Operational Security Requirements (opsec) BOF or “Give Us The Knobs We Need” July 17, 2003 George M. Jones (mailing list)

Slides:



Advertisements
Similar presentations
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
思科网络技术学院理事会. 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Lesson 19: Configuring Windows Firewall
Payment Card Industry (PCI) Data Security Standard
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
COEN 252 Computer Forensics
Monitoring for network security and management Cyber Solutions Inc.
Implementing Network Access Protection
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Windows 7 Firewall.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Operational Security Capabilities for IP Network Infrastructure
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
IETF-63 OPSEC WG OPSEC WG _______ Operational Security Capabilities for IP Network Infrastructure IETF #65 - Dallas.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
1 Miscellaneous Capabilities for IP Network Infrastructure IETF 64 Vancouver, BC, Canada November 2005.
Configuring Network Access Protection
Module 5: Designing Security for Internal Networks.
Module 1: Configuring Routing by Using Routing and Remote Access.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Security fundamentals Topic 10 Securing the network perimeter.
1 Requirements for Internet Routers (Gateways) and Hosts Relates to Lab 3. (Supplement) Covers the compliance requirements of Internet routers and hosts.
Networking Material taken mainly from HowStuffWorks.com.
Chapter 4: Implementing Firewall Technologies
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
1 The Network Menu. 2 Static Routing The Static Routing functionality within GD eSeries allows users to easily configure static routes to networks not.
K. Salah1 Security Protocols in the Internet IPSec.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Instructor Materials Chapter 9: Testing and Troubleshooting
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
CompTIA Security+ Study Guide (SY0-401)
Chapter 8: Monitoring the Network
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks.
Global One Communications
Presentation transcript:

Operational Security Requirements (opsec) BOF or “Give Us The Knobs We Need” July 17, 2003 George M. Jones (mailing list)

Agenda ● Welcome and discussion of agenda (5 min.) ● Goals (5 min.) ● History and Current Status (10 min.) ● Related Work/”Liaison” [Lonvick,Ziring] (20 min) ● Overview of draft (30 min.) ● Profiles [Kaeo] (10 min) ● Discuss Contents of the draft (30 min.) ● Next Steps, Work Areas, Milestones (10 min.) ● Adjourn

Goals ● Goals: The End Game – Devices that can be deployed in a secure fashion, or “Give us the knobs we need” – A tool to aid communicating security needs – A guide to testing ● Methods: – Published document – Citeable in RFPs

Goals ● Goals: Today – Feedback on resolving tensions – Feedback on the substance of the document – Advice on most useful path to proceed – Identify liaisons with other areas – Identifying people interested in contributing

History and Current Status (1) ● Originally a UUNET testing document ● Used as the basis for security qualifications, mostly backbone and edge devices. ● Tired of vendors bringing in boxes that could not be operationally secured ● Tired of hearing “but you're the only one who wants...” ● Decided to get feedback and publish

History and Current Status (2) ● It was thought that many of the requirements where general or generalizable. ● Much musing about scope. Heritage and operating assumptions still show. ● Several restructurings (profiles, etc.) and reformatting (xml2rfc) ● Several rounds of internal review, some external comment. ● Some informal IETFs 55+56

History and Current Status (3) ● Assembling a team of “section editors” ● -00 draft published, trial balloon ● Collecting comments, will go to -01 and possibly -02, then decide where to go (input please)

History and Current Status (4) ● Major Tensions – Scope (core, edge vs. SOHO, Wireless, special purpose/embedded vs. general purpose) – Operational environment(s)/profiles (OoB vs. Inband) – BCP vs. “near term futures” (ex. Syslog, netconf) – BCP vs. “way out there” (stealthing, sampling) – Overlap with other work – Structure (BCP vs. other, functional/assurance/doc, profiles) – Size (65 pages and counting)

Resolving Tensions (1) ● Resolving the tensions (pre-BOF thoughts) – Scope: Re-narrow focus to large network infrastructure (routers, switches, other managed infrastructure devices). Allow “profiles” for other devices that are proper subsets of reqs. (e.g. SOHO, firewalls, VPN), but add no specific reqs for them. Out of scope: general purpose hosts (incl name/time/log-servers, IDS, etc.), unmanaged devices, mobile devices, etc.

Resolving Tensions (2) ● Resolving the tensions (pre-BOF thoughts) – Split OoB and In-band management reqs, allow choice – “Mostly BCP”....drop “Advanced” (==stealthing).... but what to do about things that are not standards, but “close” that solve problems (syslog, netconf, etc.) ? – Overlap w/other work: discuss in BOF. – Structure: proposed restructuring described later. – Size: No solution in sight.

Related Work (1) ● Related Efforts – IETF – Netconf – syslog – Forces ● Related Efforts – Non-IETF – Common Criteria – ANSI/T1M1 (management, etc.) – ANSI/T1S1 (control plane) ● Other ?

Related Work (2) – “Liaison” Reports “Liaison” reports from related efforts are included here to provide perspective, point to possible sources of ideas, point to possible areas of collaboration. ● Common Criteria ● ANSI/T1M1

Comparison of Requirements Docs

Overview: Goal ● Goal [current]: “The goal of this document is to define a list of security requirements for devices that implement Internet Protocol (IP). The intent of the list is to provide consumers of IP devices a clear, concise way of communicating their security requirements to equipment vendors.” ● Goal [proposed]: “The goal of this document is to define a list of operational security requirements for network infrastructure devices that implement Internet Protocol (IP). The intent...”

Overview: Scope (1) ● Scope [current]: “These requirements apply to devices that make up the network core infrastructure (such as routers and switches) as well other devices that implement IP (e.g., cable modems, personal firewalls,hosts)”

Overview: Scope (2) ● Scope [proposed]: “These requirements apply to devices, such as routers and switches, that make up the IP enabled infrastructure of large networks. It may be possible to define profiles (subsets) of the requirements that apply to broader classes of devices, e.g. security devices, firewalls, mobile devices, or even general purpose hosts, but the list of requirements from which the profiles are drawn will not be extended to cover other unique needs they may have.

Overview: Current Structure ● Current Structure – BCP Reqs – Non-Standard Reqs – Advanced Reqs – Profiles

Overview: Current Major Sections draft-jones-opsec-00.txt ● Device Management ● User Interface ● IP Stack ● Rate Limiting ● Filtering ● Logging ● AAA ● Layer 2 Reqs ● Vendor Behaviour ● Profiles

Overview: Proposed Structure ● Minimum Requirements – Functional ● Device Management... – Documentation – Assurance ● Conditional Requirements – Functional – Documentation – Assurance ● Profiles

Overview: Management Reqs (1) Requirement #s (1.2.3) listed from -00 draft. Possible disposition in -01 indicated by “==> action/placement” (discussion, please) ● BCP Support Out-of-Band Management (OoB) Interfaces Enforce Separation of Data and Control Channels Separation Not Achieved by Filtering No Forwarding Between Management and Data Planes ==> Conditional, Functional Device Remains Manageable at All Times ==> drop (too generic) Support Remote Configuration Backup ==> Minimum, Functional Support Management Over Slow Links ==> Minimum, Functional

Overview: Management Reqs (2) ● Non-Standard Support Secure Management Channels Use Non-Proprietary Encryption Use Strong Encryption Key Management Must Be Scalable ==> Minimum, Functional (borrow from T1M1 ?) Support Scripting of Management Functions ==> Minimum, Functional (netconf ?)

Overview: User Interface Reqs (1) Support Human-Readable Configuration File Display of 'Sanitized' Configuration ==> Minimum, Functional ● BCP

Overview: User Interface Reqs (2) Display All Configuration Settings ==> ??? (valid reeasons not to expose all) ● Non-standard

Overview: IP Stack Reqs (1) ● BCP Comply With Relevant IETF RFCs on All Protocols... ==> minimum, functional Provide a List of All Protocols Implemented Provide Documentation for All Protocols Implemented ==> minimum, documentation Ability to Identify All Listening Services Ability to Disable Any and All Services Ability to Control Service Bindings for Listening Services Ability to Control Service Source Address Ability to Withstand Well-Known Attacks and Exploits ==> Minimum, Assurance

Overview: IP Stack Reqs (2) ● BCP Maintain Primary Function at All Times ==> drop. Too generic Support Automatic Anti-spoofing for Single-Homed Networks Ability to Disable Processing of Packets Utilizing IP Options ==> Conditional, Functional Ability to Disable Directed Broadcasts ==> Minimum, Functional Identify Origin of IP Stack Identify Origin of Operating System ==> Minimum, Assurance

Overview: IP Stack Reqs (3) ● Non-standard Support Denial-Of-Service (DoS) Tracking Traffic Monitoring Traffic Sampling ==> ???

Overview: IP Stack Reqs (4) ● Advanced Ability To Stealth Device ==> drop/possible spinoff

Overview: Rate Limiting Reqs ● BCP Support Rate Limiting Support Rate Limiting Based on State ==> conditional, functional

Overview: Filtering Reqs (1) ● BCP 2.6 Packet Filtering Criteria Ability to Filter on Protocols Ability to Filter on Addresses Ability to Filter on Any Protocol Header Fields Ability to Filter Inbound and Outbound Ability to Filter on Layer 2 MAC Addresses 2.6.* ==> minimum, functional 2.7 Packet Filtering Application Targets Ability to Filter Traffic Through the Device ==> conditional, functional Ability to Filter Traffic to the Device ==> minimum, functional

Overview: Filtering Reqs (2) ● BCP Ability to Filter Updates ==> conditional, functional 2.8 Packet Filtering Actions Ability to Specify Filter Actions ==> minimum, functional

Overview: Filtering Reqs (3) ● BCP 2.9 Packet Filtering Counter Requirements Ability to Accurately Count Filter Hits Ability to Display Filter Counters Ability to Display Filter Counters per Rule Ability to Display Filter Counters per Filter Application Ability to Reset Filter Counters Filter Counters Must Be Accurate 2.9.* ==> minimum, functional

Overview: Filtering Reqs (4) ● BCP 2.10 Other Packet Filtering Requirements Ability to Log Filter Actions Ability to Specify Filter Log Granularity Ability to Filter Without Performance Degradation ==> minimum, functional Filter, Counters, and Filter Log Performance Must Be Usable ==> drop, too general

Overview: Logging Reqs (1) ● BCP Ability to Log All Events That Affect System Integrity ==> minimum, functional... also area for spinoff.

Overview: Logging Reqs (2) ● BCP Logging Facility Conforms to Open Standards Catalog of Log Messages Available Ability to Log to Remote Server Ability to Select Reliable Delivery Ability to Configure Security of Log Messages Ability to Log Locally Ability to Specify Log servers by Event Classification Ability to Classify Events Ability to Maintain Accurate System Time Logs Must Be Timestamped Logs Contain Untranslated Addresses Logs Do Not Contain DNS Names by Default ==> minimum, functional

Overview: AAA Reqs (1) ● BCP Authenticate All User Access Support Authentication of Individual Users Support Simultaneous Connections Ability to Disable All Local Accounts Support Centralized User Authentication Support Local User Authentication Support Configuration of Order of Authentication Methods Ability to Authenticate Without Reusable Plain-text Passwords Support Device-to-Device Authentication – ==> minimum, functional

Overview: AAA Reqs (2) ● BCP Ability to Define Privilege Levels Ability to Assign Privilege Levels to Users Default Privilege Level Must Be Read Only Change in Privilege Levels Requires Re- Authentication Accounting Records – ==> minimum, functional

Overview: Layer 2 Reqs ● BCP Filtering MPLS LSRs VLAN Isolation Layer 2 Denial-of-Service Layer 3 Dependencies – ==> conditional, functional

Overview: Vendor Behaviour Reqs ● BCP Vendor Responsiveness ==> assurance, possible spinoff of metrics group/work.

Overview: Profiles A.1 Minimum Requirements Profile A.2 Layer 3 Network Core Profile A.3 Layer 3 Network Edge Profile A.4 Layer 2 Network Core Profile A.5 Layer 2 Edge Profile

Overview: Recap of Major Sections ● Device Management ● User Interface ● IP Stack ● Rate Limiting ● Filtering ● Logging ● AAA ● Layer 2 Reqs ● Vendor Behaviour ● Profiles

Work Areas ● Resolve tensions (for discussion now) – Scope – Structure – Operational assumptions – BCP vs. non-BCP – Relationship to other efforts (IETF and non-IETF) ● Simplify compound requirements ● Refine profiles

Next Steps and Milestones ● Incorporate feedback from BOF, list ● Restructure, adjust scope, goals if needed ● Publish -01 (August, 2003) ● Solicit more feedback from NANOG, other sources (operators). ● Publish -02 (November, 2003) ● Decide on future direction WRT ANSI/T1, CC ● Publish Informational RFC, merge with ANSI/T1, form Working Group(s).

Adjourn ● Mailing List: to subscribe: “echo 'subscribe opsec' | mail \ ● ● Continued feedback/comments welcome.