+ All Categories
Home > Documents > Blue Coat - ISAC-研討會

Blue Coat - ISAC-研討會

Date post: 16-Oct-2021
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
21
Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 1 Blue Coat - ISAC-研討會 Matthias Yeo, Chief Technology O cer APAC (Blue Coat Systems) 代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw
Transcript
Page 1: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 1

Blue Coat - ISAC-研討會

Matthias Yeo,

Chief Technology Officer APAC (Blue Coat Systems)

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 2: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 2

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 3: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 3

http://pix360.co.nf/fert/Login.html

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 4: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 4

•  HeartBleed •  POODLE •  SHELLSHOCK

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 5: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 5

The world’s biggest data breaches 2015 - 888 incidents, 246 million records – 10 Sept

Records affected: 245,919,393 Incidents SPAN across: •  Healthcare 302 •  Government 275 •  Technology 133 •  Retail 71 •  Education 53

The biggest breach of 2015 (so far) •  Anthem: Breach of 78.8 million of customers record

from December 2014 onwards

The world’s most significant breach – OPM •  Breach of 21.5 million records in the database of the

US Office of Personnel Management (OPM) •  Suspected hackers from China

•  North America : 707 incidents •  Europe: 94 incidents •  APAC : 63 Incidents

•  Australia : 19 Incidents •  Japan : 9 Incidents •  New Zealand : 8 Incidents •  China : 6 Incidents •  Hong Kong : 2 Incidents •  Singapore : 2 Incidents •  Taiwan : 2 Incidents •  Thailand : 2 Incidents •  Malaysia : 1 Incidents

62% by malicious outsiders, 22% by accident 12% by malicious insiders 2% by hacktivism 2% by state-sponsored attacks

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 6: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 6

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 7: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 7

The expanding window of exposure

RESOLUTION I N C I D E N T

I D E N T I F I E D

T O D AY ’ S R E A L I T Y

T I M E T O D E T E C T I O N

T I M E T O R E S P O N S E

206 DAYS to Detection*

21-35 DAYS Average Breach Resolution

* Verizon 2014 Data Breach Investigations Report

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 8: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 8

Quickly Closing the Window of Exposure

RESOLUTION I N C I D E N T

I D E N T I F I E D

NET RESULT = LOWER COST manpower, time, exposure to business and mitigated risk

O U R M I S S I O N

T I M E T O D E T E C T I O N

T I M E T O R E S P O N S E

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 9: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 9

Incident response architecture

SSL visibility and policy control for ALL SSL traffic

(all ports, all traffic)

Selective decryption maintains privacy

(Host Categorization)

Standalone, high-performance appliance –

up to 4Gbps SSL

Multiple output streams

INTERNAL NETWORK

DATA CENTER

DMZ

SECURITY ANALYTICS PLATFORM

SECURITY ANALYTICS PLATFORM

REMOTE OFFICE

SECURITY ANALYTICS PLATFORM

SECURITY ANALYTICS PLATFORM

SSL VISIBILITY APPLIANCE

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 10: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 10

ETM – Blue Coat’s Technology

Matthias Yeo,

Chief Technology Officer APAC (Blue Coat Systems)

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 11: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 11

Malware using SSL

Upatre + Dyer

Game Over

Angler exploit kit

Dridex

TorrentLocker

ZeuS

Qadars Quakbot Gootkit

Worm.Dorkbot

Shifu Gozi

FindPOS

Retefe

VMZeuS

ProxyChanger

URLzone

Teslacrypt

Rovnix

KINS

Tinba

Redyms Bebloh Vawtrak CryptoWall

Shylock

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 12: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 12

Malware Trends

Jan ‘14 – Sep ’15 (21 months)

C&C Trends

Sep ‘15 – Dec ’15 (3 months)

500 samples of malware families

29,000 samples of malware families

Q3 2014 Q3 2015

1,000 C&C servers using SSL

200,000 C&C servers using SSL

Malware Trends and Technology

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 13: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 13

NG

FW

IDS

/ IPS

Hos

t AV

Web

Gat

eway

SIEM

Emai

l Gat

eway

DLP

Web

App

licat

ion

Fire

wal

l

SIGNATURE-BASED DEFENSE-IN-DEPTH TOOLS

Nation States Cybercriminals

Hactivists Insider-Threats

Threat Actors

Known Threats Known Malware

Known Files Known IPs/URLs

Traditional Threats

SSL

Unknown

Novel Malware Zero-Day Threats Targeted Attacks Modern Tactics &

Techniques

Advanced Threats

Actual Environment

Traffic that is not inspected •  Total upload traffic through SSL : 1.35 TB (79%) •  Total download traffic through SSL : 7.68 TB

(54%) •  Total SSL Traffic : 9.03 TB (57%)

Traffic of concern

Data Loss activities

Recommendations §  Blue Coat best practices recommends intercept and inspect all

SSL traffic.

Total Received Sent

none 2.81 TB 2.23 TB 594 GB Potentially Unwanted Software 992 GB 891 MB 100 MB Suspicious 559MB 534 MB 27 MB Malicious Outbound Data/Botnets 539 MB 511 MB 26 MB Malicious Sources/Malnets 38 MB 37 MB 629 MB

File Storage/Sharing 31 GB 18 GB 12 GBContent Servers 627 GB 593 GB 34 GBSocial Networking 246 GB 229 GB 18 GBChat (IM)/SMS 5.36 GB 3 .2 GB 2.16 GBEmail 4.9 GB 3.71 GB 1.19 GB

Encrypted Traffic hides attack

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 14: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 14

Cipher Suite Support Performance and Network Latency

Privacy versus Security

Complexity of Encrypted Traffic

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 15: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 15

Cipher Suite Support Performance and Network Latency

Privacy versus Security

Complexity of Encrypted Traffic

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 16: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 16

•  Security devices with SSL decryption suffers ~ 80% performance degradation once SSL inspection is “turned on”

•  Degrades investment in security infrastructure – Every hop adds a 80% degradation

•  Others Can’t even decrypt •  What leaders are looking for – One

time (DEDICATED) decryption and processed through all security devices.

IPS NGFW

Performance Degradation and Network Latency

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 17: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 17

Cipher Suite Support Performance and Network Latency

Privacy versus Security

Complexity of Encrypted Traffic

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 18: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 18

•  To date, there are about 70+ cipher suites and key exchanges •  AES-GCM, ChaCha, Camellia,

RSA, Elliptic curve… •  When “existing solution” (NGFW) does

not support such suites, they “downgrade” the cryptography to what they support

•  Downgrade is a huge security risk! •  POODLE, HEARTBLEED…

SSL 1.0? SSL 2.0? SSL 3.0? TLS 1.0? TLS 1.1? TLS 1.2?

How many SSL cipher suite are there?

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 19: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 19

Cipher Suite Support Performance and Network Latency

Privacy versus Security

Complexity of Encrypted Traffic

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 20: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 20

Policy Examples • Block or decrypt traffic from suspicious sites and known malnets

• Bypass / Do not decrypt financial and banking-related traffic

•  We cannot decrypt everything. (Healthcare, Banking site…)

•  Therefore Decryption must be policy based, through site categorisation

Global Intelligence Network

Utilizes 80+ categories, in 55 languages Processes +1.2B web and file requests per day

Easily customizable per regional and organizational needs

PRESERVE PRIVACY AND COMPLIANCE while enabling security

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw

Page 21: Blue Coat - ISAC-研討會

Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. 21

代理商 逸盈科技 | (02)66368889 | www.netfos.com.tw


Recommended