+ All Categories
Home > Documents > Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The...

Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The...

Date post: 09-Feb-2018
Category:
Upload: hoanganh
View: 212 times
Download: 0 times
Share this document with a friend
66
SECURE DATA CENTER DESIGN Piotr Wojciechowski (CCIE #25543)
Transcript
Page 1: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURE DATA CENTER DESIGN Piotr Wojciechowski (CCIE #25543)

Page 2: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

ABOUT ME ¢ Senior Network Engineer MSO at VeriFone Inc. ¢ Previously Network Solutions Architect at one of top

polish IT integrators ¢ CCIE #25543 (Routing & Switching) ¢ Blogger – http://ccieplayground.wordpress.com ¢ Administrator of CCIE.PL board

�  The biggest Cisco community in Europe �  Over 6800 users �  3 admin, 7 moderators �  58 polish CCIEs as members, 20 of them actively posting �  About 150 new topics per month �  About 1000 posts per month �  English section available

Page 3: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

AGENDA ¢ What we want to protect? ¢ Physical DC security ¢ Secure Network Design ¢  Internet Edge Protection ¢ Security Audits

Page 4: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

WHAT WE WANT TO PROTECT?

Page 5: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

WHAT WE WANT TO PROTECT? ¢ Sensitive data ¢ Business-related processes ¢ Network services ¢ Applications ¢ Hardware

Page 6: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

WHAT WE WANT TO PROTECT?

Page 7: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

WHAT WE WANT TO PROTECT?

Page 8: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

WHERE WE PROTECT?

Page 9: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

WHERE WE PROTECT?

Page 10: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AS A PROCESS

1.  Subject matter experts define policies 2.  Policies used to create application templates 3.  Application templates used to create application profiles 4.  Associated profiles creates resources automatically

Page 11: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

PHYSICAL DC SECURITY

Page 12: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY ¢ Site location

�  Risk of natural disasters on acceptable level (fires, lightning storms, hurricanes, earthquakes etc.)

�  Man-made disasters on low level (plane crashes, riots, fires, explosions etc.) ¢  Site should not be adjacent to airports, prisons, freeways,

banks, rafineries etc.) �  Data center should not share the same building with

other offices, especially offices not owned by organization

Page 13: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY ¢ Site location

�  Electrical utility powering the site should have 99,9% or better reliability of service. ¢  It must be delivered from at least two separate substations ¢  Backup power generators

�  Water should be delivered from more than one source

Page 14: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY ¢ Perimiters

�  Fence around the facility �  Guard kiosks at each access point �  Automatic authentication method for employees

(badges) �  CCTV �  Parking not align to the building �  No clear advertisement that Data Center is located at

this facility

Page 15: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY ¢ Surveillance

�  Monitoring of property as well as neighborhood �  Guards on patrol �  Parking permits for vehicles �  Separate parking areas for employees and visitors

Page 16: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY ¢ Entry points

�  Loading docks and all outside doors should have automatic authentication methods (ie. badges)

�  Each entrance should have physical barriers and CCTV cameras

�  Engineers must be required to use badges with pictures �  Track equippment being placed in and removed

Page 17: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY ¢ NOC (Network Operation Centre)

�  Must have power, temperature, fire and humidity monitoring systems in place

�  Redundant methods of communication with outside (analog phones, IP phones, cell phones etc.)

�  Manned 24/7

Page 18: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY ¢ Disaster Recovery

�  It’s a must have! �  Must contain – definition of disaster, who gets notified,

who conduct damage assessment, where backups are located and what to do to maintain them

�  Plan must be updated and reviewed

Page 19: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY

Page 20: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY

Page 21: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY

Page 22: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY

Page 23: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY

Page 24: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY

Page 25: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

DATA CENTER PHYSICAL SECURITY

Page 26: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURE NETWORK DESIGN

Page 27: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

MULTI-LAYER DC PROTECTION ¢ No single solution for all data centers ¢ Security should be deployed basing on application

requirement, certification requirement as well as traffic flow

¢ To much protection can be worse than no protection ¢ Virtualization – new challenges for security

Page 28: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY ZONES ¢ A security zone is an area within a network

occupied by a group of systems and components with similar requirements for the protection of information and the attendant characteristics associated with those requirements.

¢ Security zones are often layered as trust zones such that resources in higher trust zones may communicate with resource in lower trust zones, but not the other way around. 

Page 29: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY ZONES

Page 30: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY ZONES ¢ Goal of security zones:

�  Control inter-zone communication �  Monitor inter-zone communication using IDP/IPS �  Control management access into, out of and within the

zone (jump servers) �  Enforce data confidential and integrity rules for data

stored within a zone, as well as for replication and backup.

Page 31: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY ZONES ¢ How to establish security zone?

Page 32: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

IPS DEPLOYMENT ¢ The Intrusion Prevention System (IPS) provides

deep packet and anomaly inspection to protect against both common and complex embedded attacks.

¢ Because of the nature of IPS and the intense inspection capabilities, the amount of overall throughput varies depending on the active policy.

¢ The IPS deployment in the data center usually leverages EtherChannel load balancing from the service switch. This method is recommended for the data center because it allows the IPS services to scale to meet the data center requirements

Page 33: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

IPS DEPLOYMENT ¢ Usually deployed in service

layer (part or DMZ and high security zones)

¢ A port channel is configured on the services switch to forward traffic

Page 34: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

IPS DEPLOYMENT ¢ Spanning tree plays an

important role for IPS redundancy in this design �  Under normal operating

conditions traffic, a VLAN will always follow the same active Layer-2 path

Page 35: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

IPS DEPLOYMENT ¢ Spanning tree plays an

important role for IPS redundancy in this design �  If a failure occurs (service

switch failure or a service switch link failure), spanning tree would converge and the active Layer-2 traffic path would change to the redundant service switch and Cisco IPS appliances.

Page 36: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

IPS DEPLOYMENT – SECURE TRAFFIC FLOW

Page 37: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES - VISIBILITY ¢ New challenges for

visibility into what is occurring at the virtual network level

¢ Traffic flows can now occur within the server between virtual machines without needing to traverse a physical access switch

Page 38: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES - VISIBILITY ¢  If a virtual machine

is infected or compromised it might be more difficult for administrators to spot without the traffic forwarding through security appliances

Page 39: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES - VISIBILITY ¢ ERSPAN forwards

copies of the virtual machine traffic to the Cisco IPS appliance and the Cisco Network Analysis Module (NAM)

Page 40: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES - ISOLATION ¢ Server-to-server filtering can be

performed using ACLs on the Cisco Nexus 1000V

¢ Because the server-to-server traffic never leaves the physical server, the ACL provides an excellent method for segmenting this traffic.

Page 41: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES - ISOLATION ¢  There are two options for adding an

access list to the virtual Ethernet interfaces to block communication: �  The ACL can be defined and the access

group can be applied to a port profile. All interfaces configured for the port profile will inherit the access-group setting.

�  Specific ACLs on an interface can be applied directly to the virtual Ethernet interface in addition to the port profile. The port profile will still apply but the access group will only be applied to the specific interface instead of all interfaces that have inherited the particular port profile.

Page 42: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES - FIREWALLING ¢ An additional virtual

context is created on the Cisco ASA and designated to reside between the servers and an Oracle database

¢  It can also be virtual firewall ASA 1000V

Page 43: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES - FIREWALLING ¢ The goal is not to prevent

any server from communicating with the database, but rather to control which servers can access the database

¢ Context firewalls can run in routed and transparent modes

Page 44: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES – WEB APPLICATION FIREWALL ¢ WAF can protect

servers from a number of highly damaging application-layer attacks—including command injection, directory traversal attacks, and cross-site (XSS) attacks

Page 45: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES – WEB APPLICATION FIREWALL ¢ Can be used also for

SSL offloading

Page 46: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES – VM-TO-VM IDS ¢ ERSPAN on the Cisco

Nexus 1000V is leveraged to forward a copy of virtual machine-to-virtual machine traffic to the IDS at the services layer

¢ Both virtual machines reside on the same physical server

Page 47: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES – VM-TO-VM IDS ¢ The attempt triggers a

signature on the IDS and is logged for investigation

Page 48: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

VIRTUALIZATION CHALLENGES – SUMMARY

  Botnets DoS Unauthorized Access

Spyware, Malware

Network Abuse

Data Leakage

Visibility Control

Routing Security   Yes Yes   Yes   Yes Yes

Service Resiliency   Yes Yes         Yes

Network Policy Enforcement

Yes   Yes   Yes Yes   Yes

Application Control Engine (ACE)

  Yes Yes       Yes Yes

Web Application Firewall (WAF)

    Yes Yes   Yes Yes Yes

IPS Integration Yes     Yes Yes   Yes Yes

Switching Security   Yes Yes   Yes Yes    

Endpoint Security Yes Yes Yes Yes Yes Yes Yes Yes

Secure Device Access     Yes   Yes Yes Yes Yes

Telemetry Yes Yes Yes   Yes   Yes  

Page 49: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

INTERNET EDGE PROTECTION

Page 50: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

INTERNET EDGE PROTECTION

Page 51: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

INTERNET EDE PROTECTION ¢ The Internet edge is a public-facing network

infrastructure and is particularly exposed to large array of external threats. Some of the expected threats are as follows: �  Denial-of-service (DoS), distributed DoS (DDoS) �  Spyware, malware, and adware �  Network intrusion, takeover, and unauthorized network

access �  E-mail spam and viruses �  Web-based phishing, viruses, and spyware �  Application-layer attacks (XML attacks, cross scripting,

and so on) �  Identity theft, fraud, and data leakage

Page 52: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

FIREWALL PHYSICAL INTERFACES LAYOUT

The different logical interfaces on the Cisco ASA can be used to separate the DMZ, SP-facing interfaces, and the inside corporate infrastructure

Page 53: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

WEB APPLICATION FIREWALL

Page 54: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

WEB APPLICATION FIREWALL ¢ Configure the web application firewall to retain the

source IP address if the traffic is directed to appliances in the data center.

¢  It is recommended that HTTPS traffic directed to the data center, not be encrypted as the Cisco ACE module in data center will perform the load-balancing and decryption while also providing higher performance.

¢ The web application firewall in the Internet edge and the web application firewall in data center to be configured in the same cluster.

Page 55: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SERVICE PROVIDER EDGE ¢ Use BGP as the routing protocol for all dynamic

routing—both between the border routers and between the border routers and SP.

¢ Have an independent autonomous system number. This will give the flexibility of advertising the Internet prefix to different SPs.

¢ Use PfR as path-optimization mechanism. This will ensure that the optimal path is selected between the SPs—thereby increasing the application performance.

Page 56: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AUDITS

Page 57: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AUDITS ¢ There is no one template of security audit that will

fit everyone ¢ Some security audits are cerification related (in

example PCI-DSS) ¢ Audits does not cover only networking aspects ¢  If performed correctly, a security audit can reveal

weakness in technology, practices, employees and other key areas

¢ Usually is semi-automated

Page 58: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AUDITS ¢ Audit components (some, not all):

�  Vulnerability scans �  Examination of OS settings �  Examination of application settings �  Network analyses �  Employee interview �  Logs studying �  Security policies review

Page 59: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AUDITS ¢ Some of the key questions that auditor must ask

include: �  Who is in charge of security, and who does this person

report to? �  Have ACLs (Access Control Lists) been placed on

network devices to control who has access to shared data?

�  How are passwords created and managed? �  Are there audit logs to record who accesses data? �  Who reviews the audit logs, and how often are they

examined? �  Are the security settings for OSes and applications in

accordance with accepted industry security practices?

Page 60: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AUDITS ¢ Some of the key questions that auditor must ask

include: �  Have unnecessary applications and services been purged

from systems? How often does this task take place? �  Are all OSes and applications updated to current levels? �  How is backup media stored? Who has access to it? Is it

up-to-date? �  How is email security addressed? �  How is Web security addressed? �  How is wireless security addressed?

Page 61: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AUDITS ¢ Some of the key questions that auditor must ask

include: �  Are remote workers covered by security policies? �  Is a disaster-recovery plan in place? Has the plan ever

been rehearsed? �  Have custom applications been tested for security flaws? �  How are configuration and code changes documented?

How often are these records reviewed? Many other questions pertaining to the exact nature of the business's operations also must be addressed.

Page 62: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

INERNAL AUDITS ¢ BAU audits:

�  Checking current status of maintained platform and software

�  Should be regular ¢ On-demand audits

�  Test if procedures are working �  Test if team is prepared for emergency situation �  Test third-party responsibility

Page 63: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AUDITS ¢  „Off-the-shelf” auditis:

�  Ineffective �  More costly in long term �  Are not showing results management and security

teams are requesting �  Usually 99% software-based

Page 64: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

SECURITY AUDITS ¢ Audit time:

Stage % of Total Time

Preparation 10

Reviewint Policy/Docs 10

Talking/Interviewing 10

Technical Investigation 15

Reviewing Data 20

Writing Up Documentation 20

Report Presentation 5

Post Audit Actions 10

Page 65: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

QUESTIONS?

Page 66: Piotr Wojciechowski (CCIE #25543) - data. · PDF fileAdministrator of CCIE.PL board ! The biggest Cisco community in Europe ! Over 6800 users ! 3 ... Security zones are often layered

THANK YOU


Recommended