360 likes | 521 Views
Policy Usecases. May 201 4. Usecases. Prestaged Policies Multi -tier Cloud Access Control Enterprise Access Control Enterprise Access Hierarchical resources Access Enterprise Access Hierarchical resources overlap Enterprise Access Hierarchical resources conflict
E N D
Policy Usecases May 2014
Usecases • Prestaged Policies • Multi-tier Cloud Access Control • Enterprise Access Control • Enterprise Access Hierarchical resources Access • Enterprise Access Hierarchical resources overlap • Enterprise Access Hierarchical resources conflict • Enterprise user accessing multiple resources • Exclusion for one user • Access based on hierarchical user-groups • Access based on overlapping user groups • Additional scan for high value end points. • Enterprise Access Accounting • On-Demand Policies • WAN routing optimization • Threat itigation • Application experience: Unified Communication
Usecase 1.1: Multi-tier Cloud Access Control VMM Domain Bridge Domain vCenter Subnets Application External Network Web App DB Middleware Oracle HTTP VM VM VM
Usecase 1.1: Multi-tier Cloud Access Control: Broad Access Control Example
Usecase 1.1: Multi-tier Cloud Access Control: Web-tier access PCI-Access PCI-User PCI-Web-Svr Selector: Name: PCI-Access Subject: Web Consumes Provides Selector: Name: PCI-Access Filter: Web Ports Action: Permit Profiles: Firewall, IPS, Premium Path EPg EPg Contract Rule 1:
Usecase 1.1: Multi-tier Cloud Access Control: App-tier access PCI-App-Access PCI-Web-Svr PCI-App-Svr Selector: Name: PCI-App-Access • Subject: App Consumes Provides Selector: Name: PCI-App-Access Filter: App-ports Action: Permit EPg EPg Contract Rule 2
Usecase 1.1: Multi-tier Cloud Access Control: DB-tier access PCI-DB-Access PCI-App-Svr PCI-DB Selector: Name: PCI-DB-Access Subject: DB Consumes Provides Selector: Name: PCI-DB-Access Filter: DB-ports Action: Permit EPg EPg Contract Rule 3
Usecase 1.1: Multi-tier Cloud Access Control: User-tier access PCI-User-Access Employee PCI-User Selector: Name: PCI—User-Access Subject: non-anti-malware Consumes Provides Selector: Name: PCI-User-Access Filter: NOT (Anti-malware (ssh, telnet, snmp, ping)) Action: Permit EPg EPg Contract Rule 4 Open issue on Action & Filters on contracts
Usecase1.2: Enterprise Hierarchical Resource Access Contract A Users Subject: HTTP Cons Label: Producer Label Action: i.e. low Security India-Emp Local HR EP EP EP EP US-Emp High Reputation 3 Dimensions on Producer side: -Type of site: HR, Wiki -Hosting: Local or Cloud -Reputation: High or Low EP Low Reputation Wiki EP EP Cloud Local Web Local On Prem Outside
Usecase1.2.1: Enterprise Hierarchical Resource Access Contract A Users Subject: HTTP_low Action: i.e. Low Security India-Emp Local HR EP EP Condition Matcher: & Cloud Condition Matcher: & Local Condition Matcher: India-Emp Condition Matcher: HR Subject: HTTP_Hi Action: i.e. High Security EP EP Rules: 1. India-Emp & On prem HR hosted Local -> Subject HTTP_low 2. India-Emp anywhere Wiki hosted Cloud -> Subject HTTP_Hi 3. US emp to HR & Cloud -> Subject HTTP_low Selector: Name= “A”, Match= named Selector: Name= “A” Match= named US-Emp Condition Matcher: US-Emp EP Wiki Condition Matcher: Wiki Condition Matcher: & Cloud EP Selector: Name= “A” Match= named EP Selector: Name= “A” Match= named Cloud Local Web Local On Prem Outside
Usecase1.2.1: Enterprise Hierarchical Resource Access Contract A Users Subject: HTTP_low Action: i.e. Low Security India-Emp Local HR EP EP Condition Matcher: & Cloud Condition Matcher: & Local Condition Matcher: India-Emp Condition Matcher: HR Subject: HTTP_Hi Action: i.e. High Security EP Selector: Name= “A” Match= named EP Rules: India-Emp & On prem HR hosted Local -> Subject HTTP_low India-Emp anywhere Wiki hosted Cloud -> Subject HTTP_Hi US emp to HR & Cloud || High Reputation) -> Subject HTTP_low Selector: Name= “A”, Match= named Condition Matcher: & High Reputation US-Emp Condition Matcher: US-Emp EP Wiki Condition Matcher: Wiki Condition Matcher: & Cloud EP Selector: Name= “A” Match= named EP Selector: Name= “A” Match= named Cloud Local Web Local On Prem Outside
Usecase1.2.2: Enterprise Hierarchical Resource Access: Overlap Contract A Redundant Users Subject: HTTP_low Action: i.e. Low Security India-Emp Local HR EP EP Condition Matcher: & Cloud Condition Matcher: & Local Condition Matcher: India-Emp Condition Matcher: HR Subject: HTTP_Hi Action: i.e. High Security EP Selector: Name= “A” Match= named EP • Rules: • Cisco-Emp -> HR • -> Subject HTTP_low • India-Emp & On prem • HR hosted Local • -> Subject HTTP_low • US emp to HR & Cloud || High Reputation) • -> Subject HTTP_low • India-Emp anywhere Wiki hosted Cloud • -> Subject HTTP_Hi Selector: Name= “A”, Match= named Condition Matcher: & High Reputation US-Emp Condition Matcher: US-Emp EP Wiki Condition Matcher: Wiki Condition Matcher: & Cloud EP Selector: Name= “A” Match= named EP Selector: Name= “A” Match= named Cloud Local Web Local On Prem Outside
Usecase1.2.3: Enterprise Hierarchical Resource Access: Conflict Contract A Redundant Users Subject: HTTP_low Action: i.e. Low Security India-Emp Local HR EP EP Condition Matcher: & Cloud Condition Matcher: & Local Condition Matcher: India-Emp Condition Matcher: HR Subject: HTTP_Hi Action: i.e. High Security EP Selector: Name= “A” Match= named EP • Rules: • Cisco-Emp -> HR • -> Subject HTTP_low • India-Emp & On prem • HR hosted Local • -> Subject HTTP_low • IndiaEmp&Outside-> HR& hosted Local • -> withdraw HTTP_low • US emp to HR & Cloud || High Reputation) • -> Subject HTTP_low • India-Emp anywhere Wiki hosted Cloud • -> Subject HTTP_Hi Selector: Name= “A”, Match= named Condition Matcher: & High Reputation US-Emp Condition Matcher: US-Emp EP Wiki Condition Matcher: Wiki Condition Matcher: & Cloud EP Selector: Name= “A” Match= named EP Selector: Name= “A” Match= named Cloud Local Web Local On Prem Outside
Usecase1.2.3: Enterprise Hierarchical Resource Access: Conflict Contract A Redundant Users Subject: HTTP_low Action: i.e. Low Security India-Emp Local HR EP EP Condition Matcher: & Cloud Condition Matcher: & Local Condition Matcher: India-Emp Condition Matcher: HR Subject: HTTP_Hi Action: i.e. High Security EP Selector: Name= “A” Match= named EP • Rules: • 0. Cisco-Emp -> HR • -> Subject HTTP_low • India-Emp & On prem • HR hosted Local • -> Subject HTTP_low • IndiaEmp&Outside-> HR& hosted Local • -> withdraw • HTTP_low • add HTTP_Hi • US emp to HR & Cloud || High Reputation) • -> Subject HTTP_low • India-Emp anywhere Wiki hosted Cloud • -> Subject HTTP_Hi Selector: Name= “A”, Match= named Condition Matcher: & High Reputation US-Emp Condition Matcher: US-Emp EP Wiki Condition Matcher: Wiki Condition Matcher: & Cloud EP Selector: Name= “A” Match= named EP Selector: Name= “A” Match= named Cloud Local Web Local On Prem Outside
Usecase1.2.4: User on multiple projects • Users in Group G1 get access to resources of Project P1 • Users in Group G2 get access to resources of Project P2 • User U1 who is part of G1 is on loan to P2 and needs access to its resources (with limited access) G1 P1 U1 Limited access P2 G2
Usecase1.2.4: User on multiple projects Project-Access G1 P1 Selector: Name: Project-Access Subject: Full-Access Selector: Name: Project-Access Filter: Any Action: Permit Consumes Provides Subject: Limited-Access Filter: Any Action: Permit Profile: Limited U1 P2 G2 Rules: (First-match) 1. U1 P1: Limited-Access 2. G1 P1 : Full-Access 3. G2 P2: Full-Access Selector: Name: Project-Access Provides Consumes Selector: Name: Project-Access
Usecase1.2.5: Exclusion for one user • Users in Group G1 get access to resources of Project P1 • User U1 who is part of G1 is excluded from P1 resources G1 P1 U1
Usecase1.2.5: Exclusion for one user Project-Access G1 P1 Selector: Name: Project-Access Subject: Full-Access Selector: Name: Project-Access Filter: Any Action: Permit Consumes Provides Rules: (First-match) 1. NOT(U1) P1: Full-Access U1
Use case 1.2.6: Access based on hierarchical user-groups • User Group1 has access to all web categories • Everyone else has access to only “Acceptable” web categories All Web Acceptable Web All Users Group1
Use case 1.2.6: Access based on hierarchical user-groups Web-Access All-Users All-Web Selector: Name: Web-Access Subject: Full-Access Selector: Name: Web-Access Filter: Any Action: Permit Consumes Provides Rules: (First-match) Group1 All-Web: Full-Access All-Users Acceptable: Full Access Group1 Producer EP Labels: Acceptable
Use case 1.2.7: Access based on overlapping user-groups • Only PE/Des have access to all wiki • Everyone else has access to only Wiki areas for their own groups All Wiki Engg Wiki All Users PE/DE Engg MktgWiki Mktg
Use case 1.2.7: Access based on overlapping user-groups Wiki-Access Users Wiki Selector: Name: Wiki-Access Subject: Full-Access Selector: Name: Wiki-Access Filter: Wiki-Port Action: Permit Consumes Provides Engg-Wiki Rules: (First-match) 1. PE/DE Wiki: Full-Access 2. Engg-Users Engg-wiki : Full-Access 3. Mktg-Users Mktg-wiki : Full-Access Mktg-Wiki Consumer EP Labels: Engg-Users Mktg-Users PE/DE
Use case 1.2.8: Additional scans for high value endpoints • Do Additional IPS scans for traffic from these endpoints All Internet All Users Extra IPS scans High Value Endpoints Permit
Use case 1.2.8: Additional scans for high value endpoints Web-Access Users internet Selector: Name: Web-Access Subject: Normal-Access Selector: Name: Web-Access Filter: Web Action: Permit Consumes Provides Subject: Access-with-Scan Filter: Web Action: Permit Profile: Hi-IPS-Scan Rules: (First-match) 1. High-Value Internet : Access-with-Scan 2. Users Internet : Normal-Access Consumer EP Labels: High-Value Option 1: Single Contract
Use case 1.2.8: Additional scans for high value endpoints Normal-Web-Access Priority = 0 Users internet Subject: Normal-Access Selector: Name: Normal-Web-Access, Hi-Scan-Web-Access Selector: Name: Normal-Web-Access, Hi-Scan-Web-Access Filter: Web Action: Permit Consumes Provides Rules: (First-match) 1. Users Internet : Normal-Access Provides Hi-Scan-Web-Access Priority = 100 Consumes Subject: Access-with-Scan Filter: Web Action: Permit Profile: Hi-IPS-Scan Consumer EP Labels: High-Value Rules: (First-match) 1. High-Value Internet : Access-with-Scan Option 2: Multiple Contracts
Problem: Priority among Rules Subject: HI_Sec_HTTP Filter: HTTP Action: Hi-Scan Subject: Low_Sec_HTTP Filter: HTTP Action: Low-Scan Subject: Low_Sec_FTP Wiki Cisco Usr Filter: FTP Action: Low-Scan Sales Usr Clause: R1: Sales->Wiki: Subject: HTTP + Hi-scan R2: Cisco ->Wiki: Subject: HTTP + Low-scanSubject: FTP + Low-scan
Usecase: Priority resolution with contract Hierarchy Subject: HI_Sec_HTTP Filter: HTTP Action: Hi-Scan Clauses: (First-match) R1: Sales->Wiki: Subject: HTTP + Hi-scan Contract Restricted Subject: Low_Sec_HTTP Wiki Filter: HTTP Action: Low-Scan Cisco Usr Sales Usr Subject: Low_Sec_FTP Filter: FTP Action: Low-Scan Clauses: (First-match) R2: Cisco ->Wiki: Subject: HTTP + Low-scanSubject: FTP + Low-scan Contract wide
Usecase: 3 level Priority resolution with contract Hierarchy Subject: HI_Hi_Sec_HTTP Filter: HTTP Action: Hi-Hi-Scan Clauses: R1: Sales & Outside ->Wiki: Subject: HTTP + Hi-Hi-scan Contract Further Restricted Subject: HI_Sec_FTP Filter: HTTP Action: Hi-Scan Subject: HI_Sec_HTTP Filter: HTTP Action: Hi-Scan Wiki Clauses: (First-match) R1: Sales->Wiki: Subject: Hi_sec_HTTP Subject: Hi_sec_FTP Cisco Usr Sales Usr Sales Usr Enemy Nation Contract Restricted Subject: Lo_Sec_HTTP Filter: HTTP Action: Lo-Scan Subject: Lo_Sec_FTP Subject: Lo_Sec_SSH Filter: FTP Action: Lo-Scan Filter: SSH Action: Lo-Scan Clauses: (First-match) R2: Cisco ->Wiki: Subject: HTTP + No-scanSubject: FTP + No-scan Subject: SSH+ No-scan Contract wide
Usecase: 3 level Priority resolution with simple priority Subject: Hi_Hi_scan Action: Hi-Hi-Scan Subject: HI_Scan Action: Hi-Scan Subject: Low Scan Wiki Cisco Usr Action: Hi-Scan Sales Usr Sales Usrat Enemy Nation Clauses: R0: Sales, Enemy Nation -> Wiki, HTTP Subject: Hi_Hi_scan R1: Sales, -> Wiki, (HTTP | FTP) Subject: Hi_scan R2: Cisco ->Wiki, (HTTP | FTP|SSH): Subject: Lo-scanSubject: FTP + No-scan Contract wide
Problem: Priority among Rules Subject: HI_Sec_HTTP Filter: HTTP Action: Hi-Scan, Rate_limit Anomaly Detection App Clause: R0: Usr X ->Wiki site A: Subject: Hi_sec_HTTP Contract Dynamic Wiki Wiki site A Cisco Usr Usr X Subject: Low_Sec_HTTP Filter: HTTP Action: Low-Scan, QoS Hi Accounting: Pkt, transaction Clause: R0: Cisco ->Wiki: Subject: HTTP + Low-scanSubject: FTP + Low-scan Contract Static Contract Static_base
Usecase 1.3: Enterprise Access Accounting • Account for all accesses All Wiki Engg Wiki All Users Engg MktgWiki Mktg
Use case 9: Accounting Wiki-Access Users Wiki Selector: Name: Wiki-Access Subject: Full-Access Selector: Name: Wiki-Access Filter: Wiki-Port Action: Count Transactions Count Pkts Consumes Provides Engg-Wiki Rules: (First-match) 1. Engg-Users Engg-wiki : Full-Access 2. Mktg-Users Mktg-wiki : Full-Access Mktg-Wiki Consumer EP Labels: Engg-Users Mktg-Users PE/DE
On Demand Usecase 2.1: IWAN Routing Applications Business Routing Rules Threat Detection Security Topology Policy Controller Branch-1 BR1 ISP1 Branch-2 Central Site ISP2 Branch-3 BR2 TrafficScrubber
On Demand Usecase 2.2: Threat Mitigation Applications Business Routing Rules Threat Detection Topology Security Policy 4 Controller 2 Traffic flows through network. Network and security devices send telemetry to Controller Threat Intelligence monitors and analyzes. Attack is identified, mitigation is determined. Administrator sent recommendation. Policy distributed, drop packets from threat source. Inspect flows from same ISP. Data Center 2 6 5 6 6 6 6 TrafficScrubber 1
On Demand usecase 2.3: Unified Communications UC Applications Flow Quality Identification Flow Programming Topology Security Policy 4 Controller 2 • UC application moniters user calls • identifies issue with the call • Notifies SDN application of the flow ID and the associated action: • High COS marking • BW reservation Data Center 2 6 5 6 6 6 6 1