160 likes | 256 Vues
The Need For Trust in Communications Networks. Carlos Solari Bell Labs, Security Solutions May 2007. Topics. We Are Not Winning the Security Challenge Convergence – All Media IP – Will Bring New Challenges Rethink the Approach: Design - Build Trusted Communications Networks
E N D
The Need ForTrust in Communications Networks Carlos Solari Bell Labs, Security Solutions May 2007
Topics We Are Not Winning the Security Challenge Convergence – All Media IP – Will Bring New Challenges Rethink the Approach: Design - Build Trusted Communications Networks An Opportunity: Design In Now or Retrofit Later
Avg. exploit in 2005 5.8 days. Mths Wks Dys 2003 2004 2005 Lots of Data Telling Us…The Current Approach is Not Working: DDOS on the Rise Faster, Stealthier Exploits SPAM: 8 in 10 emails Sources: CERT/CC, Symantec, NVD, OSVD
Reacting to infinite possible sources Ex: polymorphism Point Prod’s Point Roles Security un-manageable and no single situation awareness Blacklist Defenses Ineffective Inconsistent security applied to network components – un-trusted pieces make… Increasing Network Complexity Increased vulnerability Ex: firewall VOIP sessions Weak Links Prevalent That addresses security in a comprehensive way – so very difficult to integrate security Threat occur faster than we can detect and respond before it impacts business Lack of Universal Standard Exploitation Window Zero-Day Data Control & Integrity Data exchange requires better security controls More personal data is online – uncertain protection Data Leakage SPAM – SPIT – SPASMS tough to separate wanted info From phishing and spyware to DDOS and Network Penetration Attacks Sophisticated Cyber Crime Data Flooding The Challenge: Difficult, Multi-Dimensional, and In Flux
Consume RF b/w • Battery drain • Identity theft • “SPIT” • Scams • Deperimiterization • Data theft • Scams • Compromised system integrity • Content theft • Compromised privacy • Scams Convergence – Many Benefits, Many Risks Intersection of threats…beyond the reach of the law…
We Have a Window of Opportunity Design Trusted Communications Networks Now
System Integrated Hardening Security Eco-System Defenses (Standards) Imbed Design Integrity Security Attestation End-to-End It Will Take A Multi-Disciplined Approach Network & Data
ISO 2700X and X.805/ISO 18028 • Standards-based approach • Security as a systematic, rigorous process • Applied to all network elements - system • In the Product Development Lifecycle System Hardening (Standards) Design-Build Secure Systems & Services ISO 2700X Provides the “what” X.805 & ISO 18028-2…provides the “how” details
Trust Can Be Required… “My company can only do business with ISO 2700X certified businesses…” “Are you certified?”
Layers Infrastructure Services Applications EndUser Control / Signaling Planes MODULE 1 MODULE 4 MODULE 7 Management MODULE 2 MODULE 5 MODULE 8 MODULE 3 MODULE 6 MODULE 9 Access Control Non-Repudiation Comms Security Availability Data Confidentiality Privacy Authentication Data Integrity Bell labs Security Framework – Instantiated in ITU/T X.805, ISO 18028 SystemHardening – Standards Based The X.805 Security Standard The X.805 Security Standard
Specify acceptable use policy for equipment. Sub-controls: Access control, Authentication, Non-repudiation Restrict access to privileged information / applications to ensure service continuity. Sub-Controls: Authentication, Access Control, Non-repudiation Maintain security of stored information. Sub-Controls: Access control, Confidentiality, Integrity, Availability, Non-repudiation Harden network element or system before deployment. Sub-Controls: Access control, Availability ISO/IEC 27001 enhanced by ITU-T X.805 / ISO 18028-2 ISO/IEC 27001:2005 Controls Security Policy Access Control Organizing Information Security Information Systems Acquisition, Development & Maintenance Asset Mgmt Information Security Incident Management Human Resources Security Business Continuity Management Physical & Environment Security Communications & Ops Mgmt Compliance
Bell Labs Security Framework Dimensions Provide ISO/IEC 27001 Control A.10.9.2 ISMS Implementation and Operation Details Data Integrity -Use IPSec AH Data Integrity -Protect files w/ checksums Communications Security -Use VPNs Data Confidentiality -Encrypt files Data Confidentiality - Use IPsec ESP Access Control - Use file system ACLs ISO/IEC 27001 Controls and X.805 Applied to the Real-World Enterprise Data Center Help Desk Module 6: Management Plane of Services Layer Desktop and Laptop Support Employee Database Module 9: Management Plane of Infrastructure Layer Network Operations • File System Maint. • System Updates • Patch Mgmt., etc. CorporateIT Employee Information is accessed for: • Network Service Management • Network Infrastructure Management
System Hardening (Standards) Imbed Integrity Attestation Opportunity…Deliver Secure Systems & Services • ISO 2700X and X.805/ISO 18028 • Security as a systematic, rigorous process • Applied to all network elements • From device to system, to infrastructure • Standards-based • Integrity Attestation • Apply integrity metrics • Measure at point of Creation, • Delivery and in Operation • Access policy based on “integrity score” • Perform in “real-time’
The big unknown…when will it fail, what is the cause, what was lost? The Issue of “Integrity Drift” IT system confidence degrades from boot time 100% Applications are installed Patches are applied Confidence Change and routine maintenance Reformatting and rebuilding from scratch Time (by permission from SignaCert)
What if We Could Measure the Integrity…Report it, and Act on It? Confidence is constantly maintained 100% System and Device-level Confidence and Trust Measured and Enforced Confidence Restoring to a known and trusted state is easy Time (by permission from SignaCert)
Summary • We actually have the know-how to improve the state of security • It is needed more than ever – especially as systems get more complex and we have greater dependency on these systems • By applying the ISO 2700X with X.805/ISO-18028 standards and Integrity Measurements, we can: • Baseline the state of security • Have a consistent way to measure it • Consistent application • Completeness • Repeatable • Scales to size and complexity of present and future networks