Enterprise and Federated Security: Some Frontiers.

Slides:



Advertisements
Similar presentations
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Mark S. Bruhn, Interim Director University Copyright.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 12 Network Security.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Security Awareness: Applying Practical Security in Your World
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
The Co-mingled Universe of R&E Networking: the reprise Ken Klingenstein Director, Internet2 Middleware and Security Ken Klingenstein Director, Internet2.
1 State of the Network 1 May 2007 Computing Support Meeting Terry Gray Assoc VP, Technology & Architecture C&C.
Computer Security: Principles and Practice
Security Architectures and Advanced Networks Ken Klingenstein Day Job: Middleware Night Job: Network Security.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
What Data Do We Need and Why Do We Need It? Jim Pepin Chief Technology Officer University of Southern California.
Norman SecureSurf Protect your users when surfing the Internet.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Addressing Diagnostic Complexity The EDDY Approach End-to-end Diagnostic DiscoveryY Chas DiFatta Mark Poepping
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
9/17/20151 IPv6 Challenge or The Challenge of IPv6 Internet 2 IPv6 Working Group Dale Finkelson Michael Lambert.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
CSC8320. Outline Content from the book Recent Work Future Work.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
The New Problem Space: Issues for the Future Ken Klingenstein Director, Internet2 Middleware and Security.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Internet2 Security Efforts - A brief overview of activities Ken Klingenstein 2004 July 21 Joint Techs- Columbus, Ohio.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Security at Line Speed: Integrating Academic Research and Enterprise Security.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Attribute Release and Scalable Consent \. Part of the original vision for federated identity and necessary for it to succeed Federated identity is less.
© Copyright AARNet Pty Ltd PRAGMA Update & some personal observations James Sankar Network Engineer - Middleware.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Security Architectures and Advanced Networks Ken Klingenstein Day Job: Middleware Night Job: Network Security.
IS3220 Information Technology Infrastructure Security
Federated Security Services Ken Klingenstein Day Job: Middleware Night Job: Network Security.
Network Architecture and Security Ten Years Out Internet2 Member Meeting; Fall 2005 Deke Kassabian – University of Pennsylvania Mark Poepping – Carnegie.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Educause/Internet 2 Computer and Network Security Task Force
To Join the Teleconference
Mark Poepping, SALSA Chair
Implementing Client Security on Windows 2000 and Windows XP Level 150
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Enterprise and Federated Security: Some Frontiers

Topics  Background on Internet2 Security  Security at Line Speed Workshop  Security and Trust  Federated Security Services and Capabilities Collaborative incident analysis and response Security aware applications  Salsa and its Workgroups Net Auth Net Arch –Network Security and Applications –“Things like SPF” –H.323 and SIP Firewall/NAT approaches

Security  Designated as a strategic direction for Internet2 last fall  Intended to complement and augment other activities within the EDUCAUSE/Internet2 Security Task Force  Build on the success of the NSF-sponsored Security at Line Speed workshop  Created Salsa as member-driven steering group 

Workshop 2003  NSF Sponsored workshop, in conjunction with Indiana University, Internet2, the Massachusetts Institute of Technology and the University of Washington.  Goal – to develop the issues and alternatives in coupling the need for advanced collaborative computing environment with growing network security threats.  1.5 day Workshop Aug 2003  White paper is at  Ongoing maintenance needed

By “Line Speed”, we really mean…  High bandwidth  Exceptional low latency, e.g. remote instrument control  End-to-end clarity, e.g. Grids, desktop video  Exceptional low jitter, e.g. real time interactive HDTV  Advanced features, e.g. multicast

General Findings  First, and foremost, this is getting a lot harder  We seem to have hit a couple of turning points New levels of stresses Necessary but doomed approaches  High performance security is approached by a set of specific tools that are assembled by applying general architectural principles to local conditions.  The concept of the network perimeter is changing; desktop software limits security and performance options  There are interactions with the emerging middleware layer that should be explored  Tool integration is an overarching problem  We are entering diagnostic hell

Tradeoffs  Host versus border security  Deny/Allow versus Allow/deny approaches  Unauthenticated versus authenticated network access  Central versus end-user management  Server-centric versus client-centric  False positives versus zero-day attacks  Organizational priorities between security and performance  Perimeter protection versus user/staff confusion

Trends  More aggressive and frequent attacks, resulting in Desktop lockdowns and scanning New limits at the perimeter Increased tunneling and VPN’s More isolation approaches, straining the top of the desk Hosts as clients only  Changes in technology Rise of encyption New attack vectors, such as P2P Higher speeds make for more expensive middleboxen Convergence of technology forces  New policy drivers DHS, RIAA, etc. LCD solutions to hold down costs

The Tool Matrix  For a variety of network and host based security tools, Role in prevention/detection/reaction/analysis Description General issues Performance implications Operational Impacts  Network Tools include host scanning, MAC registration, VLAN, Encrypted VPN’s and/or Layer 3 VPN’s, Firewalls, Source Address Verification, Port Mirroring, etc…  Host Tools include host-based encryption, local firewalls, host-based intrusion detection/prevention, secure OS, automated patching systems, etc.

Local Network Security Design Factors  Size of class B address space  Local fiber plant  Medical school  Geographic distribution of departments on campuses  Distance to gigapops  Policy Authority of Central IT  Desktop diversity  …

Security and Trust  Security without external trust results in a defensive, highly constraining position with limited effectiveness  With trust, collaborative security and collaborative applications can be developed  Currently, there are two promising trust fabrics to leverage Federations – emergent inter-enterprise P2P (the trust fabric, not the architecture) – ad hoc, currently “non- scalable”, but new technologies will be appearing shortly and widely

Federated Security Services  Federated networks Share a common network substrate Share a common trust fabric Together they could permit…  Collaborative incident analysis and response Network-wide views Leveraged diagnostic help Ability for automated tools to use distributed monitors Protect privacy at several layers  Security-aware capabilities Trust-moderated transparency Integrated security/performance diagnostics  Moving it into the broader Internet

Collaborative Incident Analysis  Moving beyond the “border” to see network-wide views I’m seeing activity X? Are others seeing it? What variants are they seeing? Real-time attack recognition From the central observatory, let me see the full address of the attacking node at site Y in the federation I’m seeing an attack ostensibly from source address z at enterprise Y. Let me look at logging within site Y to verify Correlate signatures and traffic among sites A-Z to provide an early warning system of DDOS Let external experts from site Z examine our forensic information to assist our diagnostics  Requires federated backbone (meters, log files, etc) and federated trust fabric (for scaling, role-based access control, contact info, etc.)

Collaborative incident analysis  Scaling requires managing large data sets Centralized – the Abilene Observatory, perhaps others Distributed – on a per enterprise level  Which in turn requires a clear data model Common event records, likely distilled and reformatted from native logs Is enterprise-level security sufficient  And also pluggable modules for harvesting records by tools  Tools that permit analysis and yet preserve privacy  And also a trust fabric that permits multiple levels of authentication and fine-grain authorization

Federated Security-aware Capabilities  Federated user network authentication for on-the-road science  Control spam through federated verification of sending enterprises  Tell me which firewall is dropping which service request  Permit end-end videoconferencing through firewalls and NATs  Allow enterprise-specific patching paradigms to coexist  Create end-end transparency for use of Grids  Personal firewall configuration based on authorization

Moving it into the broader Internet  Picking approaches that are deployable and build on embedded bases  Federated substrata among those on common backbones  Interfederation issues – how hard will they be  International discrepancies in privacy  International IdSP’s - legalisms

Salsa Mark Poepping - CMU (chair) Chris Cramer - Duke University Gary Dobbins - University of Notre Dame Terry Gray - University of Washington Chris Misra - University of Massachusetts Doug Pearson - Indiana University Jim Pepin – USC James Sankar – UKERNA Jeff Schiller – MIT Joe St. Sauver - University of Oregon Steve Wallace - Indiana University Technical Steering Group selected from Internet2 Member institutions’ Intended to set directions and priorities for Internet2, create and manage workgroups, endorse community standards Drawn from campus enterprise network security practititioners; typically the “best and brighest” Two work groups right now – Net arch Net auth

Net Security Architecture  Get us to an architecture instead of piece parts Too many parts with too much interactions Diagnostic hell and innovation ice age Current approaches are doomed anyway  Produce, as its first deliverables Reference model (updated from various sources) Common nomenclature Ways to analyze application and middleware interactions with network layer security components

Network AuthN/AuthZ  Identify areas where middleware technologies can support intra and inter- realm security  Network access controls may depend on The identity of the user The identity of the device The state of the device (scanned, patched, etc) The role of the user Other  Initiating organized activities to develop network authentication and authorization architectures and sample implementations, including responding to the TERENA mobility TF  ngn13/ _JR_GN2_JRA5.pdf

Network Security and Apps  Application-specific DNS-based Leverage DNS with middleware based components to support applications Things like SPF  H.323 and firewalls/NATs  Trust-mediated transparency