Top Banner
End Point Security & Network Access Control Presented by: Jennifer Jabbusch Carolina Advanced Digital Inc Jennifer Jabbusch - Carolina Advanced Digital, Inc. Alan Shimel - StillSecure Darwin Socco Bracewell & Giuliani LLP Darwin Socco - Bracewell & Giuliani LLP
25

End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Feb 24, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

End Point Security & Network Access Control

Presented by:Jennifer Jabbusch Carolina Advanced Digital Inc Jennifer Jabbusch - Carolina Advanced Digital, Inc. Alan Shimel - StillSecure Darwin Socco Bracewell & Giuliani LLPDarwin Socco - Bracewell & Giuliani LLP

Page 2: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Let’s Talk About…

What NAC DoesKey NAC ConceptsyPoor Man vs Rich Man’s NACYour Thoughts?Your Thoughts?

Page 3: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

What is NAC?

Features depend on vendor and i l t ti h iimplementation choices.

Why are some key features that NAC can provide?p

Page 4: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

What is NAC?

What ‘can’ NAC offer?Port securityNetwork segregationUser- or identity-based access controlEndpoint integrity checkingGuest access supportppMultiple user/device authenticationCentralized managementg

Page 5: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Key NAC Concepts

Where does it go?

How does it work?

Page 6: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Key NAC Concepts

Network based, host basedInline, out of bandManaged and unmanagedPre-connect post-connectPre-connect, post-connectRemediationIdentity based access controlNAP, TCG, Cisco NAC framework

Page 7: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Key NAC Concepts

Network based, host based

Network-Based Host-Based

EndpointAuthentication Switch or AP

NAC

Page 8: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Key NAC Concepts

Inline, out of band

EndpointAuthentication Switch or APInline Inline

NAC

Out of Band

Page 9: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Managed / Employee

Key NAC ConceptsEmployee

Managed and unmanaged Endpoint

Authentication Switch or AP

Unmanaged /GuestNAC

Endpoint

Page 10: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Key NAC Concepts

Pre-connect, post-connect

Pre-Connect

EndpointAuthentication Switch or AP

Post-ConnectRetest!

NAC

Page 11: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Key NAC Concepts

RemediationEither automatically ‘fix’ what’s wrong on the endpoint, or provide access to remediation services on a quarantine network

Identity based access controlControl what, when and how a user can connect and access resources based on their role or group

Page 12: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Key NAC Concepts

NAP, TCG and Cisco NAC frameworks

NAP = Microsoft’s Framework

TNC = TCG Industry-approved framework by most vendors

Cisco NAC = Cisco proprietary framework

Page 13: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Why Do You Want NAC?

Drivers for NAC in enterprises

Drivers for NAC in the legal space

What’s holding back NAC?g

Page 14: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Importance of NAC in Legal IT

What are the drivers for NAC adoption in legal?ComplianceConfidential informationGuests on the networkSOX and other compliance requirements

What are the factors slowing adoption?g pWhat factors have driven adoption in existing firms?Is there a competitive advantage to adopting NAC?Is there a competitive advantage to adopting NAC?

Page 15: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Poor Man vs Rich Man’s NAC

Faceoff : NAC vs Not-NAC

Getting NAC-ish features without NAC

Page 16: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Poor Man’s vs. Rich Man’s NAC

Degrees of NAC adoption and mitigating your riskReviewing some features of NAC?g

Port securityNetwork segregationg gUser- or identity-based access controlEndpoint integrity checkingEndpoint integrity checkingGuest access supportMultiple user/device authenticationMultiple user/device authenticationCentralized management

Page 17: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Case Studies and Considerations for Selecting the Best NAC Solution (1)

Practical Implementations (Wired or Wireless)Practical Implementations (Wired or Wireless):Physical/Logical/Application

Physical Approach:Physical Approach:Create a stand-alone network ("The Starbucks Setup")Jack insert blocker/administratively shutdown data Jack insert blocker/administratively shutdown data ports

Logical Approach:VLAN segmentation with ACLsMAC address lockdown802 1 A thentication (RADIUS)802.1x Authentication (RADIUS)

Page 18: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Case Studies and Considerations for Selecting the Best NAC Solution (2)

Application Approach:Proactive OS patch/update management of endpointsProactive AV push/updatesOther company specific application updates

Page 19: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

P M ’ Ri h M ’ NACPoor Man’s vs. Rich Man’s NACNAC Not NACNAC Not-NAC

Port security with NAC (can be centrally managed)

Stand-alone 802.1X (must be managed on each switch manually or physical switch manually or physical port control/jack covers)

Network segmentation(can be globally configured by user or group and provisioned

Dynamic or Static VLANs(manually configured per user-group from RADIUS or per-user or group and provisioned

dynamically from ID mgmt)group from RADIUS or per-port on switches)

Page 20: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

P M ’ Ri h M ’ NACPoor Man’s vs. Rich Man’s NACNAC Not NACNAC Not-NAC

Identity-based access(centrally managed, based on users groups or set of criteria)

Manual RADIUS groups(separate RADIUS group and policy manually created and users, groups or set of criteria) policy manually created and configured for each unique access)

Endpoint integrity check(basic function of most NAC

Pro-active patching or NBAD(maintain patches and AV pro-(basic function of most NAC

solutions)(maintain patches and AV pro-actively or monitory with behavior anomaly detection)

Page 21: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

P M ’ Ri h M ’ NACPoor Man’s vs. Rich Man’s NACNAC Not NACNAC Not-NAC

Guest access support(centrally managed, based on user endpoint type presence

Manual VLAN configuration(manually configure VLANs per-port or per SSID or use a user, endpoint type, presence

of agent or other criteria)port or per-SSID or use a vendor-specific solution)

Multiple user/device auth(easily configured and centrally managed)

Manual VLAN configuration(same as above, must be manually configured which centrally managed) manually configured, which makes multi-user/device auth difficult on shared resources)

Page 22: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

P M ’ Ri h M ’ NACPoor Man’s vs. Rich Man’s NACNAC Not NACNAC Not-NAC

Centralized management(centrally managed, based on user endpoint type presence

Individual component config(each component, authentication servers switches access points user, endpoint type, presence

of agent or other criteria)servers, switches, access points and possibly endpoints will need to be configured manually individually or use a point solution per segment)

Page 23: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Case Studies and Considerations for Selecting the Best NAC Solution (3)

Best of Breed Implementation

Page 24: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Your Thoughts?

Why are you considering NAC?

What’s keeping you from doing it?

Do you need it?y

Page 25: End Point Security & Network Access Controlilta.personifycloud.com/webfiles/productfiles/149/VDC2.pdf · 2008-08-26 · End Point Security & Network Access Control Presented by: Jennifer

Questions and Answers

Q&AJennifer Jabbusch

Carolina Advanced Digital, Inc. Al Shi lAlan Shimel

StillSecure Darwin SoccoDarwin Socco

Bracewell & Giuliani LLP