SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Security Controls – What Works
MSIT 458: Information Security & Assurance By Curtis Pethley.
Introducing Computer and Network Security
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
Controls for Information Security
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Introduction to Network Defense
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
HIPAA COMPLIANCE WITH DELL
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Joseph Ferracin Director IT Security Solutions Managing Security.
BUSINESS B1 Information Security.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Module 11: Designing Security for Network Perimeters.
5/18/2006 Department of Technology Services Security Architecture.
Security fundamentals Topic 10 Securing the network perimeter.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IS3220 Information Technology Infrastructure Security
The NIST Special Publications for Security Management By: Waylon Coulter.
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
CS457 Introduction to Information Security Systems
Information Security Policy
AT&T Premises-Based Firewall Enhanced SBS Solution
IS4680 Security Auditing for Compliance
Presentation transcript:

SAFE Blueprint and the Security Ecosystem

2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design Objectives  Security Ecosystem

3 SAFE  To see the entire SAFE Blueprint 394/ns171/ns128/networking_solutions_pa ckage.html

4 SAFE Blueprint Overview  Cisco document – not a standard  Use as a guide to design and implement network security  based on Cisco and partner products  uses a defense-in-depth and modular approach to security design

5 SAFE White Papers

6 SAFE Overview  Cisco describes SAFE as a defense- in-depth approach a system has multiple security measures in place  if one defense is breached, another is in place to prevent further damage SAFE blueprint discourages having only one device performing a security function  mitigate threats throughout the network

7 SAFE Overview Security capabilities can be hosted on  Dedicated appliances, such as firewalls  Incorporated in the Cisco IOS on routers and switches  Running in the background on end systems  Blueprint guidelines encourage you to make security decisions based on the dangers to be avoided, rather than solely on security devices

8 Achieving The Balance  It is commonly thought that a network cannot be totally secure So why try?  SAFE is not an absolute answer, but a guide to help designers develop workable solutions achieving an acceptable balance between accessibility and usability The network security policy defines this balance

9 Security Policy  Develop the security policy with the participation and agreement of the highest levels of an organization’s management Helps to build the required support for the creation, acceptance, and adaptation of the security design

10 Defining Customer Expectations  Organizations have different requirements for security Separate segments on the network can have different security requirements  SAFE assumes that a security policy is already in place One may not be in place  Therefore you must start by creating one

11 Complete Security Is Not Achievable  A key expectation  Company must adapt a proactive regime to keep the security systems robust

12 Where Most Breaches Occur (or Not)  Commonly accepted that network- security breaches occur inside the network A firewall that protects a network from the outside is not sufficient Need security measures that also can detect and reduce risks that begin on a “secured” segment

13 Design Objectives  Approach focuses on how vulnerabilities are exploited  Assess the existing network to understand the nature of threats Determine how to mitigate these threats

14 Design Objectives  Design objectives of the SAFE blueprint: Security and attack mitigation based on policy Security implementation throughout the infrastructure (not just on specialized security devices) Secure management and reporting Authentication and authorization of users and administrators to critical network resources Intrusion detection for critical resources and subnets Support for emerging networked applications

15 Design Objectives  SAFE blueprint emphasizes the defining modules within a network first level of modules are functional areas

16 Design Objectives  Second layer are the modules within the functional areas  Table 16-3, page 413

17 Included Modules

18 Design Objectives  Not all actual enterprise networks have specific devices, blades, cards, or ports clearly assigned to all the modules mentioned  Still is useful to the designer to identify where all the functions occur and the interactions between the functions

19 Design Objectives

20 Significance of Areas and Modules  Helps to layer the protection A different security measure in place at different points in the network Makes the security solution more resilient and scalable Modules become templates for the modifications to the network required by the addition of users and applications

21 Significance of Areas and Modules Modularization also reduces security issues caused by growth  security capabilities are considered in the module implementation

22 Benefits of Using SAFE  Benefits of using SAFE in network design and implementation: Provides a proven, detailed blueprint to securely compete in the Internet economy Provides the foundation for migrating to secure, cost-effective converged networks Enables organizations to stay within their budgets by deploying a modular, scalable security framework in stages Delivers integrated network protection by offering best-in-class security products and services

23 Security Ecosystem  Cisco envisions a community dedicated to providing customers the best solution by giving them access to the following resources: Best-of-breed consulting and vendor partners SAFE blueprint-based solutions such as managed services and vulnerability assessments

24 Security Ecosystem  includes solutions from vendors of supplemental products partners to provide assessment, planning, and integration capabilities providers of monitoring and management services

25 Essential Elements for Comprehensive Network Security  Five elements Identity—Ensure the accurate and positive identification of network users, hosts, applications, services, and resources. Perimeter security—Control access to critical network applications, data, and services  Firewalls, virus scanners and content filters.

26 Essential Elements for Comprehensive Network Security Secure connectivity—Protect confidential information by implementing VPNs Security monitoring—Proactively identify areas of weakness with Policy management—Specify, manage, and audit the state of a security policy

27 Summary  SAFE is a layered model  defense-in-depth approach  If one system is compromised, other security systems protect the network  There are six objectives of the SAFE Blueprint  The Blueprint focuses on five key areas  Cisco is trying to establish a “Security Ecosystem” of partners, vendors and service providers