SlideShare a Scribd company logo
1 of 27
Download to read offline
Automation & Programmability Network Security
Khoo Boo Leng (khoo@cisco.com)
Technical Solution Architect APJ GSP Architecture
Digitization Is Disrupting The SP business
The world has gone mobile Traffic growth, driven by video
Rise of cloud computing Machine-to-Machine
Changing
Customer
Expectations
Ubiquitous Access
to Apps & Services
10X Mobile Traffic Growth
From 2013-2019
Changing Enterprise
Business Models
Efficiency & Capacity
Soon to
Change SP
Architectures/
Service Delivery
Emergence of the Internet of Everything
Process ThingsPeople Data
PetabytesperMonth
Other (43%, 25%)120,000
100,000
80,000
60,000
40,000
20,000
0
Internet Video (57%, 75%)
2013 2014 2015 2016 2017 2018
23% Global
CAGR 2013-
2018
Dynamic Threat Landscape
Increasing Threat Sophistication
Risks to Service Providers
and Their Customers
In Spite of Layers of Defense
Malware is getting
through control
based defenses
Malware
Prevention
is NOT
100%
Breach
Existing tools are
labor intensive and require
expertise
Each stage represents a separate process
silo attackers use to their advantage.
Attack Continuum
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Detect
Block
Defend
DURING
SP’s Are Approaching NFVi & Automation in Multiple Ways
Different solutions required to address different “Buying Centers”
Use Case Specific,
e.g.
vMS, VPC
Orchestration Led
Infrastructure Led
Use Case Led
• Bottom-up approach
• Buying Center – Network &
DC infrastructure team
• Common MANO solution for
different use cases
• Buying Center – NMS/OSS team
• Top-down approach
• Business outcome driven
• Buying Center – BU/Biz Vertical
Includes VNF-
M and NFV
Orchestrator
Hardware, VIM (OpenStack) and SDN Controller
We are leading with
vMS & Mobility
Modular offer with
NSO, ESC, CTCM
Emerging trend,
needs packaging
Infrastructure led approach
aka NFVI is gaining prominence!
Automation & Programmability Security Exploit
AutoSploit automates the exploitation
of remote hosts
Targets are collected automatically
as well by employing the Shodan.io API
Metasploit modules will run
programmatically comparing the name of
the module to the initial search query
It’s all about context
Event + network &
user context
Event + network
context
Event
Event: Attempted Privilege Gain
Target: 96.16.242.135
Event: Attempted Privilege Gain
Target: 96.16.242.135 (vulnerable)
Host OS: iPhone
Apps: Mail, Browser, Twitter
Location: Whitehouse, US
Event: Attempted Privilege Gain
Target: 96.16.242.135 (vulnerable)
Host OS: iPhone
Apps: Mail, Browswer, Twitter
Location: Whitehouse, US
User ID: dtrump
Full Name: Donald Trump
Department: Executive Office
Context has the capability of fundamentally changing the interpretation of your event data.
Keys Security Focus
Visibility
“See Everything”
Complete visibility of users, devices,
networks, applications, workloads
and processes
Threat protection
“Stop the Breach”
Quickly detect, block, and respond to
attacks before hackers can steal data
or disrupt operations
Segmentation
“Reduce the Attack Surface”
Prevent attackers from moving laterally
east-west with application whitelisting and
micro-segmentation
Gain Visibility, Intelligence, and Automation
Leverage information from other solutions to gain
complete network visibility and security analytics
Company
Host
Everything
must touch
the network
Know
every host
Access Audit
Record every
conversation
Understand
what’s normal
Posture
Get alerted to
change
Detect
Provides unique visibility into
what’s happening across your
entire network
Visibility and
Analytics
Detects anomalies and threats faster
with real-time analysis and advanced
forensics capabilities
Generates notifications
automatically when anomalies are
detected on the network
Network as a Sensor
Consistently Apply Policy, Control Access to Resources, &
Block Attacks
Consistently delivers security
policy across branch, campus, data
center, and cloud
Simplifies network
segmentation with a software-
defined approach
Shrinks the attack surface
by preventing lateral movement of
potential threats
TrustSec
Segmentation Policy Enforced Across the Extended Network
Switch Router VPN and
Firewall
DC Switch Wireless
Controller
Control access to network segments and resources
according to your security policy by working with ISENetwork as an Enforcer
The Need For Integrated Threat Defense
Integrated Management
Global & Local Threat Intelligence
Raw Data Threat Research Analytics
Network Platforms Cloud Platform Endpoint Platform
Services
DDoS | WAF | LB/ADC | Anti-Virus | SaaS Visib | DLP | FPC
FW/NGFW | NGIPS | Web | Email | Adv. Malw | Access
Shrink the Time to Detect and Contain
Shared Visibility and Context, Analytics, and Automation
Telemetry
Intelligence
SERVICES
LAYER
ANALYTICS
LAYER
ENFORCEMENT
LAYER
Behavioral Threat
Analytics
Network Behavioral
Analytics
Network Enforcement
& Malware Detection
Malware Sandboxing
(Adv. Threat Protect.)
Integration Through Context Sharing
CoA Triggered
ISE through pxGrid receives information
on threat
User Isolated
Change Authorization of machine
causing issue
SIEM
Firepower
Firewall
Custom
Detection
Stealthwatch
Network
Switch Router DC FW DC SwitchWireless
Network as an Enforcer ThreatSecurity Intelligence
Automatic or Initiated by IT Admin
~5 Seconds
ISE
pxGrid
Get Information
Solutions such as Vulnerability
Assessment, Firepower, Stealthwatch
detect malicious activity
SecuringAutomation & Programmability Network
Multiple layers of security to protect NFVi & SDN
1
2
7
3
5
4
6
1. Securing Controller
2. Securing Infrastructure
3. Securing Network Services
4. Securing Application
5. Securing Management &
Orchestration
6. Securing API
7. Securing Communication
8. Security Technologies
8
Securing Infrastructure
▪ Secure Operation
• Keep device OS up to date
• Monitor PSIRT and perform
bug scrub
• Centralize log collection and
monitoring
• Configuration Management
▪ Management Plane
• Use secure protocols to
manage Infrastructure: SSH,
SCP, HTTPs, SNMPv3, with
ACL to restrict access
• Control management and
monitor session with AAA
• Use encrypted local password
• Protect Console, AUX and
VTY
• Disable unused services, no
initial configuration via TFTP
▪ Control Plane
• Protect control plane: CoPP,
Routing protocol Security,
FHRP security
• ICMP redirects, icmp
unreachable, proxy arp
• Securing routing protocols:
peer authentication, route
filtering, managing resource
consumption
▪ Data Plane
• Protect data plane: DAI, IP
Source Guard, Port Security,
unicast RPF etc.
• Infrastructure ACLs, any-
spoofing ACLs, for Hardening
of devices
• Disable IP source routing
• Private VLAN
▪ Application Security
• Digital Signing of Code
• Certification Process
• Resource Allocation
• Code Isolation
• Strong Typing
• AAA (PKI)
▪ Underlying platform Security
• Keep system updated apply patches & fixes
• Strong password
• Disable unnecessary protocols, Services and ports
• Authentication, Authorization and Accounting, with RBAC
• Enable host based firewall, allow only required ports
SecuringApplication, Services & Software Development Life Cycle
▪ Secure Development Lifecycle
• Threat Modeling
• Understanding and prioritizing risk
• Threat, Mitigation, Test
▪ Secure Design Principles
• Principle of Least Privilege
• Fail Safely
• Economy of Mechanism
• Avoid (in)Security by Obscurity
• Psychological Acceptability
• Defense in Depth
• Perform Static Code Analysis: Buffer Overflow, Resource Leaks, Null Pointer Deference
• Follow Secure Coding Guidelines
Cisco Secure Development Lifecycle (CSDL)
Securing Orchestration /Automation / Provisioning/API & Communications
• Orchestration and Automation servers should
reside on a secure management network,
protected by firewall.
• Use Authentication , Authorization and
Accounting, assign Role Base Access
Control, least privilege
• Ensure hardening of underlying platform:
Disable unused services, configure host
based firewall and allow only required ports,
Use logging and monitoring, use NTP
• Enforce strong passwords
• Use secure communication protocols
between portal, orchestrator and element
managers
• Ensure configuration and change
management is in place.
• Consider High Availability solution
• Use authentication and authorization
• Use encryption: Transport Layer Security, SSL, SSH, HTTPS
• Revocation of Access and authorization using OCSP.
• Proactively using policy or reactively as mitigation option to an
attack
• Logging of authentication and authorization
• Manageability / Scalability
Transport
Attack
• URL/message body
modification
• learn confidential information
Mitigation
• Use secure transport (https)
• Education
Attack
• Denial of Service
• Too many messages
• Too many connections
• Very large payloads
• Crafted inputs that can
cause system crashes
Mitigation:
• Rate limiting
• Threat Analysis of your
infrastructure
• Input validations
Infrastructure
Attacks
• Brute force
• Phishing
• Privilege escalation
Mitigation
• Strong authentication
• RBA
• Least privilege principle
• Info leakage via payload or
error messages.
• Review outbound data
(error messages, payload)
Authorization and
Authentication
Attack
• SQL injections
• XSS
• Buffer overflow attacks
Mitigation:
https://www.owasp.org/index.php/REST_Security_Cheat_Sheet
Input Validation
MnT
FMC
Controller
WWW
NGFW
2. Correlation Rules
Trigger Remediation Action
3. pxGrid EPS Action:
Quarantine + Re-Auth
1. Security Events /
IOCs Reported
i-Net
Servers
Or
End User
MnT
FMC
Controller
WWW
NGFW
4. Endpoint Assigned
Quarantine + CoA-Reauth
Sent
i-Net
Servers
Or
End User
FMC
Controller
WWW
NGFW
i-Net
Flow Collector
1. SW is Analyzing Flows from
Flow Collector
2. SW is Also Merging Identity
Data from ISE
3. Admin is Alerted of
Suspicious Behavior
4. Admin Initiates Endpoint
Quarantine
(EPS over pxGrid)
5. Endpoint
Assigned
Quarantine +
CoA-Reauth Sent
Servers
Or
End User
FMC
Controller
WWW
NGFW
i-Net
Flow Collector
New Traffic Rules apply to the new
state of the endpoint
6a. Could Deny Access
(ingress)
6b. Could Filter it within
network (egress)
6b. Could Filter it within
network (egress)
Servers
Or
End User
MnT
FMC
Threat Intelligence Integration
Controller
WWW
NGFW
2. Correlation Rules
Trigger Remediation
Action
3. pxGrid EPS Action:
Quarantine + Re-Auth
i-Net
1. Threat /
IOCs Reported
Servers
Or
End User
MnT
FMC
Controller
WWW
NGFW
4. Endpoint Assigned
Quarantine + CoA-Reauth Sent
i-Net
Threat Intelligence Integration
Servers
Or
End User
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Shared intelligence
Shared contextual
awareness
Consistent policy
enforcement
Firepower Management Center
Talos
Firepower 4100 Series Firepower 9300 Platform
Visibility
Radware
DDoS
Network
analysis Email Threats
Identity &
NAC DNS FirewallURL
Summary: Advanced Intelligence & Integrated Defense
Validated By EANTC/Light Reading
Enterprise, Endpoints &
Sensors
Access Transport – Core & SP DC/Cloud
Leased BH
or Internet
Managementand
Orchestration
1
23 3 4
5
1
2
3
4
5
Security effectiveness
Chaining and stitching
Orchestrating in SDN and NFV
Multi-tenant
Performance, scalability, and resiliency
http://www.lightreading.com/nfv/nfv-tests-and-trials/testing-ciscos-virtualized-security-products/v/d-id/721575?
Automation & Programmability Network Security Exploit Detection

More Related Content

What's hot

Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointNextel S.A.
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developerSameer Paradia
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESMPinewood
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014David Berkelmans
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud projectPetteri Heino
 
Redefining siem to real time security intelligence
Redefining siem to real time security intelligenceRedefining siem to real time security intelligence
Redefining siem to real time security intelligenceBrendaly Marcano
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 

What's hot (20)

Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
Redefining siem to real time security intelligence
Redefining siem to real time security intelligenceRedefining siem to real time security intelligence
Redefining siem to real time security intelligence
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
SIEM
SIEMSIEM
SIEM
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 

Similar to Automation & Programmability Network Security Exploit Detection

Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceMSAdvAnalytics
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform ServiceSoumitra Bhattacharyya
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskPrecisely
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
network security / information security
network security / information securitynetwork security / information security
network security / information securityRohan Choudhari
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The CloudTu Pham
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...NetworkCollaborators
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 

Similar to Automation & Programmability Network Security Exploit Detection (20)

Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
 
Information Security
Information SecurityInformation Security
Information Security
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 

More from NetworkCollaborators

Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesNetworkCollaborators
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onNetworkCollaborators
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan kohNetworkCollaborators
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessNetworkCollaborators
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...NetworkCollaborators
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben greenNetworkCollaborators
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onNetworkCollaborators
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahNetworkCollaborators
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureNetworkCollaborators
 

More from NetworkCollaborators (20)

Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quah
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Automation & Programmability Network Security Exploit Detection

  • 1.
  • 2. Automation & Programmability Network Security Khoo Boo Leng (khoo@cisco.com) Technical Solution Architect APJ GSP Architecture
  • 3. Digitization Is Disrupting The SP business The world has gone mobile Traffic growth, driven by video Rise of cloud computing Machine-to-Machine Changing Customer Expectations Ubiquitous Access to Apps & Services 10X Mobile Traffic Growth From 2013-2019 Changing Enterprise Business Models Efficiency & Capacity Soon to Change SP Architectures/ Service Delivery Emergence of the Internet of Everything Process ThingsPeople Data PetabytesperMonth Other (43%, 25%)120,000 100,000 80,000 60,000 40,000 20,000 0 Internet Video (57%, 75%) 2013 2014 2015 2016 2017 2018 23% Global CAGR 2013- 2018 Dynamic Threat Landscape Increasing Threat Sophistication Risks to Service Providers and Their Customers
  • 4. In Spite of Layers of Defense Malware is getting through control based defenses Malware Prevention is NOT 100% Breach Existing tools are labor intensive and require expertise Each stage represents a separate process silo attackers use to their advantage. Attack Continuum BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend DURING
  • 5. SP’s Are Approaching NFVi & Automation in Multiple Ways Different solutions required to address different “Buying Centers” Use Case Specific, e.g. vMS, VPC Orchestration Led Infrastructure Led Use Case Led • Bottom-up approach • Buying Center – Network & DC infrastructure team • Common MANO solution for different use cases • Buying Center – NMS/OSS team • Top-down approach • Business outcome driven • Buying Center – BU/Biz Vertical Includes VNF- M and NFV Orchestrator Hardware, VIM (OpenStack) and SDN Controller We are leading with vMS & Mobility Modular offer with NSO, ESC, CTCM Emerging trend, needs packaging Infrastructure led approach aka NFVI is gaining prominence!
  • 6. Automation & Programmability Security Exploit AutoSploit automates the exploitation of remote hosts Targets are collected automatically as well by employing the Shodan.io API Metasploit modules will run programmatically comparing the name of the module to the initial search query
  • 7. It’s all about context Event + network & user context Event + network context Event Event: Attempted Privilege Gain Target: 96.16.242.135 Event: Attempted Privilege Gain Target: 96.16.242.135 (vulnerable) Host OS: iPhone Apps: Mail, Browser, Twitter Location: Whitehouse, US Event: Attempted Privilege Gain Target: 96.16.242.135 (vulnerable) Host OS: iPhone Apps: Mail, Browswer, Twitter Location: Whitehouse, US User ID: dtrump Full Name: Donald Trump Department: Executive Office Context has the capability of fundamentally changing the interpretation of your event data.
  • 8. Keys Security Focus Visibility “See Everything” Complete visibility of users, devices, networks, applications, workloads and processes Threat protection “Stop the Breach” Quickly detect, block, and respond to attacks before hackers can steal data or disrupt operations Segmentation “Reduce the Attack Surface” Prevent attackers from moving laterally east-west with application whitelisting and micro-segmentation
  • 9. Gain Visibility, Intelligence, and Automation Leverage information from other solutions to gain complete network visibility and security analytics Company Host Everything must touch the network Know every host Access Audit Record every conversation Understand what’s normal Posture Get alerted to change Detect Provides unique visibility into what’s happening across your entire network Visibility and Analytics Detects anomalies and threats faster with real-time analysis and advanced forensics capabilities Generates notifications automatically when anomalies are detected on the network Network as a Sensor
  • 10. Consistently Apply Policy, Control Access to Resources, & Block Attacks Consistently delivers security policy across branch, campus, data center, and cloud Simplifies network segmentation with a software- defined approach Shrinks the attack surface by preventing lateral movement of potential threats TrustSec Segmentation Policy Enforced Across the Extended Network Switch Router VPN and Firewall DC Switch Wireless Controller Control access to network segments and resources according to your security policy by working with ISENetwork as an Enforcer
  • 11. The Need For Integrated Threat Defense Integrated Management Global & Local Threat Intelligence Raw Data Threat Research Analytics Network Platforms Cloud Platform Endpoint Platform Services DDoS | WAF | LB/ADC | Anti-Virus | SaaS Visib | DLP | FPC FW/NGFW | NGIPS | Web | Email | Adv. Malw | Access Shrink the Time to Detect and Contain Shared Visibility and Context, Analytics, and Automation Telemetry Intelligence SERVICES LAYER ANALYTICS LAYER ENFORCEMENT LAYER Behavioral Threat Analytics Network Behavioral Analytics Network Enforcement & Malware Detection Malware Sandboxing (Adv. Threat Protect.)
  • 12. Integration Through Context Sharing CoA Triggered ISE through pxGrid receives information on threat User Isolated Change Authorization of machine causing issue SIEM Firepower Firewall Custom Detection Stealthwatch Network Switch Router DC FW DC SwitchWireless Network as an Enforcer ThreatSecurity Intelligence Automatic or Initiated by IT Admin ~5 Seconds ISE pxGrid Get Information Solutions such as Vulnerability Assessment, Firepower, Stealthwatch detect malicious activity
  • 13. SecuringAutomation & Programmability Network Multiple layers of security to protect NFVi & SDN 1 2 7 3 5 4 6 1. Securing Controller 2. Securing Infrastructure 3. Securing Network Services 4. Securing Application 5. Securing Management & Orchestration 6. Securing API 7. Securing Communication 8. Security Technologies 8
  • 14. Securing Infrastructure ▪ Secure Operation • Keep device OS up to date • Monitor PSIRT and perform bug scrub • Centralize log collection and monitoring • Configuration Management ▪ Management Plane • Use secure protocols to manage Infrastructure: SSH, SCP, HTTPs, SNMPv3, with ACL to restrict access • Control management and monitor session with AAA • Use encrypted local password • Protect Console, AUX and VTY • Disable unused services, no initial configuration via TFTP ▪ Control Plane • Protect control plane: CoPP, Routing protocol Security, FHRP security • ICMP redirects, icmp unreachable, proxy arp • Securing routing protocols: peer authentication, route filtering, managing resource consumption ▪ Data Plane • Protect data plane: DAI, IP Source Guard, Port Security, unicast RPF etc. • Infrastructure ACLs, any- spoofing ACLs, for Hardening of devices • Disable IP source routing • Private VLAN
  • 15. ▪ Application Security • Digital Signing of Code • Certification Process • Resource Allocation • Code Isolation • Strong Typing • AAA (PKI) ▪ Underlying platform Security • Keep system updated apply patches & fixes • Strong password • Disable unnecessary protocols, Services and ports • Authentication, Authorization and Accounting, with RBAC • Enable host based firewall, allow only required ports SecuringApplication, Services & Software Development Life Cycle ▪ Secure Development Lifecycle • Threat Modeling • Understanding and prioritizing risk • Threat, Mitigation, Test ▪ Secure Design Principles • Principle of Least Privilege • Fail Safely • Economy of Mechanism • Avoid (in)Security by Obscurity • Psychological Acceptability • Defense in Depth • Perform Static Code Analysis: Buffer Overflow, Resource Leaks, Null Pointer Deference • Follow Secure Coding Guidelines Cisco Secure Development Lifecycle (CSDL)
  • 16. Securing Orchestration /Automation / Provisioning/API & Communications • Orchestration and Automation servers should reside on a secure management network, protected by firewall. • Use Authentication , Authorization and Accounting, assign Role Base Access Control, least privilege • Ensure hardening of underlying platform: Disable unused services, configure host based firewall and allow only required ports, Use logging and monitoring, use NTP • Enforce strong passwords • Use secure communication protocols between portal, orchestrator and element managers • Ensure configuration and change management is in place. • Consider High Availability solution • Use authentication and authorization • Use encryption: Transport Layer Security, SSL, SSH, HTTPS • Revocation of Access and authorization using OCSP. • Proactively using policy or reactively as mitigation option to an attack • Logging of authentication and authorization • Manageability / Scalability
  • 17. Transport Attack • URL/message body modification • learn confidential information Mitigation • Use secure transport (https) • Education Attack • Denial of Service • Too many messages • Too many connections • Very large payloads • Crafted inputs that can cause system crashes Mitigation: • Rate limiting • Threat Analysis of your infrastructure • Input validations Infrastructure Attacks • Brute force • Phishing • Privilege escalation Mitigation • Strong authentication • RBA • Least privilege principle • Info leakage via payload or error messages. • Review outbound data (error messages, payload) Authorization and Authentication
  • 18. Attack • SQL injections • XSS • Buffer overflow attacks Mitigation: https://www.owasp.org/index.php/REST_Security_Cheat_Sheet Input Validation
  • 19. MnT FMC Controller WWW NGFW 2. Correlation Rules Trigger Remediation Action 3. pxGrid EPS Action: Quarantine + Re-Auth 1. Security Events / IOCs Reported i-Net Servers Or End User
  • 20. MnT FMC Controller WWW NGFW 4. Endpoint Assigned Quarantine + CoA-Reauth Sent i-Net Servers Or End User
  • 21. FMC Controller WWW NGFW i-Net Flow Collector 1. SW is Analyzing Flows from Flow Collector 2. SW is Also Merging Identity Data from ISE 3. Admin is Alerted of Suspicious Behavior 4. Admin Initiates Endpoint Quarantine (EPS over pxGrid) 5. Endpoint Assigned Quarantine + CoA-Reauth Sent Servers Or End User
  • 22. FMC Controller WWW NGFW i-Net Flow Collector New Traffic Rules apply to the new state of the endpoint 6a. Could Deny Access (ingress) 6b. Could Filter it within network (egress) 6b. Could Filter it within network (egress) Servers Or End User
  • 23. MnT FMC Threat Intelligence Integration Controller WWW NGFW 2. Correlation Rules Trigger Remediation Action 3. pxGrid EPS Action: Quarantine + Re-Auth i-Net 1. Threat / IOCs Reported Servers Or End User
  • 24. MnT FMC Controller WWW NGFW 4. Endpoint Assigned Quarantine + CoA-Reauth Sent i-Net Threat Intelligence Integration Servers Or End User
  • 25. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Shared intelligence Shared contextual awareness Consistent policy enforcement Firepower Management Center Talos Firepower 4100 Series Firepower 9300 Platform Visibility Radware DDoS Network analysis Email Threats Identity & NAC DNS FirewallURL Summary: Advanced Intelligence & Integrated Defense
  • 26. Validated By EANTC/Light Reading Enterprise, Endpoints & Sensors Access Transport – Core & SP DC/Cloud Leased BH or Internet Managementand Orchestration 1 23 3 4 5 1 2 3 4 5 Security effectiveness Chaining and stitching Orchestrating in SDN and NFV Multi-tenant Performance, scalability, and resiliency http://www.lightreading.com/nfv/nfv-tests-and-trials/testing-ciscos-virtualized-security-products/v/d-id/721575?