cisco cyber range · presentation_id cisco and/or its affiliates. all rights reserved. cisco public...

45

Upload: ngoanh

Post on 14-May-2018

230 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,
Page 2: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco Cyber Range

Paul Qiu

Senior Solutions Architect

Page 3: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

“What I hear, I forget What I see, I remember What I do, I understand”

A platform to experience the intelligent Cyber Security for the real world

~ Confucius

Cyber Range Service

Page 4: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cyber Range Overview

4

Page 5: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Agenda

Cyber Range Journey

Cisco Cyber Security Overview

Cyber Range Overview & Architecture

Cyber Range APT Case Study

5

Page 6: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco Cyber Range Journey

Page 7: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Page 8: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

08/2014 - PACIFIC ENDEAVOR 2014 10 teams are doing Cyber Range Challenge

Page 9: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

09/2014 - Cyber Range 5 Day Workshop – India Service Provider

Page 10: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

01/2015 – Cyber Range 5 day Workshop – India Service Provider

Page 11: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

10/2014 - Cyber Range 3 Day Workshop – Taiwan Manufacturer

Page 12: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco Cyber Security Overview

Page 13: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Breaches Happen in Hours …. But Go Undetected For Weeks/Months

Initial Compromise to

Data Exfiltration

Initial Attack to Initial

Compromise

Initial Compromise to

Discovery

Discovery to Containment/

Restoration

Seconds Minutes Hours Days Weeks Months Years

10%

8%

0%

0%

75%

38%

0%

1%

12%

14%

2%

9%

2%

25%

13%

32%

0%

8%

29%

38%

1%

8%

54%

17%

1%

0%

2%

4%

Timespan of events by percent of breaches

+

In 60% of

breaches, data is

stolen in hours.

85% of breaches

are not

discovered for

weeks.

Page 14: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Anatomy of a Modern Threat

Campus

Advanced online threat

bypasses perimeter defence

Perimeter

Enterprise

Data Centre

Threat spreads and attempts

to exfiltrate valuable data

Public Network

Infection entry point occurs

outside of the enterprise

Internet and

Cloud Apps

Page 15: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Cisco Cyber Security

VISIBILITY Deep Insight to Detect Advanced Threats

INTELLIGENCE Contextual Awareness to Pinpoint Attacks

CONTROL Ubiquitous Defence to Manage Threats

Page 16: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Visibility

NetFlow Network-wide traffic

patterns

Identity User, device, access,

location, time

AVC Application

recognition and

identification

Security Firewall, intrusion,

web & email security

Page 17: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Intelligence

Reputation Security Intelligence

Operations (SIO)

Analytics Stealthwatch,

Splunk

Page 18: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Control

Security Firewall, intrusion,

web & email security

TrustSec Network flow tagging

and blocking

Page 19: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cyber Range Overview

Page 20: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Cyber Range Overview

A platform to experience the intelligent Cyber Security for the real world

Page 21: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Cyber Range Remote Capabilities

Road Show

Partners

Campuses

Exhibition Centre

Customer Sites

Internet

Page 22: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Page 23: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Page 24: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Cyber Range Capabilities

… can improve cyber defence operational capabilities, by way of:

• Architecture / Design validation

• Incident response playbook creation / validation

• War game exercises

• Hands-on training for individual technologies

• Threat mitigation process verification

• Simulating advanced threats (zero day / APT)

Page 25: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Cisco Cyber Range Service Features

Infrastructure Attacks Visibility and Control

Wired, wireless, and remote access

Network and routing

Client simulator Server simulator Application

simulator Traffic generation

Day 0 Attack/New threats

DDoS Network reconnaissance Application attacks Data Loss Computer malware Mobile device malware Wireless Attacks Evasion techniques Botnet simulation Open source attack tools Virtual Network Attacks

Global Threat Intelligence(Cloud)

Firewall & IDS/IPS Signature based Detection Behaviour based Detection Data Loss Prevention Web & email Security Application Visibility & Control Wireless Security Identity & access management Security and event

management Event correlation Packet Capture and Analysis Virtual Network Security TrustSec-SGT Software Defined Network

Page 26: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cyber Range Architecture

Page 27: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Covering The Entire Attack Continuum

Visibility and Context

Firewall

NGFW

NAC + Identity Services

VPN

UTM

NGIPS

Web Security

Email Security

Advanced Malware Protection

Network Behaviour Analysis

BEFORE Discover

Enforce

Harden

AFTER Scope

Contain

Remediate

Attack Continuum

Detect

Block

Defend

DURING

Page 28: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Foundation

Prevent

Firewall

Anti-Virus

Host IPS

Web proxy

Anti-Spam

Network IPS

Detect

Network IDS

NetFlow anomaly

Advanced Malware

Behavioural anomaly

Collect

NetFlow

Event logs

Web proxy logs

Web firewall

Mitigate

IP blackhole

account

disablement

scalable load balancer device monitoring

Analyse

NetFlow analysis

SIEM analysis

Malware analysis

Cisco CSIRT Protection Model

Page 29: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Cyber Range Network Components Overview

Page 30: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Cyber Range Splunk Architecture

2 x Search Heads

1 x Indexer Mirrored Dev

Servers

CyberRange

“Live” Inside

Network

Mail Logs

(ESA) Access Logs

(WSA) Syslog

(ASA, ISE, etc)

SDEE

(IPS)

Scripted Input HTTPS

Index Forwarding

syslog TCP/UDP

eStreamer

(sFIRE) WWW

Lancope

Page 31: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco Cyber Range APT Case Study

Page 32: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

APT - Kill Chain

Recon

• Harvest contact info from social media

Weaponize

• Couple exploit with backdoor to deliver payload

Deliver

• Deliver weaponized bundle to victim via email, web, USB

Exploit

• Leverage vulnerability to execute code on victim system

Install

• Install malware on asset

Control

• Use command channel to control victim remotely

Action on Objectives

• Steal information, exfiltrate, etc.

Page 34: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Carbanak APT Case Study

Finance

Server

Attackers

Page 35: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cyber Range “ The Defenders ”

Page 36: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Cyber Range Network Components Overview

Page 37: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Sourcefire Intrusion Events

Page 38: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Sourcefire Intrusion Events Detail

Page 39: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Sourcefire Intrusion Events Packet Capture

Page 40: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

CTD Shows Data Loss

Page 41: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

CTD Shows Data Loss Alarms

Page 42: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

CTD Detail Flow

Page 43: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public

Splunk Search

Page 44: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,

Q & A

Page 45: Cisco Cyber Range · Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Foundation Prevent Detect Firewall ... •Steal information, exfiltrate,