the Presentation

Report
Layer Zero:
Enabling The Security Stack
Brandon Hoffman
CTO, Lumeta
© 2015 Lumeta Corporation
The Security Stack
No single device or product will provide full security. A security stack is needed.
Application
• WAF, AppSec Analyzers, Application
Testers
Data
• DLP, Encryption, Session Managers,
Proxies
Host/Device
Network
• HBFW, HIDS, Vuln Scanners,
Agents/Shims, MDM
• Router ACLs, Firewalls, IPS.IDS, NAC,
Modelers
NGFWs
• SSO, IAM, Entitlements
APT/ATA Controls
Cloud
Identity
The Security Stack
These devices leverage data and metadata generated or analyzed by devices in other layers.
In most cases they need this data to be effective.
Application
• WAF, AppSec Analyzers, Application
Testers
Data
• DLP, Encryption, Session Managers,
Proxies
Host/Device
Network
• HBFW, HIDS, Vuln Scanners,
Agents/Shims, MDM
• Router ACLs, Firewalls, IPS.IDS, NAC,
Modelers
NGFWs
• SSO, IAM, Entitlements
APT/ATA Controls
Cloud
Identity
The Security Stack: Missing Links
The challenge is that all of these devices need other data that is not available
from any of these sources.
NGFWs
Needed:
 Real time index of all attached
devices
 Full device profiling
 Multi homed host identification
 Unmanaged/unscanned hosts
(agent/scan discrepancy)
APT/ATA
Controls
Cloud
Needed:
 Invalid/self-signed/unmanaged
certificates
 Traffic behind NAT/Proxies
 Historic data asscoiation
 Real time index of port usage
 HTTP(s) banner enumeration
 File share accessibility
Needed:
 Real time index of all network
devices
 Validation of zone/segment access
 Shadow IT identification
 Perimeter validation
 Leak paths
 Unknown connected networks
The Security Stack: Layer Zero
NGFWs
APT/ATA
Controls
Cloud
Foundational intelligence to enable the security stack
Network Situational Awareness via Recursive
Network Indexing
The Security Stack: Layer Zero
COMPREHEND
PREDICT
NGFWs
INDEX
APT/ATA
Controls
Cloud
Network Situational Awareness Steps
Network Situational Awareness via Recursive
Network Indexing
Network Situational Awareness
Foundational intelligence to enable the security stack.
Network Situational Awareness via Recursive
Network Indexing
INDEXING:
•
•
•
•
•
•
Identify all devices that
comprise the network
and all devices attached
Identify certificates
Identify all ports in use
Identify all banners and
file shares
Profile all devices
Identify Shadow IT
INDEX
•
•
•
•
•
•
COMPREHEND:
COMPREHEND
Determine unscanned hosts
Determine
agentless/unmanaged hosts
Determine multi-homed
hosts
Validate zone/segment
access
Determine leak paths
Determine
unknown/unmanaged
networks
PREDICT:
PREDICT
•
Identify C2 leak paths
•
•
•
•
•
Correlate
vulnerabilities/malware to
inappropriate access
Feed automated patching
Enhance asset inventory
systems
Trend data for historic
association and review
Close asset management gaps
Recursive Network Indexing
•
•
•
•
•
•
•
•
Determine unscanned hosts
Determine
agentless/unmanaged hosts
Determine multi-homed
hosts
Validate zone/segment
access
Determine leak paths
Determine
unknown/unmanaged
networks
PREDICT:
•
•
•
•
•
Identify C2 leak paths
Correlate
vulnerabilities/malware to
inappropriate access
Feed automated patching
Enhance asset inventory
systems
Trend data for historic
association and review
Close asset management gaps
NGFWs
•
•
•
Identify all devices that
comprise the network
and all devices attached
Identify certificates
Identify all ports in use
Identify all banners and
file shares
Profile all devices
Identify Shadow IT
COMPREHEND:
APT/ATA
Controls
•
Cloud
INDEXING:
•
Network Situational Awareness via Recursive
Network Indexing
Get the data you need for the security you demand!

similar documents