationship between user identity, device identity, and host integrity (posture) This is complicated further in a federated environment  Does (user + device) == privilege? What about users with multiple roles?  Is this a network, security, or idm problem? D) All of the above  Perhaps we need to step back and take an architectural view of this…

Drivers for NAC standards  Community desire for interoperable components Heterogeneous campus environment  Modular network architecture Ability to use commercial and open source components Vendor-made switches Open-source registration and remediation

NAC Standards space  Trusted Computing Group Trusted Network Connect  Vendor ‘standards’ Cisco NAC Microsoft NAP  IETF NEA Chartered only for client-server protocols