SlideShare a Scribd company logo
Who’s Been Accessing YOUR Network?
Using NAC to Cover Your Assets
Copyright Trustwave 2008Copyright 2011 Trustwave
Agenda/Contents
• Introduction
• Common Terms
• Basic Components/Capabilities of NAC Technology
Copyright Trustwave 2008Copyright 2011 Trustwave
What is NAC?
• Prevent corrupted, unauthorized, or high-risk systems from
gaining network access
• Protect the network and other resources from connected
systems that become corrupted or vulnerable
• Control the level of access based on policies
– Student vs Faculty vs Alumni
– Guest vs Staff
– Anti Virus up to date or not
– Use of File Sharing application
– Gaming devices
– Services running on device
Processes and technologies designed to:
Copyright Trustwave 2008Copyright 2011 Trustwave
Threats in a Mobile World
Today,
endpoint
devices
represent the
greatest risk
to network
security — by
propagating
threats or
being
vulnerable to
them.
Infected Devices
Unknown Devices
Out-of-Policy Devices
propagate threats, resulting in
loss of productivity & hours of
cleanup
like home PCs, contractor PCs, & WiFi
phones can introduce new threats or
compromise data security
are more vulnerable to malware
attacks, while running services that
could jeopardize security
Copyright Trustwave 2008Copyright 2011 Trustwave
Agenda/Contents
• Introduction
• Common Terms
• Basic Components/Capabilities of NAC Technology
Copyright Trustwave 2008Copyright 2011 Trustwave
Common Terms
• Element detection – Detection of new endpoints as they are introduced to
the network
• Authentication (AuthN) – Verification of a user’s identity when accessing the
network (who are you?)
• Authorization (AuthZ) – Determination of which network resources can be
accessed by an authenticated user (what can you do?). Typically defined by
group memberships, roles, etc in existing authorization systems such as Active
Directory, Radius or LDAP servers.
Copyright Trustwave 2008Copyright 2011 Trustwave
Common Terms (2)
• Endpoint integrity check – The ability to assess whether a newly introduced
network element complies with the security policy or is vulnerable. These
checks may include the ability to gather knowledge regarding an element’s
operating system, the list of installed patches, the presence of A/V software
and its virus signature’s date, last time scanned, etc.
• Remediation – The process of quarantining an element not complying with
the defined security policy until the issues causing it to be non-compliant are
fixed. When quarantined, the element may be allowed to access a defined set
of remediation servers allowing the user to fix the non-compliant issues.
Copyright Trustwave 2008Copyright 2011 Trustwave
Common Terms (3)
• Enforcement – The ability to restrict an endpoint’s access to the network if
the element does not comply with the defined security policy. Options are
typically allow, deny, restrict, and/or some other manipulation of traffic such as
redirection for remediation.
• Pre-Admission Assessment – The process of detecting a new element
connecting to the network, and the ability to verify whether or not it complies
with a defined security policy. If the element does not comply with the defined
security policy, the solution must restrict the element’s access to the network
• Post-Admission Protection – The process of continuously monitoring for and
protecting users, elements and their sessions from suspicious activity (i.e.
worms, viruses, malware, etc) or policy violations.
Copyright Trustwave 2008Copyright 2011 Trustwave
Agenda/Contents
• Introduction
• Common Terms
• Basic Components/Capabilities of NAC Technology
Copyright Trustwave 2008Copyright 2011 Trustwave
NAC Policy Components
Identity
Endpoint
Compliance
Behavior
Network
Access
Control
Match user identity with each endpoint on the network
Track user behavior
Enforce policy based on user or user groups
Seamless integration with existing credential stores
Analyze every packet from every device
Zero-day threat detection
L2-L7 behavioral policy enforcement
Measure health and compliance status of
every endpoint on the network
Robust reporting tracks all compliance data
Flexible tiered enforcement
Copyright Trustwave 2008Copyright 2011 Trustwave
Pre-Admission Assessment Process
• Endpoint detection
• Authentication
• Endpoint integrity check
• Comparison of authentication and integrity check results against a
policy store to determine authorization
• Policy decision passed to enforcement point
• Enforcement of network access (allow, deny, restrict)
• Remediation assistance, if required by policy
Copyright Trustwave 2008Copyright 2011 Trustwave
Post-Admission Capabilities
• Post-admission threat detection and protection
– Typically likened to IDS/IPS but with a focus on Day Zero threats
• Continuous Monitoring
• Provide ongoing checks and monitoring for:
– Policy violations
– Change of risk state
• Provide for periodic and/or random pre-admission “re-check”
• Remediation assistance, if required by policy
Copyright Trustwave 2008Copyright 2011 Trustwave
• Device & User Authentication
• Endpoint Compliance
• Protection from Suspicious Activity
• Policy Based Access
• Continuous Monitoring
Summary - How NAC Covers Your Assets
15
Thank You

More Related Content

What's hot

Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacks
Vaibhav Khanna
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey Smith
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
Prime Infoserv
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
Ryan G. Murphy
 
Security Incident Handling for Schools
Security Incident Handling for Schools Security Incident Handling for Schools
Security Incident Handling for Schools
eLearning Consortium 電子學習聯盟
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
Mayur Nanotkar
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016
Exclusive Networks ME
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
Leo Mark Villar
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and services
Vaibhav Khanna
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
Network Intelligence India
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
MLG College of Learning, Inc
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
Apurv Singh Gautam
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Falgun Rathod
 
Lesson 3
Lesson 3Lesson 3
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
Zara Nawaz
 

What's hot (20)

Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacks
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
Security Incident Handling for Schools
Security Incident Handling for Schools Security Incident Handling for Schools
Security Incident Handling for Schools
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and services
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 

Viewers also liked

Joe power - managing risk through compliance - atlseccon2011
Joe power - managing risk through compliance - atlseccon2011Joe power - managing risk through compliance - atlseccon2011
Joe power - managing risk through compliance - atlseccon2011
Atlantic Security Conference
 
Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011
Atlantic Security Conference
 
TIAD : Continuous delivery of infrastructure
TIAD : Continuous delivery of infrastructureTIAD : Continuous delivery of infrastructure
TIAD : Continuous delivery of infrastructure
The Incredible Automation Day
 
AIPS Avaya IP Office™ Platform
AIPS  Avaya IP Office™ PlatformAIPS  Avaya IP Office™ Platform
AIPS Avaya IP Office™ PlatformHector Tavares
 
TIAD : Full stack automation
TIAD : Full stack automationTIAD : Full stack automation
TIAD : Full stack automation
The Incredible Automation Day
 
美麗的家鄉
美麗的家鄉美麗的家鄉
美麗的家鄉awcc
 
Entranaminhacasa 090512201537-phpapp01
Entranaminhacasa 090512201537-phpapp01Entranaminhacasa 090512201537-phpapp01
Entranaminhacasa 090512201537-phpapp01
Edimar Pinheiro
 
User authentication trends
User authentication   trendsUser authentication   trends
User authentication trends
Zuraiq K K
 
Case Tyrnävä
Case TyrnäväCase Tyrnävä
Case Tyrnävä
Kokeileva Suomi
 
Case Vantaa
Case VantaaCase Vantaa
Case Vantaa
Kokeileva Suomi
 
Manejo de residuos hospitalares
Manejo de residuos hospitalaresManejo de residuos hospitalares
Manejo de residuos hospitalares
Arão Zuconelli
 
Gerentes dueños artículo
Gerentes dueños artículoGerentes dueños artículo
Gerentes dueños artículo
Javier Contreras
 
Primeros auxilios
Primeros auxiliosPrimeros auxilios
Primeros auxilios
antonioisabella
 
imagenes para compartir detras de los productos fisico
imagenes para compartir detras de los productos fisicoimagenes para compartir detras de los productos fisico
imagenes para compartir detras de los productos fisico
Diego Sergio Stamato
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
jameschloejames
 
APTLD Update
APTLD UpdateAPTLD Update
APTLD Update
APNIC
 

Viewers also liked (19)

Joe power - managing risk through compliance - atlseccon2011
Joe power - managing risk through compliance - atlseccon2011Joe power - managing risk through compliance - atlseccon2011
Joe power - managing risk through compliance - atlseccon2011
 
Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011
 
TIAD : Continuous delivery of infrastructure
TIAD : Continuous delivery of infrastructureTIAD : Continuous delivery of infrastructure
TIAD : Continuous delivery of infrastructure
 
AIPS Avaya IP Office™ Platform
AIPS  Avaya IP Office™ PlatformAIPS  Avaya IP Office™ Platform
AIPS Avaya IP Office™ Platform
 
TIAD : Full stack automation
TIAD : Full stack automationTIAD : Full stack automation
TIAD : Full stack automation
 
美麗的家鄉
美麗的家鄉美麗的家鄉
美麗的家鄉
 
Entranaminhacasa 090512201537-phpapp01
Entranaminhacasa 090512201537-phpapp01Entranaminhacasa 090512201537-phpapp01
Entranaminhacasa 090512201537-phpapp01
 
User authentication trends
User authentication   trendsUser authentication   trends
User authentication trends
 
Case Tyrnävä
Case TyrnäväCase Tyrnävä
Case Tyrnävä
 
Case Vantaa
Case VantaaCase Vantaa
Case Vantaa
 
Manejo de residuos hospitalares
Manejo de residuos hospitalaresManejo de residuos hospitalares
Manejo de residuos hospitalares
 
ManualCv
ManualCvManualCv
ManualCv
 
Gerentes dueños artículo
Gerentes dueños artículoGerentes dueños artículo
Gerentes dueños artículo
 
Primeros auxilios
Primeros auxiliosPrimeros auxilios
Primeros auxilios
 
imagenes para compartir detras de los productos fisico
imagenes para compartir detras de los productos fisicoimagenes para compartir detras de los productos fisico
imagenes para compartir detras de los productos fisico
 
El jueves
El juevesEl jueves
El jueves
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
Assignment
AssignmentAssignment
Assignment
 
APTLD Update
APTLD UpdateAPTLD Update
APTLD Update
 

Similar to Larry fermi generic nac overview-expanded - atlseccon2011

Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
shanthishyam
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
salutiontechnology
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
Information Security Awareness Group
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
Ben Rothke
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Firewalls
FirewallsFirewalls
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
LokNathRegmi1
 
Module 6.pptx
Module 6.pptxModule 6.pptx
Module 6.pptx
ssuser66c4d5
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Michele Chubirka
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
Invincea, Inc.
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Tarek Nader
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
kCura_Relativity
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 

Similar to Larry fermi generic nac overview-expanded - atlseccon2011 (20)

Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
Module 6.pptx
Module 6.pptxModule 6.pptx
Module 6.pptx
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 

More from Atlantic Security Conference

Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011
Atlantic Security Conference
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
Atlantic Security Conference
 
Henry stern - turning point on war on spam - atlseccon2011
Henry stern - turning point on war on spam - atlseccon2011Henry stern - turning point on war on spam - atlseccon2011
Henry stern - turning point on war on spam - atlseccon2011
Atlantic Security Conference
 
Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011
Atlantic Security Conference
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
Atlantic Security Conference
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
Atlantic Security Conference
 
Ron perris compliance-v-security - atlseccon2011
Ron perris   compliance-v-security - atlseccon2011Ron perris   compliance-v-security - atlseccon2011
Ron perris compliance-v-security - atlseccon2011
Atlantic Security Conference
 
Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011
Atlantic Security Conference
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
Atlantic Security Conference
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
Atlantic Security Conference
 
Rafal m. los wh1t3 rabbit - ultimate hack - layers 8 & 9 of the osi model -...
Rafal m. los   wh1t3 rabbit - ultimate hack - layers 8 & 9 of the osi model -...Rafal m. los   wh1t3 rabbit - ultimate hack - layers 8 & 9 of the osi model -...
Rafal m. los wh1t3 rabbit - ultimate hack - layers 8 & 9 of the osi model -...
Atlantic Security Conference
 

More from Atlantic Security Conference (11)

Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
Henry stern - turning point on war on spam - atlseccon2011
Henry stern - turning point on war on spam - atlseccon2011Henry stern - turning point on war on spam - atlseccon2011
Henry stern - turning point on war on spam - atlseccon2011
 
Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
Ron perris compliance-v-security - atlseccon2011
Ron perris   compliance-v-security - atlseccon2011Ron perris   compliance-v-security - atlseccon2011
Ron perris compliance-v-security - atlseccon2011
 
Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011Wayne richard - pia risk management - atlseccon2011
Wayne richard - pia risk management - atlseccon2011
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
Rafal m. los wh1t3 rabbit - ultimate hack - layers 8 & 9 of the osi model -...
Rafal m. los   wh1t3 rabbit - ultimate hack - layers 8 & 9 of the osi model -...Rafal m. los   wh1t3 rabbit - ultimate hack - layers 8 & 9 of the osi model -...
Rafal m. los wh1t3 rabbit - ultimate hack - layers 8 & 9 of the osi model -...
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Larry fermi generic nac overview-expanded - atlseccon2011

  • 1. Who’s Been Accessing YOUR Network? Using NAC to Cover Your Assets
  • 2. Copyright Trustwave 2008Copyright 2011 Trustwave Agenda/Contents • Introduction • Common Terms • Basic Components/Capabilities of NAC Technology
  • 3. Copyright Trustwave 2008Copyright 2011 Trustwave What is NAC? • Prevent corrupted, unauthorized, or high-risk systems from gaining network access • Protect the network and other resources from connected systems that become corrupted or vulnerable • Control the level of access based on policies – Student vs Faculty vs Alumni – Guest vs Staff – Anti Virus up to date or not – Use of File Sharing application – Gaming devices – Services running on device Processes and technologies designed to:
  • 4. Copyright Trustwave 2008Copyright 2011 Trustwave Threats in a Mobile World Today, endpoint devices represent the greatest risk to network security — by propagating threats or being vulnerable to them. Infected Devices Unknown Devices Out-of-Policy Devices propagate threats, resulting in loss of productivity & hours of cleanup like home PCs, contractor PCs, & WiFi phones can introduce new threats or compromise data security are more vulnerable to malware attacks, while running services that could jeopardize security
  • 5. Copyright Trustwave 2008Copyright 2011 Trustwave Agenda/Contents • Introduction • Common Terms • Basic Components/Capabilities of NAC Technology
  • 6. Copyright Trustwave 2008Copyright 2011 Trustwave Common Terms • Element detection – Detection of new endpoints as they are introduced to the network • Authentication (AuthN) – Verification of a user’s identity when accessing the network (who are you?) • Authorization (AuthZ) – Determination of which network resources can be accessed by an authenticated user (what can you do?). Typically defined by group memberships, roles, etc in existing authorization systems such as Active Directory, Radius or LDAP servers.
  • 7. Copyright Trustwave 2008Copyright 2011 Trustwave Common Terms (2) • Endpoint integrity check – The ability to assess whether a newly introduced network element complies with the security policy or is vulnerable. These checks may include the ability to gather knowledge regarding an element’s operating system, the list of installed patches, the presence of A/V software and its virus signature’s date, last time scanned, etc. • Remediation – The process of quarantining an element not complying with the defined security policy until the issues causing it to be non-compliant are fixed. When quarantined, the element may be allowed to access a defined set of remediation servers allowing the user to fix the non-compliant issues.
  • 8. Copyright Trustwave 2008Copyright 2011 Trustwave Common Terms (3) • Enforcement – The ability to restrict an endpoint’s access to the network if the element does not comply with the defined security policy. Options are typically allow, deny, restrict, and/or some other manipulation of traffic such as redirection for remediation. • Pre-Admission Assessment – The process of detecting a new element connecting to the network, and the ability to verify whether or not it complies with a defined security policy. If the element does not comply with the defined security policy, the solution must restrict the element’s access to the network • Post-Admission Protection – The process of continuously monitoring for and protecting users, elements and their sessions from suspicious activity (i.e. worms, viruses, malware, etc) or policy violations.
  • 9. Copyright Trustwave 2008Copyright 2011 Trustwave Agenda/Contents • Introduction • Common Terms • Basic Components/Capabilities of NAC Technology
  • 10. Copyright Trustwave 2008Copyright 2011 Trustwave NAC Policy Components Identity Endpoint Compliance Behavior Network Access Control Match user identity with each endpoint on the network Track user behavior Enforce policy based on user or user groups Seamless integration with existing credential stores Analyze every packet from every device Zero-day threat detection L2-L7 behavioral policy enforcement Measure health and compliance status of every endpoint on the network Robust reporting tracks all compliance data Flexible tiered enforcement
  • 11. Copyright Trustwave 2008Copyright 2011 Trustwave Pre-Admission Assessment Process • Endpoint detection • Authentication • Endpoint integrity check • Comparison of authentication and integrity check results against a policy store to determine authorization • Policy decision passed to enforcement point • Enforcement of network access (allow, deny, restrict) • Remediation assistance, if required by policy
  • 12. Copyright Trustwave 2008Copyright 2011 Trustwave Post-Admission Capabilities • Post-admission threat detection and protection – Typically likened to IDS/IPS but with a focus on Day Zero threats • Continuous Monitoring • Provide ongoing checks and monitoring for: – Policy violations – Change of risk state • Provide for periodic and/or random pre-admission “re-check” • Remediation assistance, if required by policy
  • 13. Copyright Trustwave 2008Copyright 2011 Trustwave • Device & User Authentication • Endpoint Compliance • Protection from Suspicious Activity • Policy Based Access • Continuous Monitoring Summary - How NAC Covers Your Assets 15