160 likes | 252 Views
Managing Secure Networks. Matthew G. Marsh Chief Scientist, NEbraskaCERT President, Paktronix Systems LLC. Note: Use of this material is restricted to acceptable use as defined in the document titled "Acceptable Use of NEbraskaCERT Educational Materials". Overview.
E N D
Managing Secure Networks Matthew G. Marsh Chief Scientist, NEbraskaCERT President, Paktronix Systems LLC Note: Use of this material is restricted to acceptable use as defined in the document titled "Acceptable Use of NEbraskaCERT Educational Materials"
Overview • Principle of Inviolability • PoI - Definitions • Integrated Security Network • Security Blueprint • Network Design • Logical & I/O Design • Management Techniques • Baseline • SNMP • Logging • Fail safes/overs • CIA • Example
Principle of Inviolability An object is considered Inviolate when all communication with that object is provably limited to the scope of service provided by that object.
PoI - Definitions • Object • The entire set of devices/networks/etc that can be encapsulated by a defined boundry. • Communication • Any Input/Output through the boundary • Provably Limited • Both theory AND practice confirm the Communication and Boundary scopes. • Scope of Service • What the object provides through the boundary
Integrated Security Network • Fulfills PoI as an Object • Internally PoI consistent • Each internal object fulfills PoI • Defined Scope of Interaction • Security Blueprint
Security Blueprint • Define System/Network Boundary • PoI vs. Connectivity • Structure • Physical and Logical • Verification • Audit, Responsibilities • Define Devices/Services • PoI Dis- & Con- crete
Network Design • Physical Design • Secured Access Methods • Consideration of OS needs • Logical Design • Protocols • Control • InBand • OutBand • I/O Access • Public • Private • Secured
Logical & I/O Design • Protocols • IP, IPX, NetB{ios,uei} • Tuesday... • Control • InBand • VPN, SSH, VNC, ... • OutBand • Serial, Tunnelled Console • I/O Access (PoI) • Public • Private • Secured
Management Techniques • Baselines • SNMP • Remote Console Access • Logging • FailSafes/FailOvers
Baseline • Part of the Security Blueprint • Proof of ISN certification • Each Dis/Con crete element • PreLive Environment • Saturation and Failure modes • PostLive Environment • Verification and external awareness • OnGoing • New Structures and Additions/Subtractions
SNMP • V 1,2,3,... • What version does what • What does it really tell you • OS Support • Failure modes • Notification • OnGoing • New Structures and Additions/Subtractions • Historical Data (Baselines...)
Logging • Part of the Security Blueprint • Proof of ISN certification • Each Dis/Con crete element • Access Modes • In Band / Out Band • OS Support • Verification and external awareness • Analysis • Structures, Storage, Sync
Fail safe/over • Part of the Security Blueprint • Proof of ISN certification • Each Dis/Con crete element • PreLive Environment • Saturation and Failure modes • PostLive Environment • Verification and awareness • OnGoing • New Structures and Additions/Subtractions
CIA • Confidentiality • Verify who saw the data • Integrity • Verify the data is not modified • Authenticity • Verify the data owner • Cranial Inspection Authority
Protocol Usage Matthew G. Marsh Chief Scientist, NEbraskaCERT President, Paktronix Systems LLC chief.scientist@nebraskacert.org