Endpoint Security Considerations Agenda Open Networks PROs & CONs Challenges Alternatives Open Networks are … Open Inside Wireless Net Meeting Instant Messenger Email
Download ReportTranscript Endpoint Security Considerations Agenda Open Networks PROs & CONs Challenges Alternatives Open Networks are … Open Inside Wireless Net Meeting Instant Messenger Email
Endpoint Security Considerations 1 Agenda Open Networks PROs & CONs Challenges Alternatives 2 Open Networks are … Open Inside Wireless Net Meeting Instant Messenger Email Internet access PERIMETER P2P applications Outside Outsourcing Wireless Partners/Consultants Telecommuting Traveling Employees Website access 3 Information Security Challenges Missing protection Security investment not at work Misconfiguration Solve ‘solved’ problems again and again Misuse/Misbehavior Tradeoff Protection for productivity Missing in action Chasing the unknown What to do ?... Know When you are Finished ? 4 Challenge Finished when you Stop Rogues Valid Device Rogue Device Valid Device Rogue Device Open Networks Valid Device Valid Device 5 Challenge and… Prevent valid devices from becoming Rogues Valid Device Rogue Device Valid Device Valid Device Open Networks Rogue Device Valid Device 6 What is a Rogue? Customer experience Rogues Gartner Vulnerabilities Old Patch Recent Patch New Vulnerability Misconfiguration Open Network 7 Compliance Models Voluntary Compliance Model Turning the crank faster doesn’t help 8 Process Discover –missing in action Protect - mis-configuration, - missing protection, - misuse and misbehavior. Enforce - endpoints, - access points - all of the time. Remediate – to reconnect 9 Know when you’re finished 10 Requirements Devices – managed, unmanaged, unmanageable Roles – educate software not people Processes - network, security, operations Plumbing – switches, wireless, VPN, SSL Relentless – always, everywhere 11 Devices Managed Unmanaged Unmanageable Corporate-owned devices Computers owned by partners, suppliers, customers, outsourcers, employees or public kiosks Network Dark Matter rogue computers, network infrastructure, and embedded devices 12 Educate software not people Security policies must adapt from HQ to hotel to home to hotspot Policies must change by role, device type, location and connection Without transparency, CSOs must choose between good security or productive users Adaptive Policies Role Device Type Network Location Policy Executive Corporate Owned Enterprise LAN Trusted, file sharing on, full application access Sales person Employee Owned Home wireless HI, file sharing off, IM off, print sharing off, limited application access Outsourcer Unknown Public Internet VD, HI, SSL VPN access only and webmail only with data sanitization 13 NAC * NAP * TNC Comparison 15 Trusted Computing Group Standards TCG –a thought leading organization working together to help enterprises ensure a trusted computing environment Trusted Network Connect Sub-Group is creating a standard for interoperability to prevent untrustworthy devices from connecting to enterprise networks. Leverage existing standards – current consideration - IEEE 802.1x protocol and the IETF EAP RFC 3748 protocol for host access negotiation with network devices. - RADIUS [RFC 2865] for making access verification decisions and defining network access privileges. Ability to leverage the Trusted Platform Module (TPM) microchip for hardware based level of assurance. 16 Summary – Requirements Devices – managed, unmanaged, unmanageable Roles – educate software not people Process – security, network, operations Plumbing – switches, wireless, VPN, SSL Relentless – always, everywhere 17 Thank you for your time