SlideShare a Scribd company logo
1 of 86
Download to read offline
#CiscoLive
IBOSEC-3000
Critical Requirements for
Defending Government
Networks
Andrew Benhase, Federal Architect
@CyberSecOps, @ThreatCowboy
New Things to
talk about
Quantum
Resistance and
Post Quantum
Quantum Resistance
and Post-Quantum Plan
A Roadmap for Cisco Innovation
5
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000
Quantum Resistance
Cisco has products that are shipping today, but need
substantial enhancements to move from basic functionality to
scalable use
Products solve real world US Government problems today –
requested directly by Government customers
Needs internal Engineering investments to fully deliver on
promise of Quantum Resistance
6
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000 7
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Post Quantum
Direction
US Government (NIST) urges maximum flexibility and
caution relative to post-quantum. Changes are likely.
Danger to Cisco is the distraction of PQ – could easily
hurt current solution directions for Quantum Resistance
10 years away from broad implementations,
certifications and substantial customer deliveries
IBOSEC-3000 8
The Rise of Open Source
Intelligence
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
https://flashpoint.io/wp-content/uploads/Flashpoint_RUS-UK_2023-FINAL.pdf
IBOSEC-3000 10
cisco
3rd
Country
Nationals
Curated
Collection
Threat
Intelligence
Broad
Spectrum
Government
Interface
TALOS
Senderbase
Threatgrid
OpenDNS
Kenna
TIP
CTIA
11
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
IBOSEC-3000
12
IBOSEC-3000
BREAK-PAUSE-DISCUSS
Tactics,
Techniques and
Procedures
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Current Trends and TTPs
• New TTPs – massive increase in scanning occurring on US networks
• C2 networks running out of Russia, Belarus to Vietnam, Ukraine and
to the US
• Looking at Federal Government related networks
• Reconnaissance taking place, probing
• Deny_All is of course super effective
• Event Load so high had to disable outside Interface of sensors
• Rolled our FMCs, had to move to 9XL Instances in Amazon to keep
up
IBOSEC-3000 15
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Some New Observed TTPs
• Service Request Networks are a real target
• Network Time Protocol Pools are observed targets
Internet
NTP
Client
NTP Request
IBOSEC-3000 16
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000 17
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Interesting Denial Concept
1. If I constantly overwhelm with security events
2. And shorten the practical window of FIFO collection
3. Effectively shortening the observation windows and effective collection
4. I can real dollar cost expense out a large portion of observation outside
of possibly the Federal Government
5. Make observation so expensive, people lose interest in Monitoring
6. This is the kind of behavior we’re seeing, adaptive Recon with
overwhelming amounts of attack traffic
7. Can I cost out the monitoring?
IBOSEC-3000 18
Overt Ops
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Overt Ops
IBOSEC-3000
Crafted Single
Packets
CPN Address Space
FIXED ISP in Ukraine
No tcp open
20
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Overt Ops
IBOSEC-3000
C2 Network operated out of St. Petersburg
Intermediate
Hosts in
Hanoi
21
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
So why?
Waiting for a response
See who is watching
Critical Asset protection are poke and response scenarios
Overt defenses are an indication of something you want to protect
Cisco is now a global target of Hostile Nation States
IBOSEC-3000 22
Open Topic:
What unique TTPs are you
seeing today?
Critical Network
Defenses
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Critical Network Defenses
Detailed Egress
ACLs
Granular Ingress
ACLs
Map out Cloud
access points
Establish Cloud
Only Access with
no CSP Pivot
Points
Employ CSP tools
such as AWS
GuardDuty
Process VPC
Flow Logs, know
your CSP traffic
patterns
IBOSEC-3000 25
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Critical Protocols to Block
• IP in IP (Protocol 4): IP in IPv4/IPv6 (requires a smart firewall)
• SIT/IPv6 (Protocol 41): IPv6 in IPv4/IPv6
• GRE (Protocol 47): Generic Routing Encapsulation
• OpenVPN (UDP port 1194): Openvpn
• SSTP (TCP port 443): Secure Socket Tunneling Protocol (requires a proxy)
• IPSec (Protocol 50 and 51): Internet Protocol Security
• L2TP (Protocol 115): Layer 2 Tunneling Protocol
• PPTP (TCP Port 1723): RFC 2637
• VXLAN (UDP port 4789): Virtual Extensible Local Area Network
• LISP udp port 4341 encapsulated user data
• LISP udp port 4342 control plane packets
• OTV: tcp/udp 8472 (per the RFC, but practically is IP/47)
IBOSEC-3000
IPv6 – if you are not prepared, deny_all
26
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Why Block them?
Because no DPI solutions inspect them
They *may be natively dropped (maybe not)
Most likely they are explicitly forwarded
Minimally establish monitor rules for these protocols
IBOSEC-3000 27
BREAK-PAUSE-DISCUSS
Airgapping the
Attack Surface
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Do you need to be connected to
the Internet 100% of the time?
IBOSEC-3000 30
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
What would do you do if you had to
immediately disconnect from the
Internet?
IBOSEC-3000 31
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Can you disconnect all of your
networks from the Internet in less
than 5 minutes?
IBOSEC-3000 32
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
If it took you 60 minutes to find
“the guy” to disconnect your networks, how
much damage would have occurred?
IBOSEC-3000 33
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Is this really the practical option?
IBOSEC-3000 34
Scenario #1
Security Emergency
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Security Emergency
36
• Large volumes of data being actively exfiltrated from network
• Containment measures unsuccessful
• 70 minutes have passed since flow detection has occurred
• Must stop data exfiltration at all costs, immediately
IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Internet
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLAN B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URL Authorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
You can probably find the
person to disconnect this….
IBOSEC-3000 37
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
MPLS Core
Internet
Can you find this person?
IBOSEC-3000 38
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
Standard Perimeter
Security Model v2.1
SPA
N
SPA
N
Flow Inspection
Protocol Inspection
Content Inspection
Virtual Sensor A
Virtual Sensor C
VLAN A
VLAN B
VLA
N B
VLAN A
Email Content Inspection
MX Record Owner
VLAN C
VLAN C
VPN Termination
Internal IDS
External IDS
https://www.* http://www.*
URLAuthorization
Decrypted SSL
Split-DNS
Primary Site Address
Record Owner
Secondary Site Address
Record Owner
WAN Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Internal Screening Router
External Screening Router
Stateful Firewall
Application Inspection
Policing / Rate Limiting
Access
Control
Audit and
Configuration Control
Firewall/IDS
Management Server
MPLS Core
Internet
CSP
Connection
Or this person?
IBOSEC-3000 39
Scenario #2
Asset Based Risk Reduction
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Asset Based Threat Risk Reduction
• Breach containment is failing
• Clear signs that database access is the goal
• Brute force failed login attempts from lateral assets
• Decision is made to disconnect primary databases
41
IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Critical Systems Disconnect
• Understanding that database operations are generally the target of any
successful cyber heist, a planned disconnect for database operations
could yield significant attack surface reduction during scheduled
periods
• This is not an INTERNET disconnect use case, it is a critical
systems disconnect only
• Strategically placed disconnect appliances could be employed within
the network to offer a critical protect function, while maintaining a
primary internet connection which may be needed for triage, assistance
and remote access
IBOSEC-3000 42
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Active/Active Failover
Standard Data Center
Security Model v2.1
Emergency
Database
Protection
Lateral
Server Risk
Reduction
IBOSEC-3000 43
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Government Cross Domain Use Case
44
IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
AUTOMATED AIRGAP
IBOSEC-3000 45
Hardware
based Airgap
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Drawbridge –physical disconnect
• Physical Relay Ports
• Cellular or Local Admin controlled
• No IP on the physical interfaces
• Allows for Executive Disconnect Option
• Can be scheduled for relay closed operations based on time schedule
47
IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Physical Relay based Disconnect
IBOSEC-3000 48
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Highly Secured Airgapping
IBOSEC-3000 49
Highly Secured Airgap Management
Enterprise Network
OTP
Enable Port 12
Disable Port 1
50
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000
Highly Secured Airgap Management
VPN
Enterprise Network
OTP
51
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Scenario Details
1 Cell/OTP pair is for MGMT port access enablement only
Enables MGMT port to FPR1010
Establishes AnyConnect VPN to FPR1010
Logs into WebUI with OTP
Disable Internet Access on Port 1-10
Automatic schedule resets MGMT port to closed on each hour
52
IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000 53
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Security Details
• Inbound number is whitelisted
• Duo/Google/MFA Client is linked to a specific user
• All other inbound SMS messages are ignored
• Inbound number is only provided access to certain ports
• 321-555-1212 is allowed access to Port 12 only
• 321-555-2222 is allowed access to enable Port 1 only
54
IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
>>Hey, I can do all of this with
software/scripts….<<
• sudo /kill/disconnect.pl
• sudo /kill/db_disconnect_all.pl
55
IBOSEC-3000
BREAK-PAUSE-DISCUSS
Secured DNS
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured DNS Slides
Block Outbound DNS to known DNS providers
Use Security Policy as DNS Overlay
Use Encrypted DNS Requests
Be sure to include IPv6 DNS Destinations
58
IBOSEC-3000
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
I’m not saying use OpenDNS, but use OpenDNS
or Commercial Umbrella or some Secured DNS
provider
IBOSEC-3000
https://www.opendns.com/home-internet-
security/
It is free, don’t be a victim!
FREE
59
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000 60
Secured Time
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
In any conflict, time is a critical asset
In cyber secops, trusted time is the single most
important asset
IBOSEC-3000 62
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Why is Time so important?
IBOSEC-3000
Correlation of security events
Forensic replay - Investigations
Sequence of packet times
All Simulations require synchronized time
63
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured NTP Slides
IBOSEC-3000
NTP
Pool
1
NTP
Pool
2
NTP
Pool
3
Give me Time!
64
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured NTP Slides
IBOSEC-3000
NTP
Pool
2
Give me Time!
Slips in to unsecured
NTP Server or is added
to Pool
and monitors source
flows
List of Source IP
addresses requesting
time:
{"ipvAPrefix": "157.55.39.0/24"),
{"ipv4Prefix": "207.46.13.0/24"),
f"ipv4Prefix":"40.77.167.0/24"3,
{"ipv4Prefix": "13.66.139.0/24"),
f"ipv4Prefix":"13.66.144.0/24"3,
{"ipvaPrefix": "52.167.144.0/24"),
f"ipv4Prefix":"13.67.10.16/28"3,
{"ipv4Prefix": "13.69.66.240/28"},
{"ipv4Prefix":"13.71.172.224/28"3,
{"ipv4Prefix": "139.217.52.0/28"),
{"ipv4Prefix": "191.233.204.224/28"},
{"ipv4Prefix": "20.36.108.32/28"},
f"ipv4Prefix":"20.43.120.16/28"3,
{"ipv4Prefix": "40.79.131.208/28"},
{"ipv4Prefix": "40.79.186.176/28"),
{"ipv4Prefix": "52.231.148.0/28"},
{"ipv4Prefix": "51.8.235.176/28"),
{"ipv4Prefix": "51.105.67.0/28")
65
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured NTP Slides
IBOSEC-3000
NTP
Pool
2
Thanks for adding to
my list of known host
addresses
Slips in to unsecured
NTP Server or is added
to Pool
and monitors source
flows
List of Source IP
addresses requesting
time:
{"ipvAPrefix": "157.55.39.0/24"),
{"ipv4Prefix": "207.46.13.0/24"),
f"ipv4Prefix":"40.77.167.0/24"3,
{"ipv4Prefix": "13.66.139.0/24"),
f"ipv4Prefix":"13.66.144.0/24"3,
{"ipvaPrefix": "52.167.144.0/24"),
f"ipv4Prefix":"13.67.10.16/28"3,
{"ipv4Prefix": "13.69.66.240/28"},
{"ipv4Prefix":"13.71.172.224/28"3,
{"ipv4Prefix": "139.217.52.0/28"),
{"ipv4Prefix": "191.233.204.224/28"},
{"ipv4Prefix": "20.36.108.32/28"},
f"ipv4Prefix":"20.43.120.16/28"3,
{"ipv4Prefix": "40.79.131.208/28"},
{"ipv4Prefix": "40.79.186.176/28"),
{"ipv4Prefix": "52.231.148.0/28"},
{"ipv4Prefix": "51.8.235.176/28"),
{"ipv4Prefix": "51.105.67.0/28")
66
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured NTP Slides
IBOSEC-3000
NMA
P
Collect Results
NMAP to JSON
Attacks Results
67
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured NTP Slides
IBOSEC-3000
Attack
Scripts
Launche
d
Collect Results
NMAP to JSON
Attacks Results
68
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured NTP – What you should do
IBOSEC-3000
NTP
Pool
1
NTP
Pool
2
NTP
Pool
3
Give me Time!
69
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured NTP – What you should do
IBOSEC-3000
Trusted
Time
Source
Give me Time!
70
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Secured NTP – Most Secure Option
IBOSEC-3000
Give me Time!
NTP Router
RFC8573 + RFC 4493
Message
Authentication
Code for the
Network Time
Protocol
71
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
• RFC 5905 – defines NTPv4
https://www.rfc-editor.org/rfc/rfc5905
• RFC 4493 – defines AES-CMAC (128 bit)
https://www.rfc-editor.org/rfc/rfc4493
• RFC 8573 – defines AES-CMAC in place of MD5 for NTPv4
https://www.rfc-editor.org/rfc/rfc8573
RFC 4493, RFC 8573, RFC 5905
IBOSEC-3000 72
Break-PAUSE-Discuss
If you need to
run Certified
Firewalls
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive IBOSEC-3000 75
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Firewall Certification Plan – Beyond 2022
Spring 2021 Fall 2021 Spring 2022 Fall 2022 Spring 2023 Fall 2023 Spring 2024
Certified FIPS, CC,
DoDIN APL, USGv6
Skip Skip Skip
Certified FIPS,
CC, DoDIN APL,
USGv6
Skip Skip
ASA 9.16.x 9.17.x 9.18.x 9.19.x 9.20.x 9.21.x 9.22.x
FTD 7.0.x (was 6.8.x) 7.1.x 7.2.x 7.3.x 7.4.x 7.5.x 7.6.x
FMC 7.0.x(was 6.8.x) 7.1.x 7.2.x 7.3.x 7.4.x 7.5.x 7.6.x
FDM 7.0.x(was 6.8.x) 7.1.x 7.2.x 7.3.x 7.4.x 7.5.x 7.6.x
FX-OS 2.10.x 2.11.x 2.12.x 2.13.x 2.14.x 2.15.x 2.16.x
HW *Certify FPR1150 and
FPR4112
FPR 2k refresh
available** (Tufnell Park
– FPR 3k)
FPR 4k refresh
available **
(Warwick Avenue –
FPR 42xx)
FPR3105 available
Certify Warwick
Avenue (FPR 42xx)
and Tufnell Park (FPR
31xx)
Also FMC M6
Key Fed
Features
RFC7030, RFC8573, IPv6
RFC8200, DoD IN IPv6 only,
TLS 1.3
TBD
RFC8784 to be
backported to NGFW
Spring 2021 Release
MR
TBD
RFC 6668, RFC 8268,
RFC 8332, RFC 8784
TBD TBD
IBOSEC-3000 76
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Cisco CSfC Product Tracking Table – Security Products
IBOSEC-3000 77
Hardening
Reference Slides
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Cisco Hardening
Cisco Guide to Hardening IOS Devices
https://www.cisco.com/c/en/us/support/docs/ip/access-
lists/13608-21.html
Guide to Harden Cisco Firepower Management Center
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/hard
ening/fmc/FMC_Hardening_Guide_v64.html
Guide to Harden Cisco ASA Firewalls
https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-
series-next-generation-firewalls/200150-Cisco-Guide-to-Harden-
Cisco-ASA-Firewall.html
IBOSEC-3000 79
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Cisco Hardening
Cisco Firepower Threat Defense Hardening Guide
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/harden
ing/ftd/FTD_Hardening_Guide_v64.html
Cisco FXOS Hardening Guide
https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/harde
ning/b_FXOS_4100_9300_Hardening/introduction.html
Cisco Guide to Hardening NX-OS
https://tools.cisco.com/security/center/resources/securing_nx_os.html
IBOSEC-3000 80
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
US National Security Agency Guides
https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Guidance/
Network Infrastructure Security Guide
https://media.defense.gov/2022/Mar/01/2002947139/-1/-
1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDANCE_202203
01.PDF
Guide to Cisco Password Best Practices
https://media.defense.gov/2022/Feb/17/2002940795/-1/-
1/0/CSI_CISCO_PASSWORD_TYPES_BEST_PRACTICES_20220217.PDF
Adopting Encrypted DNS in Enterprise Networks
https://media.defense.gov/2021/Jan/14/2002564889/-1/-
1/0/CSI_ADOPTING_ENCRYPTED_DNS_U_OO_102904_21.PDF
IBOSEC-3000 81
Questions?
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Fill out your session surveys!
Attendees who fill out a minimum of four session
surveys and the overall event survey will get
Cisco Live-branded socks (while supplies last)!
IBOSEC-3000
These points help you get on the leaderboard and increase your chances of winning daily and grand prizes
Attendees will also earn 100 points in the
Cisco Live Challenge for every survey completed.
83
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
Continue
your education
• Visit the Cisco Showcase
for related demos
• Book your one-on-one
Meet the Engineer meeting
• Attend the interactive education
with DevNet, Capture the Flag,
and Walk-in Labs
• Visit the On-Demand Library
for more sessions at
www.CiscoLive.com/on-demand
IBOSEC-3000 84
Thank you
#CiscoLive
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLive
Gamify your Cisco Live experience!
Get points for attending this session!
Open the Cisco Events App.
Click on 'Cisco Live Challenge’ in the side menu.
Click on View Your Badges at the top.
Click the + at the bottom of the screen and scan the QR code:
How:
1
2
3
4
86
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
IBOSEC-3000
#CiscoLive

More Related Content

Similar to IBOSEC-3000-2.pdf

Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Canada
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusRassul Ismailov
 
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Canada
 
Cisco Digital Network Architecture Deeper Dive From The Gates To The Gui
Cisco Digital Network Architecture Deeper Dive From The Gates To The GuiCisco Digital Network Architecture Deeper Dive From The Gates To The Gui
Cisco Digital Network Architecture Deeper Dive From The Gates To The GuiCisco Canada
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internetRony Melo
 
cisco csr1000v
cisco csr1000vcisco csr1000v
cisco csr1000vMing914298
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Brkarc 2035-cat-9 k
Brkarc 2035-cat-9 kBrkarc 2035-cat-9 k
Brkarc 2035-cat-9 knasiapsi
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome HenryITSitio.com
 
Building The Right Network
Building The Right NetworkBuilding The Right Network
Building The Right NetworkCisco Canada
 
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPROIDEA
 
StampedeCon 2015 Keynote
StampedeCon 2015 KeynoteStampedeCon 2015 Keynote
StampedeCon 2015 KeynoteKen Owens
 
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015StampedeCon
 

Similar to IBOSEC-3000-2.pdf (20)

Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Brkcld 2215
Brkcld 2215Brkcld 2215
Brkcld 2215
 
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
 
Cisco Digital Network Architecture Deeper Dive From The Gates To The Gui
Cisco Digital Network Architecture Deeper Dive From The Gates To The GuiCisco Digital Network Architecture Deeper Dive From The Gates To The Gui
Cisco Digital Network Architecture Deeper Dive From The Gates To The Gui
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
cisco csr1000v
cisco csr1000vcisco csr1000v
cisco csr1000v
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
BRKSEC-2494.pdf
BRKSEC-2494.pdfBRKSEC-2494.pdf
BRKSEC-2494.pdf
 
Brkarc 2035-cat-9 k
Brkarc 2035-cat-9 kBrkarc 2035-cat-9 k
Brkarc 2035-cat-9 k
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
BRKCRS-2110.pdf
BRKCRS-2110.pdfBRKCRS-2110.pdf
BRKCRS-2110.pdf
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry
 
Building The Right Network
Building The Right NetworkBuilding The Right Network
Building The Right Network
 
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
 
StampedeCon 2015 Keynote
StampedeCon 2015 KeynoteStampedeCon 2015 Keynote
StampedeCon 2015 Keynote
 
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

IBOSEC-3000-2.pdf

  • 1. #CiscoLive IBOSEC-3000 Critical Requirements for Defending Government Networks Andrew Benhase, Federal Architect @CyberSecOps, @ThreatCowboy
  • 4. Quantum Resistance and Post-Quantum Plan A Roadmap for Cisco Innovation 5 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000
  • 5. Quantum Resistance Cisco has products that are shipping today, but need substantial enhancements to move from basic functionality to scalable use Products solve real world US Government problems today – requested directly by Government customers Needs internal Engineering investments to fully deliver on promise of Quantum Resistance 6 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000
  • 6. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000 7
  • 7. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Post Quantum Direction US Government (NIST) urges maximum flexibility and caution relative to post-quantum. Changes are likely. Danger to Cisco is the distraction of PQ – could easily hurt current solution directions for Quantum Resistance 10 years away from broad implementations, certifications and substantial customer deliveries IBOSEC-3000 8
  • 8. The Rise of Open Source Intelligence
  • 9. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive https://flashpoint.io/wp-content/uploads/Flashpoint_RUS-UK_2023-FINAL.pdf IBOSEC-3000 10
  • 14. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Current Trends and TTPs • New TTPs – massive increase in scanning occurring on US networks • C2 networks running out of Russia, Belarus to Vietnam, Ukraine and to the US • Looking at Federal Government related networks • Reconnaissance taking place, probing • Deny_All is of course super effective • Event Load so high had to disable outside Interface of sensors • Rolled our FMCs, had to move to 9XL Instances in Amazon to keep up IBOSEC-3000 15
  • 15. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Some New Observed TTPs • Service Request Networks are a real target • Network Time Protocol Pools are observed targets Internet NTP Client NTP Request IBOSEC-3000 16
  • 16. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000 17
  • 17. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Interesting Denial Concept 1. If I constantly overwhelm with security events 2. And shorten the practical window of FIFO collection 3. Effectively shortening the observation windows and effective collection 4. I can real dollar cost expense out a large portion of observation outside of possibly the Federal Government 5. Make observation so expensive, people lose interest in Monitoring 6. This is the kind of behavior we’re seeing, adaptive Recon with overwhelming amounts of attack traffic 7. Can I cost out the monitoring? IBOSEC-3000 18
  • 19. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Overt Ops IBOSEC-3000 Crafted Single Packets CPN Address Space FIXED ISP in Ukraine No tcp open 20
  • 20. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Overt Ops IBOSEC-3000 C2 Network operated out of St. Petersburg Intermediate Hosts in Hanoi 21
  • 21. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive So why? Waiting for a response See who is watching Critical Asset protection are poke and response scenarios Overt defenses are an indication of something you want to protect Cisco is now a global target of Hostile Nation States IBOSEC-3000 22
  • 22. Open Topic: What unique TTPs are you seeing today?
  • 24. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Critical Network Defenses Detailed Egress ACLs Granular Ingress ACLs Map out Cloud access points Establish Cloud Only Access with no CSP Pivot Points Employ CSP tools such as AWS GuardDuty Process VPC Flow Logs, know your CSP traffic patterns IBOSEC-3000 25
  • 25. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Critical Protocols to Block • IP in IP (Protocol 4): IP in IPv4/IPv6 (requires a smart firewall) • SIT/IPv6 (Protocol 41): IPv6 in IPv4/IPv6 • GRE (Protocol 47): Generic Routing Encapsulation • OpenVPN (UDP port 1194): Openvpn • SSTP (TCP port 443): Secure Socket Tunneling Protocol (requires a proxy) • IPSec (Protocol 50 and 51): Internet Protocol Security • L2TP (Protocol 115): Layer 2 Tunneling Protocol • PPTP (TCP Port 1723): RFC 2637 • VXLAN (UDP port 4789): Virtual Extensible Local Area Network • LISP udp port 4341 encapsulated user data • LISP udp port 4342 control plane packets • OTV: tcp/udp 8472 (per the RFC, but practically is IP/47) IBOSEC-3000 IPv6 – if you are not prepared, deny_all 26
  • 26. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Why Block them? Because no DPI solutions inspect them They *may be natively dropped (maybe not) Most likely they are explicitly forwarded Minimally establish monitor rules for these protocols IBOSEC-3000 27
  • 29. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Do you need to be connected to the Internet 100% of the time? IBOSEC-3000 30
  • 30. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive What would do you do if you had to immediately disconnect from the Internet? IBOSEC-3000 31
  • 31. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Can you disconnect all of your networks from the Internet in less than 5 minutes? IBOSEC-3000 32
  • 32. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive If it took you 60 minutes to find “the guy” to disconnect your networks, how much damage would have occurred? IBOSEC-3000 33
  • 33. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Is this really the practical option? IBOSEC-3000 34
  • 35. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Security Emergency 36 • Large volumes of data being actively exfiltrated from network • Containment measures unsuccessful • 70 minutes have passed since flow detection has occurred • Must stop data exfiltration at all costs, immediately IBOSEC-3000
  • 36. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Internet Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLAN B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URL Authorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server You can probably find the person to disconnect this…. IBOSEC-3000 37
  • 37. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server MPLS Core Internet Can you find this person? IBOSEC-3000 38
  • 38. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server Standard Perimeter Security Model v2.1 SPA N SPA N Flow Inspection Protocol Inspection Content Inspection Virtual Sensor A Virtual Sensor C VLAN A VLAN B VLA N B VLAN A Email Content Inspection MX Record Owner VLAN C VLAN C VPN Termination Internal IDS External IDS https://www.* http://www.* URLAuthorization Decrypted SSL Split-DNS Primary Site Address Record Owner Secondary Site Address Record Owner WAN Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Stateful Firewall Application Inspection Policing / Rate Limiting Internal Screening Router External Screening Router Stateful Firewall Application Inspection Policing / Rate Limiting Access Control Audit and Configuration Control Firewall/IDS Management Server MPLS Core Internet CSP Connection Or this person? IBOSEC-3000 39
  • 39. Scenario #2 Asset Based Risk Reduction
  • 40. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Asset Based Threat Risk Reduction • Breach containment is failing • Clear signs that database access is the goal • Brute force failed login attempts from lateral assets • Decision is made to disconnect primary databases 41 IBOSEC-3000
  • 41. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Critical Systems Disconnect • Understanding that database operations are generally the target of any successful cyber heist, a planned disconnect for database operations could yield significant attack surface reduction during scheduled periods • This is not an INTERNET disconnect use case, it is a critical systems disconnect only • Strategically placed disconnect appliances could be employed within the network to offer a critical protect function, while maintaining a primary internet connection which may be needed for triage, assistance and remote access IBOSEC-3000 42
  • 42. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Active/Active Failover Standard Data Center Security Model v2.1 Emergency Database Protection Lateral Server Risk Reduction IBOSEC-3000 43
  • 43. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Government Cross Domain Use Case 44 IBOSEC-3000
  • 44. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive AUTOMATED AIRGAP IBOSEC-3000 45
  • 46. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Drawbridge –physical disconnect • Physical Relay Ports • Cellular or Local Admin controlled • No IP on the physical interfaces • Allows for Executive Disconnect Option • Can be scheduled for relay closed operations based on time schedule 47 IBOSEC-3000
  • 47. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Physical Relay based Disconnect IBOSEC-3000 48
  • 48. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Highly Secured Airgapping IBOSEC-3000 49
  • 49. Highly Secured Airgap Management Enterprise Network OTP Enable Port 12 Disable Port 1 50 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000
  • 50. Highly Secured Airgap Management VPN Enterprise Network OTP 51 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000
  • 51. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Scenario Details 1 Cell/OTP pair is for MGMT port access enablement only Enables MGMT port to FPR1010 Establishes AnyConnect VPN to FPR1010 Logs into WebUI with OTP Disable Internet Access on Port 1-10 Automatic schedule resets MGMT port to closed on each hour 52 IBOSEC-3000
  • 52. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000 53
  • 53. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Security Details • Inbound number is whitelisted • Duo/Google/MFA Client is linked to a specific user • All other inbound SMS messages are ignored • Inbound number is only provided access to certain ports • 321-555-1212 is allowed access to Port 12 only • 321-555-2222 is allowed access to enable Port 1 only 54 IBOSEC-3000
  • 54. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive >>Hey, I can do all of this with software/scripts….<< • sudo /kill/disconnect.pl • sudo /kill/db_disconnect_all.pl 55 IBOSEC-3000
  • 57. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured DNS Slides Block Outbound DNS to known DNS providers Use Security Policy as DNS Overlay Use Encrypted DNS Requests Be sure to include IPv6 DNS Destinations 58 IBOSEC-3000
  • 58. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive I’m not saying use OpenDNS, but use OpenDNS or Commercial Umbrella or some Secured DNS provider IBOSEC-3000 https://www.opendns.com/home-internet- security/ It is free, don’t be a victim! FREE 59
  • 59. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000 60
  • 61. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive In any conflict, time is a critical asset In cyber secops, trusted time is the single most important asset IBOSEC-3000 62
  • 62. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Why is Time so important? IBOSEC-3000 Correlation of security events Forensic replay - Investigations Sequence of packet times All Simulations require synchronized time 63
  • 63. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured NTP Slides IBOSEC-3000 NTP Pool 1 NTP Pool 2 NTP Pool 3 Give me Time! 64
  • 64. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured NTP Slides IBOSEC-3000 NTP Pool 2 Give me Time! Slips in to unsecured NTP Server or is added to Pool and monitors source flows List of Source IP addresses requesting time: {"ipvAPrefix": "157.55.39.0/24"), {"ipv4Prefix": "207.46.13.0/24"), f"ipv4Prefix":"40.77.167.0/24"3, {"ipv4Prefix": "13.66.139.0/24"), f"ipv4Prefix":"13.66.144.0/24"3, {"ipvaPrefix": "52.167.144.0/24"), f"ipv4Prefix":"13.67.10.16/28"3, {"ipv4Prefix": "13.69.66.240/28"}, {"ipv4Prefix":"13.71.172.224/28"3, {"ipv4Prefix": "139.217.52.0/28"), {"ipv4Prefix": "191.233.204.224/28"}, {"ipv4Prefix": "20.36.108.32/28"}, f"ipv4Prefix":"20.43.120.16/28"3, {"ipv4Prefix": "40.79.131.208/28"}, {"ipv4Prefix": "40.79.186.176/28"), {"ipv4Prefix": "52.231.148.0/28"}, {"ipv4Prefix": "51.8.235.176/28"), {"ipv4Prefix": "51.105.67.0/28") 65
  • 65. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured NTP Slides IBOSEC-3000 NTP Pool 2 Thanks for adding to my list of known host addresses Slips in to unsecured NTP Server or is added to Pool and monitors source flows List of Source IP addresses requesting time: {"ipvAPrefix": "157.55.39.0/24"), {"ipv4Prefix": "207.46.13.0/24"), f"ipv4Prefix":"40.77.167.0/24"3, {"ipv4Prefix": "13.66.139.0/24"), f"ipv4Prefix":"13.66.144.0/24"3, {"ipvaPrefix": "52.167.144.0/24"), f"ipv4Prefix":"13.67.10.16/28"3, {"ipv4Prefix": "13.69.66.240/28"}, {"ipv4Prefix":"13.71.172.224/28"3, {"ipv4Prefix": "139.217.52.0/28"), {"ipv4Prefix": "191.233.204.224/28"}, {"ipv4Prefix": "20.36.108.32/28"}, f"ipv4Prefix":"20.43.120.16/28"3, {"ipv4Prefix": "40.79.131.208/28"}, {"ipv4Prefix": "40.79.186.176/28"), {"ipv4Prefix": "52.231.148.0/28"}, {"ipv4Prefix": "51.8.235.176/28"), {"ipv4Prefix": "51.105.67.0/28") 66
  • 66. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured NTP Slides IBOSEC-3000 NMA P Collect Results NMAP to JSON Attacks Results 67
  • 67. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured NTP Slides IBOSEC-3000 Attack Scripts Launche d Collect Results NMAP to JSON Attacks Results 68
  • 68. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured NTP – What you should do IBOSEC-3000 NTP Pool 1 NTP Pool 2 NTP Pool 3 Give me Time! 69
  • 69. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured NTP – What you should do IBOSEC-3000 Trusted Time Source Give me Time! 70
  • 70. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Secured NTP – Most Secure Option IBOSEC-3000 Give me Time! NTP Router RFC8573 + RFC 4493 Message Authentication Code for the Network Time Protocol 71
  • 71. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive • RFC 5905 – defines NTPv4 https://www.rfc-editor.org/rfc/rfc5905 • RFC 4493 – defines AES-CMAC (128 bit) https://www.rfc-editor.org/rfc/rfc4493 • RFC 8573 – defines AES-CMAC in place of MD5 for NTPv4 https://www.rfc-editor.org/rfc/rfc8573 RFC 4493, RFC 8573, RFC 5905 IBOSEC-3000 72
  • 73. If you need to run Certified Firewalls
  • 74. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive IBOSEC-3000 75
  • 75. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Firewall Certification Plan – Beyond 2022 Spring 2021 Fall 2021 Spring 2022 Fall 2022 Spring 2023 Fall 2023 Spring 2024 Certified FIPS, CC, DoDIN APL, USGv6 Skip Skip Skip Certified FIPS, CC, DoDIN APL, USGv6 Skip Skip ASA 9.16.x 9.17.x 9.18.x 9.19.x 9.20.x 9.21.x 9.22.x FTD 7.0.x (was 6.8.x) 7.1.x 7.2.x 7.3.x 7.4.x 7.5.x 7.6.x FMC 7.0.x(was 6.8.x) 7.1.x 7.2.x 7.3.x 7.4.x 7.5.x 7.6.x FDM 7.0.x(was 6.8.x) 7.1.x 7.2.x 7.3.x 7.4.x 7.5.x 7.6.x FX-OS 2.10.x 2.11.x 2.12.x 2.13.x 2.14.x 2.15.x 2.16.x HW *Certify FPR1150 and FPR4112 FPR 2k refresh available** (Tufnell Park – FPR 3k) FPR 4k refresh available ** (Warwick Avenue – FPR 42xx) FPR3105 available Certify Warwick Avenue (FPR 42xx) and Tufnell Park (FPR 31xx) Also FMC M6 Key Fed Features RFC7030, RFC8573, IPv6 RFC8200, DoD IN IPv6 only, TLS 1.3 TBD RFC8784 to be backported to NGFW Spring 2021 Release MR TBD RFC 6668, RFC 8268, RFC 8332, RFC 8784 TBD TBD IBOSEC-3000 76
  • 76. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Cisco CSfC Product Tracking Table – Security Products IBOSEC-3000 77
  • 78. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Cisco Hardening Cisco Guide to Hardening IOS Devices https://www.cisco.com/c/en/us/support/docs/ip/access- lists/13608-21.html Guide to Harden Cisco Firepower Management Center https://www.cisco.com/c/en/us/td/docs/security/firepower/640/hard ening/fmc/FMC_Hardening_Guide_v64.html Guide to Harden Cisco ASA Firewalls https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x- series-next-generation-firewalls/200150-Cisco-Guide-to-Harden- Cisco-ASA-Firewall.html IBOSEC-3000 79
  • 79. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Cisco Hardening Cisco Firepower Threat Defense Hardening Guide https://www.cisco.com/c/en/us/td/docs/security/firepower/640/harden ing/ftd/FTD_Hardening_Guide_v64.html Cisco FXOS Hardening Guide https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/harde ning/b_FXOS_4100_9300_Hardening/introduction.html Cisco Guide to Hardening NX-OS https://tools.cisco.com/security/center/resources/securing_nx_os.html IBOSEC-3000 80
  • 80. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive US National Security Agency Guides https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Guidance/ Network Infrastructure Security Guide https://media.defense.gov/2022/Mar/01/2002947139/-1/- 1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDANCE_202203 01.PDF Guide to Cisco Password Best Practices https://media.defense.gov/2022/Feb/17/2002940795/-1/- 1/0/CSI_CISCO_PASSWORD_TYPES_BEST_PRACTICES_20220217.PDF Adopting Encrypted DNS in Enterprise Networks https://media.defense.gov/2021/Jan/14/2002564889/-1/- 1/0/CSI_ADOPTING_ENCRYPTED_DNS_U_OO_102904_21.PDF IBOSEC-3000 81
  • 82. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Fill out your session surveys! Attendees who fill out a minimum of four session surveys and the overall event survey will get Cisco Live-branded socks (while supplies last)! IBOSEC-3000 These points help you get on the leaderboard and increase your chances of winning daily and grand prizes Attendees will also earn 100 points in the Cisco Live Challenge for every survey completed. 83
  • 83. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public Continue your education • Visit the Cisco Showcase for related demos • Book your one-on-one Meet the Engineer meeting • Attend the interactive education with DevNet, Capture the Flag, and Walk-in Labs • Visit the On-Demand Library for more sessions at www.CiscoLive.com/on-demand IBOSEC-3000 84
  • 85. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLive Gamify your Cisco Live experience! Get points for attending this session! Open the Cisco Events App. Click on 'Cisco Live Challenge’ in the side menu. Click on View Your Badges at the top. Click the + at the bottom of the screen and scan the QR code: How: 1 2 3 4 86 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public IBOSEC-3000