SlideShare a Scribd company logo
1 of 20
Having your cake and eating it too!
Deploying DLP services in a Next
Generation Firewall Environment
About me …
 I have been doing Information Security for a really, really
long time …
 I have had the ‘opportunity’ to do many different facets
of Information Security
 Firewall Design, Implementation, Configuration
 Network Design, Implementation, Configuration
 PKI ..
 DLP ..
 Pentesting and lots of different crazy things ..
What is DLP (Data Loss Prevention)?
 Data Loss Prevention is a system that is designed to detect
potential data breach / data ex-filtration transmissions and
prevent them by monitoring, detecting and blocking
sensitive data while in-use (endpoint actions), in-motion
(network traffic), and at-rest (data storage). - Wikipedia
Our focus will be specific to Data In-Motion
Data at Rest is pretty easy to work with; It’s either there or
it’s not there.
DLP at its core is a simple yes/no
What type of Data would we look for?
 PII (Personally Identifiable Information)
 PCI (Payment Card Information)
 PHI (Patient Health Information - HIPAA)
 Sexy Talk (unofficial for P0RN0GRAPHY)
 Terrorists
 Money Launderers
 Investigations
 Where can your imagination lead you?
So what should we inspect with DLP?
 SMTP (TCP Port 25)
The easiest protocol to inspect with DLP while in transit.
Users expect some delay/latency
Presents a great deal of options for automation
Inspect and Allow; Inspect and Block; Inspect and
Encrypt
 HTTP (TCP Port 80)
The next easiest protocol to inspect
Users have a higher expectation of speed
Presents two options for automation
Inspect and Allow; Inspect and Block
So what should we inspect with DLP?
 HTTPS (TCP Port 443)
The most difficult protocol to inspect
Users have a higher expectation of speed
Presents two options for automation
Inspect and Allow; Inspect and Block
 Everything Else (FTP, DNS, IRC, Custom Apps)
These can be tricky
Users experience expectations will vary
Presents two options for automation
Inspect and Allow; Inspect and Block; Inspect and
Encrypt
So what causes headaches with DLP?
 ENCRYPTION!
The overhead associated with encryption is a nightmare
How can you read anything if it is encrypted?
How can we decrypt traffic, inspect it, re-package the traffic,
then forward it along - while doing it in a timely fashion?
 Encryption changes everything!
Traffic Analysis
2011: Less than 20% of the traffic was SSL
2013: Eric Snowden releases classified data
2014: Almost 70% of the traffic was SSL
While internet bandwidth got less expensive and more
robust.
Encryption is Expensive!
 ENCRYPTION is a pain
The overhead associated with encryption is cumbersome.
Whatever your normal throughput is for HTTP, quadruple
it! Hardware can kill your budget quick.
Users have high expectations of web surfing experience.
 Hardware resources with performing a Man-in-The-Middle
Interception is costly; hardware and time.
The trick to managing DLP and encryption is ….
HORSEPOWER!!!
Encryption Options
 ENCRYPTION can also be stripped out and viewed
within your Palo Alto Firewall
This is (or was) a free license change to get free SSL
decryption and a cleartext stream from Palo Alto to your DLP
system.
Functions almost like a span port (it is not ICAP!)
Contact your Sales Rep for more details
Key things to remember:
The stream is read only, the ssl cannot be
blocked/dropped
Additionally, malware and virus activity will not be stopped
just because a copy of the contents were dumped to DLP
2 | ©2015, Palo Alto Networks. Confidential and Proprietary.
URL Filtering
 If you are using a proxy server …
This may make it easier to work with your PAC file and your
URL Filtering in one place
 If you are using a Next Gen Firewall …
Just manage it within the firewall
 If you have access to both, (my preference)
I will perform standard URL filtering, along with PAC file
management on the proxy server
I will use the next gen firewall to perform URL white listing to
places like microsoft, my vendors, specific industry resources
.. ask yourself why this may be advantageous to you.
URL Filtering continued …
 Remember DLP filtering is similar to URL filtering
I am only interested in specific, targeted events ..
There is not enough time to look at all traffic
Work with business units to target the ‘good stuff’
 Key Things to Remember about URL Filtering
HTTP: Filter by Domains
HTTPS: Filter by IP addresses
 Avoid liabilities
Using URL filtering exclude, at a minimum, the following groups
Financial URLs
Retail URLs
exclude things that will make your DLP a hacking target!
Making the DLP implementation successful …
 Factors for Success:
Evaluate the culture of the company
Is the URL filtering policy liberal or strict?
Are employees used to fast internet access?
Employee age group; millennials, gen-x, baby boomers
Get Buy-In
Senior MGMT, Legal, HR
Educate employees, if publicly known
Identify Bad Processes
Go after the largest offenders (5+, 20+, 100+)
Go after habitual offenders (10/20/50/100/week)
Show Metrics
Detail your progress and reduction of violations
Making the DLP implementation successful cont.
 Factors for Success:
Workflow
Evaluate your workflow, how do you plan to handle Data
Loss Incidents?
The easy part is setting up the infrastructure (believe it
or not)
The hard part is working with staff to manage a DLP
workflow to evaluate data loss incidents, work with the
business to correct broken processes, and to
investigate possible breach/data loss issues within an
organization.
Practice a methodology that is constantly improving
PEMC: Plan, Execute, Measure, Correct
Pitfalls are everywhere …
 Pitfalls happen when/where you least expect it
Legal and Social Troubles
It is critical to understand basic evidence handling
Know how you will handle types of incidents in advance
Once your process is vetted, stick to it
Small Network Changes can lead to big problems
Lost Taps/Diminished Feeds
Architecture changes can drop feeds
False Positives
Tweak and Re-Tweak your FP’s; expose faulty assumptions
Politics
Sometimes you will snare a lion
Make sure that your CISO/Director has teeth to fight for you
Budgeting for DLP
 Most Common Items
Hardware
Firewalls
Mail Gateways
Proxies
Server Hardware
Network Taps
Software
Software License
Support Software
Staff
Estimate at least one person starting day one (MidSize)
Over time, the work load will stabilize, but expect a surge of
findings in the beginning
Contact Info
 Yes, you can contact me, but …
Remember, I have a life too (at least I try)
Do not make the mistake of thinking that I have the time to
do free consulting, I don’t
You have a quick question, send it over, but if you are in a
time crunch, call your SE, Support Line, Clergy Member.
Twitter @fatherofmaddog
If you are offended easily, please don’t follow me
LinkedIn
www.linkedin.com/in/therealfatherofmaddog

More Related Content

Viewers also liked

Catalogo Portachiavi Per Auto
Catalogo Portachiavi Per AutoCatalogo Portachiavi Per Auto
Catalogo Portachiavi Per AutoAlessio Astolfi
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsLiwei Ren任力偉
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpValery Boronin
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
DLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекDLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекVladyslav Radetsky
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge Pereira
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Управление инцидентами информационной безопасности с помощью DLP Solar Dozor
Управление инцидентами информационной безопасности с помощью DLP Solar DozorУправление инцидентами информационной безопасности с помощью DLP Solar Dozor
Управление инцидентами информационной безопасности с помощью DLP Solar DozorSolar Security
 

Viewers also liked (10)

Catalogo Portachiavi Per Auto
Catalogo Portachiavi Per AutoCatalogo Portachiavi Per Auto
Catalogo Portachiavi Per Auto
 
DLP customer presentation
DLP customer presentationDLP customer presentation
DLP customer presentation
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
DLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекDLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечек
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Управление инцидентами информационной безопасности с помощью DLP Solar Dozor
Управление инцидентами информационной безопасности с помощью DLP Solar DozorУправление инцидентами информационной безопасности с помощью DLP Solar Dozor
Управление инцидентами информационной безопасности с помощью DLP Solar Dozor
 

More from Mike Spaulding

BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...Mike Spaulding
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the CloudMike Spaulding
 
Attacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsAttacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsMike Spaulding
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsMike Spaulding
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec TrainingMike Spaulding
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
CMH Security Summit 2014 - InfoSec Warrior
CMH Security Summit 2014 - InfoSec WarriorCMH Security Summit 2014 - InfoSec Warrior
CMH Security Summit 2014 - InfoSec WarriorMike Spaulding
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015Mike Spaulding
 

More from Mike Spaulding (12)

BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
Attacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsAttacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty Years
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Policy Map
Policy MapPolicy Map
Policy Map
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
DNS Vulnerabilities
DNS VulnerabilitiesDNS Vulnerabilities
DNS Vulnerabilities
 
CMH Security Summit 2014 - InfoSec Warrior
CMH Security Summit 2014 - InfoSec WarriorCMH Security Summit 2014 - InfoSec Warrior
CMH Security Summit 2014 - InfoSec Warrior
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Deploying DLP Services in a Next Generation Firewall Environment

  • 1. Having your cake and eating it too! Deploying DLP services in a Next Generation Firewall Environment
  • 2. About me …  I have been doing Information Security for a really, really long time …  I have had the ‘opportunity’ to do many different facets of Information Security  Firewall Design, Implementation, Configuration  Network Design, Implementation, Configuration  PKI ..  DLP ..  Pentesting and lots of different crazy things ..
  • 3. What is DLP (Data Loss Prevention)?  Data Loss Prevention is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage). - Wikipedia Our focus will be specific to Data In-Motion Data at Rest is pretty easy to work with; It’s either there or it’s not there. DLP at its core is a simple yes/no
  • 4. What type of Data would we look for?  PII (Personally Identifiable Information)  PCI (Payment Card Information)  PHI (Patient Health Information - HIPAA)  Sexy Talk (unofficial for P0RN0GRAPHY)  Terrorists  Money Launderers  Investigations  Where can your imagination lead you?
  • 5. So what should we inspect with DLP?  SMTP (TCP Port 25) The easiest protocol to inspect with DLP while in transit. Users expect some delay/latency Presents a great deal of options for automation Inspect and Allow; Inspect and Block; Inspect and Encrypt  HTTP (TCP Port 80) The next easiest protocol to inspect Users have a higher expectation of speed Presents two options for automation Inspect and Allow; Inspect and Block
  • 6.
  • 7. So what should we inspect with DLP?  HTTPS (TCP Port 443) The most difficult protocol to inspect Users have a higher expectation of speed Presents two options for automation Inspect and Allow; Inspect and Block  Everything Else (FTP, DNS, IRC, Custom Apps) These can be tricky Users experience expectations will vary Presents two options for automation Inspect and Allow; Inspect and Block; Inspect and Encrypt
  • 8.
  • 9.
  • 10. So what causes headaches with DLP?  ENCRYPTION! The overhead associated with encryption is a nightmare How can you read anything if it is encrypted? How can we decrypt traffic, inspect it, re-package the traffic, then forward it along - while doing it in a timely fashion?  Encryption changes everything! Traffic Analysis 2011: Less than 20% of the traffic was SSL 2013: Eric Snowden releases classified data 2014: Almost 70% of the traffic was SSL While internet bandwidth got less expensive and more robust.
  • 11. Encryption is Expensive!  ENCRYPTION is a pain The overhead associated with encryption is cumbersome. Whatever your normal throughput is for HTTP, quadruple it! Hardware can kill your budget quick. Users have high expectations of web surfing experience.  Hardware resources with performing a Man-in-The-Middle Interception is costly; hardware and time. The trick to managing DLP and encryption is …. HORSEPOWER!!!
  • 12.
  • 13. Encryption Options  ENCRYPTION can also be stripped out and viewed within your Palo Alto Firewall This is (or was) a free license change to get free SSL decryption and a cleartext stream from Palo Alto to your DLP system. Functions almost like a span port (it is not ICAP!) Contact your Sales Rep for more details Key things to remember: The stream is read only, the ssl cannot be blocked/dropped Additionally, malware and virus activity will not be stopped just because a copy of the contents were dumped to DLP 2 | ©2015, Palo Alto Networks. Confidential and Proprietary.
  • 14. URL Filtering  If you are using a proxy server … This may make it easier to work with your PAC file and your URL Filtering in one place  If you are using a Next Gen Firewall … Just manage it within the firewall  If you have access to both, (my preference) I will perform standard URL filtering, along with PAC file management on the proxy server I will use the next gen firewall to perform URL white listing to places like microsoft, my vendors, specific industry resources .. ask yourself why this may be advantageous to you.
  • 15. URL Filtering continued …  Remember DLP filtering is similar to URL filtering I am only interested in specific, targeted events .. There is not enough time to look at all traffic Work with business units to target the ‘good stuff’  Key Things to Remember about URL Filtering HTTP: Filter by Domains HTTPS: Filter by IP addresses  Avoid liabilities Using URL filtering exclude, at a minimum, the following groups Financial URLs Retail URLs exclude things that will make your DLP a hacking target!
  • 16. Making the DLP implementation successful …  Factors for Success: Evaluate the culture of the company Is the URL filtering policy liberal or strict? Are employees used to fast internet access? Employee age group; millennials, gen-x, baby boomers Get Buy-In Senior MGMT, Legal, HR Educate employees, if publicly known Identify Bad Processes Go after the largest offenders (5+, 20+, 100+) Go after habitual offenders (10/20/50/100/week) Show Metrics Detail your progress and reduction of violations
  • 17. Making the DLP implementation successful cont.  Factors for Success: Workflow Evaluate your workflow, how do you plan to handle Data Loss Incidents? The easy part is setting up the infrastructure (believe it or not) The hard part is working with staff to manage a DLP workflow to evaluate data loss incidents, work with the business to correct broken processes, and to investigate possible breach/data loss issues within an organization. Practice a methodology that is constantly improving PEMC: Plan, Execute, Measure, Correct
  • 18. Pitfalls are everywhere …  Pitfalls happen when/where you least expect it Legal and Social Troubles It is critical to understand basic evidence handling Know how you will handle types of incidents in advance Once your process is vetted, stick to it Small Network Changes can lead to big problems Lost Taps/Diminished Feeds Architecture changes can drop feeds False Positives Tweak and Re-Tweak your FP’s; expose faulty assumptions Politics Sometimes you will snare a lion Make sure that your CISO/Director has teeth to fight for you
  • 19. Budgeting for DLP  Most Common Items Hardware Firewalls Mail Gateways Proxies Server Hardware Network Taps Software Software License Support Software Staff Estimate at least one person starting day one (MidSize) Over time, the work load will stabilize, but expect a surge of findings in the beginning
  • 20. Contact Info  Yes, you can contact me, but … Remember, I have a life too (at least I try) Do not make the mistake of thinking that I have the time to do free consulting, I don’t You have a quick question, send it over, but if you are in a time crunch, call your SE, Support Line, Clergy Member. Twitter @fatherofmaddog If you are offended easily, please don’t follow me LinkedIn www.linkedin.com/in/therealfatherofmaddog