E N D
Enhancing Security through Policy Orchestration Ingo Schaefer Jan 2014 - Company Confidential -
Click to edit Master title style Myth: Getting state-of-the-art Firewalls will keep the organization Secured from hackers… Tufin Confidential © 2014 2
Click to edit Master title style Introducing Operation “Ke3chang” Tufin Confidential © 2014 3
Click to edit Master title style Operation “Ke3chang” Tufin Confidential © 2014 4
Click to edit Master title style Operation “Ke3chang” Highlights • Operation targeted Government Networks in several European countries • Finance Ministries in Europe attacked before G20 meetings in Russia, Paris and Ireland • Attacks on Ministries of Foreign Affairs in Czech Republic, Portugal, Bulgaria, Latvia, Hungary and more • Attack also targeted private sector industries in Europe (Aerospace, chemical, consulting and high-tech industries) • Started in 2010 until August 2013 • Discovered by FireEye research team • Attack is linked to China… • Additional Information • 22 known CnCs • 3 Zero-Day vulnerabilities • Over 3 years… Tufin Confidential © 2014 5
Click to edit Master title style Anatomy of a Cyber Attack 1 2 3 4 5 Zero-Day Attack Lateral Movement Data Gathering Data Phishing Exfiltration A handful of users are targeted for phishing attacks User opens zero day attack payload and malware is installed Attacker elevates access to important user, service and admin Data is exfiltrated to external site Data is acquired from targeted systems and staged for exfiltration Phishing Phishing Phishing accounts Phishing Phishing Tufin Confidential © 2014 6
Click to edit Master title style How did it happen? 1 2 3 4 5 Zero-Day Attack Lateral Movement Data Gathering Data Phishing Exfiltration Target users receive phishing emails (e.g. about US military intervention in Syria etc.) 3 zero day attacks used to infect computers; Backdoor is installed on infected Attacker gathers information about compromised system & network and steals logon RAR files are uploaded to CnC and local copy deleted Target files are copied and RARed in the network using network shares Phishing Phishing computers Phishing credentials and move laterally in the network Phishing Phishing Tufin Confidential © 2014 7
Click to edit Master title style How did it happen? 1 2 3 4 5 Zero-Day Attack Lateral Movement Data Gathering Data Phishing Exfiltration Target users receive phishing emails (e.g. about US military intervention in Syria etc.) 3 zero day attacks used to infect computers; Backdoor is installed on infected Attacker gathers information about compromised system & network and steals logon RAR files are uploaded to CnC and local copy deleted Target files are copied and RARed in the network using network shares Phishing Phishing computers Phishing credentials and move laterally in the network Phishing Phishing Tufin Confidential © 2014 8
Click to edit Master title style What could have been… 1 2 3 4 5 Zero-Day Attack Lateral Movement Data Gathering Data Phishing Exfiltration Phishing Phishing Phishing Phishing Phishing Better of security management & network segmentation could have contained and limited the attack Tufin Confidential © 2014 9
Click to edit Master title style Myth: Getting state-of-the-art Firewalls will keep the organization Secured from hackers… Tufin Confidential © 2014 10
Why is Security Management & Network Click to edit Master title style Segmentation So Hard? Complexity Complex networks with hundreds of devices Complicated Security Policies with hundreds of rules Change Dozen of changes per week to support new business applications Technology New technologies (e.g. Virtualization, Cloud, etc.) are a force multiplier for Complexity and Change Tufin Confidential © 2014 11
Click to edit Master title style Tufin Orchestration Suite – Security Benefits Tufin enhances Network Security by automating the change process with “baked-in” security checks Security Checks Automated Process Controlled and automated process increases overall Security Integrated Security- checks increase overall Security Tufin Confidential © 2014 12
Click to edit Master title style Automated Process Controlled and automated change process • Automatic device selection based on topology • Automatic rules & policy recommendations • Automatic provisioning on target devices • Automatic documentation & audit trail More Control Better Security Automation Less Human Errors Fast implementation Tufin Confidential © 2014 13
Click to edit Master title style Security Checks Integrated Security checks as part of change process • Customized Black/White lists capabilities • Real-time monitoring of security policy and best practices violations • Risk validations as part of workflow process • Detailed Security report Security “baked-in” as part of the change process increases overall Security Tufin Confidential © 2014 14
Click to edit Master title style Summary Tufin enables organizations to: • Deliver connectivity solutions at the speed of business • Create an integrated and automated management platform • Collaborate and communicate effectively across teams • Automate the network change process • Enhance overall Network Security with Change Automation & Security Policy Analytics! Tufin Confidential © 2014 15