Win the Cyberwar With Zero Trust - Lockdown 2017 · 2017-07-25 · Win the Cyberwar With Zero Trust...

Post on 13-Mar-2020

2 views 0 download

transcript

Win the Cyberwar With Zero Trust

John Kindervag

Field CTO

The Four Levels of War

2 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Grand Strategy - WWII

3 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

The Four Levels of War

4 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Strategy

Strategy - WWII

5 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Strategy - WWII

6 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

The Four Levels of War

7 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Strategy

Tactics

Tactics - WWII

8 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

The Four Levels of War

9 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Strategy

Tactics

Operations

Operations - WWII

10 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

The Four Levels of Cyberwar

11 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Strategy

Tactics

Operations

Cyber Security Grand Strategy:Prevent Data Breaches

13 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

15 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

The Four Levels of Cyberwar

16 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Strategy

Tactics

Operations

Not a Strategy

Source: January 7, 2015, “Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Core Capabilities” Forrester report

18 | © 2017 Palo Alto Networks. Confidential and Proprietary.

Not a Strategy

Not a Strategy

Not a Strategy

22 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

TRUST

VULNERABILITY

MALICIOUS

Which one goes to the internet?

Untrusted Trusted

Source: October 22, 2014, “No More Chewy Centers: The Zero Trust Model Of Information Security” Forrester report

Zero Trust

Untrusted Untrusted

Source: October 22, 2014, “No More Chewy Centers: The Zero Trust Model Of Information Security” Forrester report

Zero Trust Design Concepts

• Focus on the business outcomes

• Design from the Inside > Out

• Start with the assets or data that need protection

• Determine who or what needs access

• Need to know/Least-privilege

• Inspect and log all traffic

1. Who the President is…2. Where the President is…3. Who should have access to the President…

Zero Trust

Zero Trust is the answer!

The Four Levels of Cyberwar

29 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Strategy

Tactics

Operations

DELIVERING THE NEXT-GENERATION SECURITY PLATFORM

30 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

STRATEGIC PARTNERSHIPS

31 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

EXPANSIVE PARTNER ECOSYSTEM

Virtualization

Cloud

Networking

Mobility

Security Analytics

Enterprise Security

Identity and Access

Management

SD-WAN

Orchestration & Security Automation

Threat Intelligence

Over 120 Technology Integrations

Open APIs

Extensive Ecosystem of Partners Across Multiple Technologies

21st Century Zero Trust Network

CHD

MCAP

DB MCAP

APPS

MCAP

WL MCAP

MGMT

server WWW MCAP

User MCAP

SIM NAVDAN MCAP

Segmentation

Gateway

Micro Core and

Perimeter

Source: November 15, 2012, “Build Security Into Your Network’s DNA: The Zero Trust Network Architecture” Forrester report

IPS

Serverfarm

WWW farm

DB farm

IPS

IPSIPS

WAN

WAF

DAM

Augment Hierarchal Networks with Zero Trust

CHD MCAP MGMT

server

WL MCAP

User MCAP

SIM NAVDAN MCAP

Source: November 15, 2012, “Build Security Into Your Network’s DNA: The Zero Trust Network Architecture” Forrester report

Public Cloud

PSY Switch

vSwitch

Hypervisor

Virtual Network

VSG

PSG

Security MGMT

PSY MGMT

Virtualization MGMT

PSY SwitchvSwitch

Hypervisor

Virtual NetVSG

Workload

SDD

C

Extend Zero Trust to the Public Cloud

Workload

PA Series NGFW

VM Series NGFW

VM NGFW

Panorama

The Four Levels of Cyberwar

37 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Strategy

Tactics

Operations

Automation and Orchestration

AUTOMATED SECURITY ACTIONS

Threat Prevention logs

Malware and phishing logs

Correlated Event logs

System logs

Data filtering logs

Traps logs

… ...

10.3.4.122 Compromised

Dynamic Address Group

Policy Source Action

Compromised

hosts

Dynamic

Address

Group

Enforce multi-factor

authentication

1. Granular log filtering 2. Automated actions on the NGFW

HT

TP

/S

AUTO-TAG

3. Automated actions on third party systems

Any REST API

Traps and Wildfire C2 alerts on

10.3.4.122

© 2017 Palo Alto Networks, Inc. Confidential

The Four Levels of Cyberwar

40 | © 2017 Palo Alto Networks, Inc. Confidential and Proprietary.

Grand Strategy (Political)

Strategy

Tactics

Operations

Rep. Jason Chaffetz on Zero Trust:

“Zero trust would have profoundly limited the attacker’s ability to move within OPM’s network and access such sensitive data.”

Source: Adopting a zero trust cyber model in government: http://federalnewsradio.com/commentary/2016/09/adopting-zero-trust-cyber-model-government/

Thank You

John Kindervag

42 | © 2017 Palo Alto Networks. Confidential and Proprietary.

Field CTO

jkindervag@paloaltonetworks.com

@Kindervag