Presentation is loading. Please wait.

Presentation is loading. Please wait.

Toward Distributed and Virtualized Enterprise Security

Similar presentations


Presentation on theme: "Toward Distributed and Virtualized Enterprise Security"— Presentation transcript:

1 Toward Distributed and Virtualized Enterprise Security
STR-T11 Toward Distributed and Virtualized Enterprise Security Dr. Edward G. Amoroso CEO TAG Cyber Stevens Institute of Technology, M&T Bank, Applied Physics Lab/JHU, New York University @hashtag_cyber

2 Recent Public Enterprise Hacks

3 How Many Darts to Fill the Bucket?

4 How Many Darts to Fill the Bucket?

5 Which Method Protects the Cookies Better?

6 Enterprise Perimeter – Theory

7 Disallow External Access

8 Allow Internal Access Disallow External Access Internal Asset Internal

9 Trusted Internal Lateral Traversal Trusted Internal Enterprise Access
IT Systems CFO Info/Data Marketing Product Sales HR Outsource Dev/Ops Corporate Records Trusted Internal Enterprise Access Disallow External Access

10 Unknown Gateway Email Gateway Outsource Access Gateway Unknown Gateway
IT Systems Outsource Access Gateway CFO Info/Data Marketing Product Sales Unknown Gateway HR Outsource Dev/Ops Corporate Records Unknown Gateway Partner Access Gateway Remote Access Gateway Web Gateway

11 Advanced Persistent Threat (APT)
Mistake 1: accepted from anyone with no regard for controls such as DMARC Gateway Mistake 2: Someone from Marketing clicks on a Phish Marketing Mistake 3: Easy lateral traversal across the enterprise LAN. Mistake 4: Web egress allowed to uncategorized Internet site Records Web Gateway

12 Enterprise Perimeter – Actual

13 Internal Asset A Internal Asset B Internal Asset C Internal Asset D

14 Internal Asset A Internal Asset B Internal Asset C Internal Asset D

15 Outsourcing Access Gateway Outsourcing Internal Asset A
Internal Asset B Outsourcing Internal Asset D

16 Outsourcing Access Gateway Cloud/vDC Outsourcing Internal Asset A
Internal Asset B Internal Asset D Cloud/vDC

17 Virtual Micro-Segment Policy Enforcement Cloud/vDC Outsourcing
Internal Asset A Outsourcing Internal Asset B Internal Asset D Cloud/vDC

18 Cloud/vDC Email Gateway Outsourcing Email Internal Asset A
Internal Asset B Cloud/vDC Gateway

19 Cloud/vDC Email Gateway Cloud/vDC Outsourcing Email Internal Asset A
Internal Asset B Cloud/vDC Gateway Cloud/vDC

20 Cloud/vDC Cloud/vDC Outsourcing Email Internal Asset A
Internal Asset B Cloud/vDC Cloud/vDC

21 Partner Gateway Cloud/vDC Cloud/vDC Partner Outsourcing Email
Internal Asset B Cloud/vDC Cloud/vDC

22 Cloud/vDC Partner Gateway Cloud/vDC Cloud/vDC Partner Outsourcing
Internal Asset B Cloud/vDC Cloud/vDC

23 Cloud/vDC Cloud/vDC Cloud/vDC Partner Outsourcing Email
Internal Asset B Cloud/vDC Cloud/vDC

24 Cloud/vDC Legacy Enterprise Cloud/vDC Cloud/vDC Partner Outsourcing
Internal Asset B Cloud/vDC Cloud/vDC

25 Partner Outsourcing Email
Internal Asset B

26 Partner Outsourcing Internal Asset B Policy Cloud/vDC

27 Partner Outsourcing Policy Email
Internal Asset B Policy

28 Asset A Asset C Asset B C&C Asset D

29 Asset A Asset C Asset B C&C Asset D

30 Node Node Node C&C Node

31 C&C/Node Node Node C&C Node

32 Node Node Node C&C Node

33 Node Node Node C&C Node

34 Node Node Node C&C Node

35

36 Distributed Micro-Segmented Enterprise Architecture
Logical Interaction Logical Interaction Isolated Micro-Segments

37 Warning: Global Perimeters are Not Secure
Attack Surface Perimeter Enterprise LAN Enterprise LAN Attack Surface Attack Surface

38 Isolating a Server from a Perimeter Makes it More Secure
Attack Surface Isolated Server Perimeter Enterprise LAN Enterprise LAN Attack Surface Attack Surface

39 Global Department of State Network

40 Global Department of State Perimeter is Not Secure

41 Global Department of State Perimeter is Not Secure
Bureaucratic Clinton Server

42 Isolating the Clinton Email Server Made it More Secure
Isolated Clinton Server

43 Applying Enterprise Cyber Security to Politics

44 Apply What You’ve Learned: Download the PDFs
@hashtag_cyber


Download ppt "Toward Distributed and Virtualized Enterprise Security"

Similar presentations


Ads by Google