Brkaci 2060
Brkaci 2060
Brkaci 2060
Cisco Tetration:
Data Center Analytics
Deployment and Use Cases
Remi Philippe
Tim Garner
What You Signed Up For
• It begins with visibility. Streaming telemetry of flow, network state, and
process events, combined with flexible identity sources yields Tetration an
unparalleled view of the data center landscape. From this vantage point
powerful analytics lead to effective segmentation and threat protection. In
this session, we will overview the solution architecture, explore sensor
options and work through a use case where we will breach our own
application and then journey to a more secure data center through policy
discovery, validation, multi-level segmentation (network and host), and
compliance. Once all the workloads in our environment are segmented, we
will explore threat protection through integrations and deep system signals.
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
• What is Workload Protection?
• What can we do to help?
• Where do I start?
• What about the Operating System?
• And Operations?
• How did we do that?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
What is Workload
Protection?
Is this secure?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
And this?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
What about this?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Feeling Secure?
• Attacks are mainly driven by application vulnerabilities, not network
• In most cases the port will be legitimately open
• Apache Struts?
• What about attacks coming from other workloads on the same hypervisor
• Spectre / Meltdown?
• Let’s see an example
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Topology
db
server
struts
server
db
server
struts
server
file
server
security group
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Demo
What Happened?
• Firewall Configuration was good
• I accessed a public (or intranet) facing website
• But…
• His Application had a security flaw (CVE-2017-5638)
• https://nvd.nist.gov/vuln/detail/CVE-2017-5638
• Traffic ”looked” legit
• He did not implement Segmentation, so it was not contained
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
What can we do?
The best way to secure a workload?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
More Realistically
• Australian Signals Directorate TOP4
• https://www.asd.gov.au/publications/protect/top_4_mitigations.htm
• Application Whitelisting
• Patching Systems
• Restricting Administrative Privileges
• Creating a Defense in Depth System
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Protecting server workloads in hybrid cloud
Depth
Breadth Micro segmentation
Containers, VM, Bare Metal, Vulnerability management
On premises, public cloud, Integrity monitoring
legacy apps, appliances …
Exploit prevention
Data leakage prevention
Application control
Encryption
Scale
Tens of thousands of Speed
workloads Real time detection and
response; Address ephemeral
workloads
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Where do I start?
Applications
• First we need to baseline what is going on in our environment
• Which Applications are running?
• On which servers are they running?
• How are they interacting with each other?
• To do this… We need to rely on facts, not humans
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Dynamic Application Mapping
Host A Host B
Role = Web Role = Web
Scope = App1 Scope = App1
Host E Host F
• Discover Application Clusters Cluster Web Role=Web and Scope = App1 Role = DB Role = DB
• Creates Clusters based on Scope = App1 Scope = App1
annotations
• Enable auto-scale based on
scope and annotations Host C Host D
Role = App Role = App
Scope = App1 Scope = App1 Cluster DB Role=DB and Scope = App1
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Segmentation Policy
Express Policies in Human Language
Development can’t talk to production
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Allow computers to perform the heavy lifting
Tetration automatically converts your intent into blacklist and whitelist rules
Intent Rules
SOURCE * DEST
128.0.100.0/24 PORT = 80
Block all HTTP connections that are
not destined for web servers
SOURCE * DEST * PORT = 80
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Enforcement of policy across any floor tile
Cisco Tetration Analytics
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Demo
How are policies enforced within a workspace?
dport 80 dport 80
OUTPUT NEW, ESTAB NEW, ESTAB INPUT
sport 80 sport 80
INPUT ESTAB ESTAB
OUTPUT
server1 server2
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
How are policies enforced between workspaces?
dport 80
OUTPUT NEW, ESTAB INPUT
sport 80
INPUT ESTAB
OUTPUT
server1 server2
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
How are policies enforced between workspaces?
dport 80 dport 80
OUTPUT NEW, ESTAB NEW, ESTAB INPUT
sport 80 sport 80
INPUT ESTAB ESTAB
OUTPUT
server1 server2
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Up to date with Immunizations?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Up to date with Immunizations?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Back to our example
• How does the application segmentation helps in our case?
• What do you think?
• Let’s punch through the application again, shall we?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Demo
What Happened?
• Tim didn’t prevent the attack
• Application Segmentations didn’t help?
Or did it?
• This time I got in, but I couldn’t do anything more
• I was contained to the breached server
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Did we help?
1. Application Whitelisting
• We set the scene by segmenting application tiers
2. Patching Systems
3. Restricting Administrative Privileges
4. Creating a Defense in Depth System
• We’ve setup the first stages of our defense in depth approach with multi-level
segmentation
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
What about the
Operating System
It’s not only about the network
• We can continue creating policies
• This will not prevent or identify this kind of attack
• Payload parsing? What about encrypted traffic with forward secret?
• How about tracing a security event?
• How / Where did it start?
• What happened?
• The protection needs to be elevated to Operating System
• Get CVE and patching information?
• Detect Side Channel Attacks?
• Identify Privilege escalations?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
CVE
• Common Vulnerabilities and Exposures (CVE) is a centralized repository of
publicly known vulnerabilities
• https://nvd.nist.gov/ for example
• CVE exposes:
• Vulnerability details
• Impacted versions
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Understanding Exposure
• Tetration Stores all CVE information since 1999
• And collects the list of installed packages in order to detect known
vulnerabilities
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
And Taking Action!
• As Tetration is Tag and Metadata driven we can easily segment based on
CVE
• Or Installed packages
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Process Based Anomalies
• Arm and detect security events
• Understand what happened after the
event was fired
• Just like a step by step debugger!
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Back to our example
• Will process level metrics help us detect this event?
• What do you think?
• Can we easily secure this once CVE is identified?
• Let’s punch through the application again, shall we?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Demo
What Happened?
• We got alerted immediately on attack, and on privilege escalation
• We identified our vulnerable struts servers and quarantine them until the
owner patches them
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Did we help?
1. Application Whitelisting
• We set the scene by segmenting application tiers
2. Patching Systems
• We identified Vulnerable systems and were able to take action on them
3. Restricting Administrative Privileges
• We identified and alarmed on privilege escalation
4. Creating a Defense in Depth System
• We’ve setup the first stages of our defense in depth approach with multi-level
segmentation
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Closing Thoughts
What did we do?
• We Implemented a Defense in Depth Strategy through
• Application Discovery
• Policy Generation
• Segmentation
• Then we enhanced our security posture starting from the Operating
System
• Alarming of Process Anomalies
• Taking Actions on CVE
• And finally we made sure this was an “operable solution”
• Segmentation Visibility
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
What about a… Dashboard?
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKACI-2060
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Complete your online
session survey
• Please complete your Online Session
Survey after each session
• Complete 4 Session Surveys & the Overall
Conference Survey (available from
Thursday) to receive your Cisco Live T-
shirt
• All surveys can be completed via the Cisco
Events Mobile App or the Communication
Stations
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Continue Your Education
BRKACI-2060 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Thank you