SlideShare a Scribd company logo
Cisco Connect 2018 Thailand - Security automation and programmability mr. khoo boo leng_cisco
Automation & Programmability Network Security
Khoo Boo Leng (khoo@cisco.com)
Technical Solution Architect APJ GSP Architecture
Digitization Is Disrupting The SP business
The world has gone mobile Traffic growth, driven by video
Rise of cloud computing Machine-to-Machine
Changing
Customer
Expectations
Ubiquitous Access
to Apps & Services
10X Mobile Traffic Growth
From 2013-2019
Changing Enterprise
Business Models
Efficiency & Capacity
Soon to
Change SP
Architectures/
Service Delivery
Emergence of the Internet of Everything
Process ThingsPeople Data
PetabytesperMonth
Other (43%, 25%)120,000
100,000
80,000
60,000
40,000
20,000
0
Internet Video (57%, 75%)
2013 2014 2015 2016 2017 2018
23% Global
CAGR 2013-
2018
Dynamic Threat Landscape
Increasing Threat Sophistication
Risks to Service Providers
and Their Customers
In Spite of Layers of Defense
Malware is getting
through control
based defenses
Malware
Prevention
is NOT
100%
Breach
Existing tools are
labor intensive and require
expertise
Each stage represents a separate process
silo attackers use to their advantage.
Attack Continuum
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Detect
Block
Defend
DURING
SP’s Are Approaching NFVi & Automation in Multiple Ways
Different solutions required to address different “Buying Centers”
Use Case Specific,
e.g.
vMS, VPC
Orchestration Led
Infrastructure Led
Use Case Led
• Bottom-up approach
• Buying Center – Network &
DC infrastructure team
• Common MANO solution for
different use cases
• Buying Center – NMS/OSS team
• Top-down approach
• Business outcome driven
• Buying Center – BU/Biz Vertical
Includes VNF-
M and NFV
Orchestrator
Hardware, VIM (OpenStack) and SDN Controller
We are leading with
vMS & Mobility
Modular offer with
NSO, ESC, CTCM
Emerging trend,
needs packaging
Infrastructure led approach
aka NFVI is gaining prominence!
Automation & Programmability Security Exploit
AutoSploit automates the exploitation
of remote hosts
Targets are collected automatically
as well by employing the Shodan.io API
Metasploit modules will run
programmatically comparing the name of
the module to the initial search query
It’s all about context
Event + network &
user context
Event + network
context
Event
Event: Attempted Privilege Gain
Target: 96.16.242.135
Event: Attempted Privilege Gain
Target: 96.16.242.135 (vulnerable)
Host OS: iPhone
Apps: Mail, Browser, Twitter
Location: Whitehouse, US
Event: Attempted Privilege Gain
Target: 96.16.242.135 (vulnerable)
Host OS: iPhone
Apps: Mail, Browswer, Twitter
Location: Whitehouse, US
User ID: dtrump
Full Name: Donald Trump
Department: Executive Office
Context has the capability of fundamentally changing the interpretation of your event data.
Keys Security Focus
Visibility
“See Everything”
Complete visibility of users, devices,
networks, applications, workloads
and processes
Threat protection
“Stop the Breach”
Quickly detect, block, and respond to
attacks before hackers can steal data
or disrupt operations
Segmentation
“Reduce the Attack Surface”
Prevent attackers from moving laterally
east-west with application whitelisting and
micro-segmentation
Gain Visibility, Intelligence, and Automation
Leverage information from other solutions to gain
complete network visibility and security analytics
Company
Host
Everything
must touch
the network
Know
every host
Access Audit
Record every
conversation
Understand
what’s normal
Posture
Get alerted to
change
Detect
Provides unique visibility into
what’s happening across your
entire network
Visibility and
Analytics
Detects anomalies and threats faster
with real-time analysis and advanced
forensics capabilities
Generates notifications
automatically when anomalies are
detected on the network
Network as a Sensor
Consistently Apply Policy, Control Access to Resources, &
Block Attacks
Consistently delivers security
policy across branch, campus, data
center, and cloud
Simplifies network
segmentation with a software-
defined approach
Shrinks the attack surface
by preventing lateral movement of
potential threats
TrustSec
Segmentation Policy Enforced Across the Extended Network
Switch Router VPN and
Firewall
DC Switch Wireless
Controller
Control access to network segments and resources
according to your security policy by working with ISENetwork as an Enforcer
The Need For Integrated Threat Defense
Integrated Management
Global & Local Threat Intelligence
Raw Data Threat Research Analytics
Network Platforms Cloud Platform Endpoint Platform
Services
DDoS | WAF | LB/ADC | Anti-Virus | SaaS Visib | DLP | FPC
FW/NGFW | NGIPS | Web | Email | Adv. Malw | Access
Shrink the Time to Detect and Contain
Shared Visibility and Context, Analytics, and Automation
Telemetry
Intelligence
SERVICES
LAYER
ANALYTICS
LAYER
ENFORCEMENT
LAYER
Behavioral Threat
Analytics
Network Behavioral
Analytics
Network Enforcement
& Malware Detection
Malware Sandboxing
(Adv. Threat Protect.)
Integration Through Context Sharing
CoA Triggered
ISE through pxGrid receives information
on threat
User Isolated
Change Authorization of machine
causing issue
SIEM
Firepower
Firewall
Custom
Detection
Stealthwatch
Network
Switch Router DC FW DC SwitchWireless
Network as an Enforcer ThreatSecurity Intelligence
Automatic or Initiated by IT Admin
~5 Seconds
ISE
pxGrid
Get Information
Solutions such as Vulnerability
Assessment, Firepower, Stealthwatch
detect malicious activity
SecuringAutomation & Programmability Network
Multiple layers of security to protect NFVi & SDN
1
2
7
3
5
4
6
1. Securing Controller
2. Securing Infrastructure
3. Securing Network Services
4. Securing Application
5. Securing Management &
Orchestration
6. Securing API
7. Securing Communication
8. Security Technologies
8
Securing Infrastructure
▪ Secure Operation
• Keep device OS up to date
• Monitor PSIRT and perform
bug scrub
• Centralize log collection and
monitoring
• Configuration Management
▪ Management Plane
• Use secure protocols to
manage Infrastructure: SSH,
SCP, HTTPs, SNMPv3, with
ACL to restrict access
• Control management and
monitor session with AAA
• Use encrypted local password
• Protect Console, AUX and
VTY
• Disable unused services, no
initial configuration via TFTP
▪ Control Plane
• Protect control plane: CoPP,
Routing protocol Security,
FHRP security
• ICMP redirects, icmp
unreachable, proxy arp
• Securing routing protocols:
peer authentication, route
filtering, managing resource
consumption
▪ Data Plane
• Protect data plane: DAI, IP
Source Guard, Port Security,
unicast RPF etc.
• Infrastructure ACLs, any-
spoofing ACLs, for Hardening
of devices
• Disable IP source routing
• Private VLAN
▪ Application Security
• Digital Signing of Code
• Certification Process
• Resource Allocation
• Code Isolation
• Strong Typing
• AAA (PKI)
▪ Underlying platform Security
• Keep system updated apply patches & fixes
• Strong password
• Disable unnecessary protocols, Services and ports
• Authentication, Authorization and Accounting, with RBAC
• Enable host based firewall, allow only required ports
SecuringApplication, Services & Software Development Life Cycle
▪ Secure Development Lifecycle
• Threat Modeling
• Understanding and prioritizing risk
• Threat, Mitigation, Test
▪ Secure Design Principles
• Principle of Least Privilege
• Fail Safely
• Economy of Mechanism
• Avoid (in)Security by Obscurity
• Psychological Acceptability
• Defense in Depth
• Perform Static Code Analysis: Buffer Overflow, Resource Leaks, Null Pointer Deference
• Follow Secure Coding Guidelines
Cisco Secure Development Lifecycle (CSDL)
Securing Orchestration /Automation / Provisioning/API & Communications
• Orchestration and Automation servers should
reside on a secure management network,
protected by firewall.
• Use Authentication , Authorization and
Accounting, assign Role Base Access
Control, least privilege
• Ensure hardening of underlying platform:
Disable unused services, configure host
based firewall and allow only required ports,
Use logging and monitoring, use NTP
• Enforce strong passwords
• Use secure communication protocols
between portal, orchestrator and element
managers
• Ensure configuration and change
management is in place.
• Consider High Availability solution
• Use authentication and authorization
• Use encryption: Transport Layer Security, SSL, SSH, HTTPS
• Revocation of Access and authorization using OCSP.
• Proactively using policy or reactively as mitigation option to an
attack
• Logging of authentication and authorization
• Manageability / Scalability
Transport
Attack
• URL/message body
modification
• learn confidential information
Mitigation
• Use secure transport (https)
• Education
Attack
• Denial of Service
• Too many messages
• Too many connections
• Very large payloads
• Crafted inputs that can
cause system crashes
Mitigation:
• Rate limiting
• Threat Analysis of your
infrastructure
• Input validations
Infrastructure
Attacks
• Brute force
• Phishing
• Privilege escalation
Mitigation
• Strong authentication
• RBA
• Least privilege principle
• Info leakage via payload or
error messages.
• Review outbound data
(error messages, payload)
Authorization and
Authentication
Attack
• SQL injections
• XSS
• Buffer overflow attacks
Mitigation:
https://www.owasp.org/index.php/REST_Security_Cheat_Sheet
Input Validation
MnT
FMC
Controller
WWW
NGFW
2. Correlation Rules
Trigger Remediation Action
3. pxGrid EPS Action:
Quarantine + Re-Auth
1. Security Events /
IOCs Reported
i-Net
Servers
Or
End User
MnT
FMC
Controller
WWW
NGFW
4. Endpoint Assigned
Quarantine + CoA-Reauth
Sent
i-Net
Servers
Or
End User
FMC
Controller
WWW
NGFW
i-Net
Flow Collector
1. SW is Analyzing Flows from
Flow Collector
2. SW is Also Merging Identity
Data from ISE
3. Admin is Alerted of
Suspicious Behavior
4. Admin Initiates Endpoint
Quarantine
(EPS over pxGrid)
5. Endpoint
Assigned
Quarantine +
CoA-Reauth Sent
Servers
Or
End User
FMC
Controller
WWW
NGFW
i-Net
Flow Collector
New Traffic Rules apply to the new
state of the endpoint
6a. Could Deny Access
(ingress)
6b. Could Filter it within
network (egress)
6b. Could Filter it within
network (egress)
Servers
Or
End User
MnT
FMC
Threat Intelligence Integration
Controller
WWW
NGFW
2. Correlation Rules
Trigger Remediation
Action
3. pxGrid EPS Action:
Quarantine + Re-Auth
i-Net
1. Threat /
IOCs Reported
Servers
Or
End User
MnT
FMC
Controller
WWW
NGFW
4. Endpoint Assigned
Quarantine + CoA-Reauth Sent
i-Net
Threat Intelligence Integration
Servers
Or
End User
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Shared intelligence
Shared contextual
awareness
Consistent policy
enforcement
Firepower Management Center
Talos
Firepower 4100 Series Firepower 9300 Platform
Visibility
Radware
DDoS
Network
analysis Email Threats
Identity &
NAC DNS FirewallURL
Summary: Advanced Intelligence & Integrated Defense
Validated By EANTC/Light Reading
Enterprise, Endpoints &
Sensors
Access Transport – Core & SP DC/Cloud
Leased BH
or Internet
Managementand
Orchestration
1
23 3 4
5
1
2
3
4
5
Security effectiveness
Chaining and stitching
Orchestrating in SDN and NFV
Multi-tenant
Performance, scalability, and resiliency
http://www.lightreading.com/nfv/nfv-tests-and-trials/testing-ciscos-virtualized-security-products/v/d-id/721575?
Cisco Connect 2018 Thailand - Security automation and programmability mr. khoo boo leng_cisco

More Related Content

PPT
Redefining Endpoint Security
Burak DAYIOGLU
 
PDF
Whitepaper IBM Qradar Security Intelligence
Camilo Fandiño Gómez
 
PPT
Auditing Check Point Firewalls
Ben Rothke
 
PDF
Complete Endpoint protection
xband
 
PPTX
IBM QRadar Xforce
sreenivas1591
 
PDF
Data Center Server security
xband
 
PDF
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
PDF
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
Redefining Endpoint Security
Burak DAYIOGLU
 
Whitepaper IBM Qradar Security Intelligence
Camilo Fandiño Gómez
 
Auditing Check Point Firewalls
Ben Rothke
 
Complete Endpoint protection
xband
 
IBM QRadar Xforce
sreenivas1591
 
Data Center Server security
xband
 
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 

What's hot (20)

PDF
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Andris Soroka
 
PPT
Palo alto networks next generation firewalls
Castleforce
 
PPTX
Detección y mitigación de amenazas con Check Point
Nextel S.A.
 
PPTX
Owasp Proactive Controls for Web developer
Sameer Paradia
 
PDF
Cloud Security - Made simple
Sameer Paradia
 
PDF
2012-12-12 Seminar McAfee ESM
Pinewood
 
PDF
UTM Cyberoam
Rodrigo Martini
 
PDF
Check point presentation june 2014
David Berkelmans
 
PDF
Cheatsheet for your cloud project
Petteri Heino
 
PDF
Redefining siem to real time security intelligence
Brendaly Marcano
 
PPTX
Check Point designing a security
Group of company MUK
 
PPTX
Multi domain security-management_technical_presentation
davebrosnan
 
PPTX
ICS case studies v2
Nguyen Binh
 
PPTX
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 
PDF
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
 
PPTX
Discover Synchronized Security - Sophos Day Netherlands
Sophos Benelux
 
PDF
MID_SIEM_Boubker_EN
Vladyslav Radetsky
 
PPTX
Beginner's Guide to SIEM
AlienVault
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Andris Soroka
 
Palo alto networks next generation firewalls
Castleforce
 
Detección y mitigación de amenazas con Check Point
Nextel S.A.
 
Owasp Proactive Controls for Web developer
Sameer Paradia
 
Cloud Security - Made simple
Sameer Paradia
 
2012-12-12 Seminar McAfee ESM
Pinewood
 
UTM Cyberoam
Rodrigo Martini
 
Check point presentation june 2014
David Berkelmans
 
Cheatsheet for your cloud project
Petteri Heino
 
Redefining siem to real time security intelligence
Brendaly Marcano
 
Check Point designing a security
Group of company MUK
 
Multi domain security-management_technical_presentation
davebrosnan
 
ICS case studies v2
Nguyen Binh
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
 
Discover Synchronized Security - Sophos Day Netherlands
Sophos Benelux
 
MID_SIEM_Boubker_EN
Vladyslav Radetsky
 
Beginner's Guide to SIEM
AlienVault
 
Ad

Similar to Cisco Connect 2018 Thailand - Security automation and programmability mr. khoo boo leng_cisco (20)

PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
PDF
Revolutionizing Advanced Threat Protection
Blue Coat
 
PPTX
Security and-visibility
edwardstudyemai
 
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
PPTX
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
PPTX
Hyper Secure Converged Infrastructure solves architectural challenges
Kim Bookout
 
PPSX
Cloud monitoring - An essential Platform Service
Soumitra Bhattacharyya
 
PDF
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
PPTX
Social Distance Your IBM i from Cybersecurity Risk
Precisely
 
PDF
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
PPTX
network security / information security
Rohan Choudhari
 
PDF
Security On The Cloud
Tu Pham
 
PDF
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
NetworkCollaborators
 
PPT
Information Security
Mohit8780
 
PDF
Security Delivery Platform: Best practices
Mihajlo Prerad
 
PPT
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
Revolutionizing Advanced Threat Protection
Blue Coat
 
Security and-visibility
edwardstudyemai
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Hyper Secure Converged Infrastructure solves architectural challenges
Kim Bookout
 
Cloud monitoring - An essential Platform Service
Soumitra Bhattacharyya
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
Social Distance Your IBM i from Cybersecurity Risk
Precisely
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
network security / information security
Rohan Choudhari
 
Security On The Cloud
Tu Pham
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
NetworkCollaborators
 
Information Security
Mohit8780
 
Security Delivery Platform: Best practices
Mihajlo Prerad
 
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Ad

More from NetworkCollaborators (20)

PDF
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Do more than keep the lights on
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - jordan koh
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - The Network Intuitive
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Cisco SD-WAN
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Cisco Software Defined Access
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - En06 jason pernell
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - delivering intent for data center networking
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - ben green
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - do more than keeping the lights on
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - jaymen quah
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - The workplace of the future
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
NetworkCollaborators
 
Cisco Connect 2018 Singapore - jordan koh
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
 
Cisco Connect 2018 Singapore - The Network Intuitive
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
NetworkCollaborators
 
Cisco Connect 2018 Singapore - En06 jason pernell
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
NetworkCollaborators
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
NetworkCollaborators
 
Cisco Connect 2018 Philippines - ben green
NetworkCollaborators
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
NetworkCollaborators
 
Cisco Connect 2018 Philippines - jaymen quah
NetworkCollaborators
 
Cisco Connect 2018 Philippines - The workplace of the future
NetworkCollaborators
 

Recently uploaded (20)

PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
The Future of Artificial Intelligence (AI)
Mukul
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Software Development Methodologies in 2025
KodekX
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 

Cisco Connect 2018 Thailand - Security automation and programmability mr. khoo boo leng_cisco

  • 2. Automation & Programmability Network Security Khoo Boo Leng ([email protected]) Technical Solution Architect APJ GSP Architecture
  • 3. Digitization Is Disrupting The SP business The world has gone mobile Traffic growth, driven by video Rise of cloud computing Machine-to-Machine Changing Customer Expectations Ubiquitous Access to Apps & Services 10X Mobile Traffic Growth From 2013-2019 Changing Enterprise Business Models Efficiency & Capacity Soon to Change SP Architectures/ Service Delivery Emergence of the Internet of Everything Process ThingsPeople Data PetabytesperMonth Other (43%, 25%)120,000 100,000 80,000 60,000 40,000 20,000 0 Internet Video (57%, 75%) 2013 2014 2015 2016 2017 2018 23% Global CAGR 2013- 2018 Dynamic Threat Landscape Increasing Threat Sophistication Risks to Service Providers and Their Customers
  • 4. In Spite of Layers of Defense Malware is getting through control based defenses Malware Prevention is NOT 100% Breach Existing tools are labor intensive and require expertise Each stage represents a separate process silo attackers use to their advantage. Attack Continuum BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend DURING
  • 5. SP’s Are Approaching NFVi & Automation in Multiple Ways Different solutions required to address different “Buying Centers” Use Case Specific, e.g. vMS, VPC Orchestration Led Infrastructure Led Use Case Led • Bottom-up approach • Buying Center – Network & DC infrastructure team • Common MANO solution for different use cases • Buying Center – NMS/OSS team • Top-down approach • Business outcome driven • Buying Center – BU/Biz Vertical Includes VNF- M and NFV Orchestrator Hardware, VIM (OpenStack) and SDN Controller We are leading with vMS & Mobility Modular offer with NSO, ESC, CTCM Emerging trend, needs packaging Infrastructure led approach aka NFVI is gaining prominence!
  • 6. Automation & Programmability Security Exploit AutoSploit automates the exploitation of remote hosts Targets are collected automatically as well by employing the Shodan.io API Metasploit modules will run programmatically comparing the name of the module to the initial search query
  • 7. It’s all about context Event + network & user context Event + network context Event Event: Attempted Privilege Gain Target: 96.16.242.135 Event: Attempted Privilege Gain Target: 96.16.242.135 (vulnerable) Host OS: iPhone Apps: Mail, Browser, Twitter Location: Whitehouse, US Event: Attempted Privilege Gain Target: 96.16.242.135 (vulnerable) Host OS: iPhone Apps: Mail, Browswer, Twitter Location: Whitehouse, US User ID: dtrump Full Name: Donald Trump Department: Executive Office Context has the capability of fundamentally changing the interpretation of your event data.
  • 8. Keys Security Focus Visibility “See Everything” Complete visibility of users, devices, networks, applications, workloads and processes Threat protection “Stop the Breach” Quickly detect, block, and respond to attacks before hackers can steal data or disrupt operations Segmentation “Reduce the Attack Surface” Prevent attackers from moving laterally east-west with application whitelisting and micro-segmentation
  • 9. Gain Visibility, Intelligence, and Automation Leverage information from other solutions to gain complete network visibility and security analytics Company Host Everything must touch the network Know every host Access Audit Record every conversation Understand what’s normal Posture Get alerted to change Detect Provides unique visibility into what’s happening across your entire network Visibility and Analytics Detects anomalies and threats faster with real-time analysis and advanced forensics capabilities Generates notifications automatically when anomalies are detected on the network Network as a Sensor
  • 10. Consistently Apply Policy, Control Access to Resources, & Block Attacks Consistently delivers security policy across branch, campus, data center, and cloud Simplifies network segmentation with a software- defined approach Shrinks the attack surface by preventing lateral movement of potential threats TrustSec Segmentation Policy Enforced Across the Extended Network Switch Router VPN and Firewall DC Switch Wireless Controller Control access to network segments and resources according to your security policy by working with ISENetwork as an Enforcer
  • 11. The Need For Integrated Threat Defense Integrated Management Global & Local Threat Intelligence Raw Data Threat Research Analytics Network Platforms Cloud Platform Endpoint Platform Services DDoS | WAF | LB/ADC | Anti-Virus | SaaS Visib | DLP | FPC FW/NGFW | NGIPS | Web | Email | Adv. Malw | Access Shrink the Time to Detect and Contain Shared Visibility and Context, Analytics, and Automation Telemetry Intelligence SERVICES LAYER ANALYTICS LAYER ENFORCEMENT LAYER Behavioral Threat Analytics Network Behavioral Analytics Network Enforcement & Malware Detection Malware Sandboxing (Adv. Threat Protect.)
  • 12. Integration Through Context Sharing CoA Triggered ISE through pxGrid receives information on threat User Isolated Change Authorization of machine causing issue SIEM Firepower Firewall Custom Detection Stealthwatch Network Switch Router DC FW DC SwitchWireless Network as an Enforcer ThreatSecurity Intelligence Automatic or Initiated by IT Admin ~5 Seconds ISE pxGrid Get Information Solutions such as Vulnerability Assessment, Firepower, Stealthwatch detect malicious activity
  • 13. SecuringAutomation & Programmability Network Multiple layers of security to protect NFVi & SDN 1 2 7 3 5 4 6 1. Securing Controller 2. Securing Infrastructure 3. Securing Network Services 4. Securing Application 5. Securing Management & Orchestration 6. Securing API 7. Securing Communication 8. Security Technologies 8
  • 14. Securing Infrastructure ▪ Secure Operation • Keep device OS up to date • Monitor PSIRT and perform bug scrub • Centralize log collection and monitoring • Configuration Management ▪ Management Plane • Use secure protocols to manage Infrastructure: SSH, SCP, HTTPs, SNMPv3, with ACL to restrict access • Control management and monitor session with AAA • Use encrypted local password • Protect Console, AUX and VTY • Disable unused services, no initial configuration via TFTP ▪ Control Plane • Protect control plane: CoPP, Routing protocol Security, FHRP security • ICMP redirects, icmp unreachable, proxy arp • Securing routing protocols: peer authentication, route filtering, managing resource consumption ▪ Data Plane • Protect data plane: DAI, IP Source Guard, Port Security, unicast RPF etc. • Infrastructure ACLs, any- spoofing ACLs, for Hardening of devices • Disable IP source routing • Private VLAN
  • 15. ▪ Application Security • Digital Signing of Code • Certification Process • Resource Allocation • Code Isolation • Strong Typing • AAA (PKI) ▪ Underlying platform Security • Keep system updated apply patches & fixes • Strong password • Disable unnecessary protocols, Services and ports • Authentication, Authorization and Accounting, with RBAC • Enable host based firewall, allow only required ports SecuringApplication, Services & Software Development Life Cycle ▪ Secure Development Lifecycle • Threat Modeling • Understanding and prioritizing risk • Threat, Mitigation, Test ▪ Secure Design Principles • Principle of Least Privilege • Fail Safely • Economy of Mechanism • Avoid (in)Security by Obscurity • Psychological Acceptability • Defense in Depth • Perform Static Code Analysis: Buffer Overflow, Resource Leaks, Null Pointer Deference • Follow Secure Coding Guidelines Cisco Secure Development Lifecycle (CSDL)
  • 16. Securing Orchestration /Automation / Provisioning/API & Communications • Orchestration and Automation servers should reside on a secure management network, protected by firewall. • Use Authentication , Authorization and Accounting, assign Role Base Access Control, least privilege • Ensure hardening of underlying platform: Disable unused services, configure host based firewall and allow only required ports, Use logging and monitoring, use NTP • Enforce strong passwords • Use secure communication protocols between portal, orchestrator and element managers • Ensure configuration and change management is in place. • Consider High Availability solution • Use authentication and authorization • Use encryption: Transport Layer Security, SSL, SSH, HTTPS • Revocation of Access and authorization using OCSP. • Proactively using policy or reactively as mitigation option to an attack • Logging of authentication and authorization • Manageability / Scalability
  • 17. Transport Attack • URL/message body modification • learn confidential information Mitigation • Use secure transport (https) • Education Attack • Denial of Service • Too many messages • Too many connections • Very large payloads • Crafted inputs that can cause system crashes Mitigation: • Rate limiting • Threat Analysis of your infrastructure • Input validations Infrastructure Attacks • Brute force • Phishing • Privilege escalation Mitigation • Strong authentication • RBA • Least privilege principle • Info leakage via payload or error messages. • Review outbound data (error messages, payload) Authorization and Authentication
  • 18. Attack • SQL injections • XSS • Buffer overflow attacks Mitigation: https://www.owasp.org/index.php/REST_Security_Cheat_Sheet Input Validation
  • 19. MnT FMC Controller WWW NGFW 2. Correlation Rules Trigger Remediation Action 3. pxGrid EPS Action: Quarantine + Re-Auth 1. Security Events / IOCs Reported i-Net Servers Or End User
  • 20. MnT FMC Controller WWW NGFW 4. Endpoint Assigned Quarantine + CoA-Reauth Sent i-Net Servers Or End User
  • 21. FMC Controller WWW NGFW i-Net Flow Collector 1. SW is Analyzing Flows from Flow Collector 2. SW is Also Merging Identity Data from ISE 3. Admin is Alerted of Suspicious Behavior 4. Admin Initiates Endpoint Quarantine (EPS over pxGrid) 5. Endpoint Assigned Quarantine + CoA-Reauth Sent Servers Or End User
  • 22. FMC Controller WWW NGFW i-Net Flow Collector New Traffic Rules apply to the new state of the endpoint 6a. Could Deny Access (ingress) 6b. Could Filter it within network (egress) 6b. Could Filter it within network (egress) Servers Or End User
  • 23. MnT FMC Threat Intelligence Integration Controller WWW NGFW 2. Correlation Rules Trigger Remediation Action 3. pxGrid EPS Action: Quarantine + Re-Auth i-Net 1. Threat / IOCs Reported Servers Or End User
  • 24. MnT FMC Controller WWW NGFW 4. Endpoint Assigned Quarantine + CoA-Reauth Sent i-Net Threat Intelligence Integration Servers Or End User
  • 25. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Shared intelligence Shared contextual awareness Consistent policy enforcement Firepower Management Center Talos Firepower 4100 Series Firepower 9300 Platform Visibility Radware DDoS Network analysis Email Threats Identity & NAC DNS FirewallURL Summary: Advanced Intelligence & Integrated Defense
  • 26. Validated By EANTC/Light Reading Enterprise, Endpoints & Sensors Access Transport – Core & SP DC/Cloud Leased BH or Internet Managementand Orchestration 1 23 3 4 5 1 2 3 4 5 Security effectiveness Chaining and stitching Orchestrating in SDN and NFV Multi-tenant Performance, scalability, and resiliency http://www.lightreading.com/nfv/nfv-tests-and-trials/testing-ciscos-virtualized-security-products/v/d-id/721575?