Intrusion Prevention Syst Ems
Intrusion Prevention Syst Ems
Making Everythin
I n t ru s i o n n Systems P r e ve n t i o
Learn to:
Understand common network threats Select the right intrusion prevention system for your company Figure out how an intrusion prevention system can fit into your organizations network
Brought to you by
About Sourcefire
Sourcefire, Inc. (Nasdaq: FIRE), a world leader in intelligent cybersecurity solutions, is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks. A Leader in Gartners 2010 Network IPS Magic Quadrant and recognized by NSS Labs in 2009 and 2010 for offering best overall IPS detection, Sourcefire has received more than 60 awards and accolades. In 2011, Sourcefire was listed #15 on Forbes annual list of Americas top 25 fastestgrowing technology companies ranked highest among all IT security vendors in the United States. For more information, visit www.sourcefire.com.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
DUMmIES
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Publishers Acknowledgments
Were proud of this book and of the people who worked on it. For details on how tocreate a custom For Dummies book for your business or organization, contact [email protected]. For details on licensing the For Dummies brand for products or services, contact BrandedRights&[email protected]. Some of the people who helped bring this book to market include the following: Acquisitions, Editorial, and Media Development Development Editor: Peter Gregory Project Editor: Jennifer Bingham Editorial Manager: Rev Mengle Business Development Representative: Sue Blessing Custom Publishing Project Specialist: Michael Sullivan Composition Services Project Coordinator: Kristie Rees Layout and Graphics: Carrie A. Cesavice, Samantha K. Cherolis, Melanee Habig Proofreader: Debbye Butler Special Help from Sourcefire: Steve Kane, Richard Park, Doug Hurd, Mike Guiterman, Kimberly Connor, Chris Chon, Marc Solomon
Publishing and Editorial for Technology Dummies Richard Swadley, Vice President and Executive Group Publisher Andy Cummings, Vice President and Publisher Mary Bednarek, Executive Director, Acquisitions Mary C. Corder, Editorial Director Publishing and Editorial for Consumer Dummies Diane Graves Steele, Vice President and Publisher, Consumer Dummies Composition Services Debbie Stailey, Director of Composition Services Business Development Lisa Coleman, Director, New Market and Brand Development
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
How This Book Is Organized .................................................... 1 Icons Used in This Book ............................................................ 2
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
vi
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
ith this book, you get the must have knowledge that you need to understand how intrusion prevention systems (IPS) and emerging Next-Generation IPS (NGIPS) solutions improve the security in an organizations networks. I help you understand why theyre needed and how to determine which features are most important for your organization. I also show you how to lower the total cost of ownership of an intrusion prevention system, so that it will pay for itself.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1
Understanding IPS
In This Chapter
Understanding todays intrusion prevention systems Comparing and contrasting IPSs and firewalls Looking at passive versus inline systems Exploring detection techniques Understanding how IPS fits into the big picture
ntrusion prevention systems (IPSs) are a critical part of an organizations overall network and systems protection strategy and a critical part of a defense-in-depth architecture. Without them, youre fighting the bad guys with one arm tied behind your back. In this chapter, I look at the function of intrusion prevention systems and how they fit into an organizations network.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Network-based IPS
Network-based intrusion prevention systems typically take the form of a rack-mounted appliance or system that is attached to a data network. The network is configured to send a copy of all the traffic in the network through the IPS so that the IPS may examine it to identify possible intrusions.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Rule-based detection
IPSs can detect incidents by comparing observations against a list of previously defined incidents and known vulnerabilities. This type of detection is quite effective at detecting both known and unknown threats. Some examples of rules (also known as signatures) are: Attacks targeting vulnerabilities in operating systems and applications Botnets used to perform targeted Denial of Service (DoS) attacks or steal personally identifiable information (PII) Unusually large ping packets, which may be an indication of a ping of death attack Because new types of attacks against information systems are continually being developed, IPSs need to regularly update their rules. Rules are developed by the makers of IPSs, and in some cases a community of rule writers, and are distributed to running IPSs via the Internet. Savvy intruders know how signature-based detection works, and in response they have developed a number of ways of evading detection, usually by introducing subtle variants in their attacks. For this reason, leading IPS makers usually publish vulnerability-based rules (instead of exploit-based signatures) to detect all possible variants of an attack. They may also offer anomaly-based detection techniques, discussed in the next section.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Anomaly-based detection
IPSs can detect incidents by comparing traffic patterns that the IPS considers normal with new traffic patterns, and deciding whether new traffic patterns fall within acceptable patterns or not. A distinct advantage of anomaly-based detection is the capability to detect incidents that may not be triggered by a standard IPS rule or signature.
False Positives
In the context of intrusion prevention, a false positive is an IPS declaring good traffic as bad, resulting in either a false alarm (if the IPS is in passive detection mode) or service disruption (if the IPS is in inline prevention mode). A false positive is usually caused by an ineffective IPS rule or signature.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
A false positive should not be confused with a real attack that is ineffective against the operating system or application it is targeting. For example, if Conficker attacks a Linux host, and an intrusion event is triggered, it is technically not a false positive but more of a not applicable since Conficker only affects Windows operating systems. I go into this in more detail in Chapter 3. First-generation IDSs were legendary for creating massive quantities of alerts, overwhelming administrators who spent hours trying to tune out the noise. Learning from those painful times, IPS vendors have made their systems much better through intelligent learn modes, easier administration, and highly tuned rule sets.
False Negatives
The opposite problem is that of a false negative, where an IPS fails to recognize an intrusion or other security event. This can occur if the IPS doesnt have up-to-date rules, or if the IPS vendor hasnt released a rule for a new type of attack or vulnerability. When an IPS is placed in inline blocking mode, false negatives are generally far more damaging to an organization than a false positive. A false negative permits bad traffic to enter the network, potentially leading to compromised systems and possibly stolen or lost data. A false positive blocks good traffic from entering the network, potentially leading to lost business or productivity.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
10
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
11
IPS sensor
An IPS sensor is typically a purpose-built hardware appliance that is connected to the network. The sensor may be connected in one of three ways: Inline. Here, the IPS is placed inline behind a firewall, router, or switch so that all network traffic actually flows through it. This configuration supports both IPS (blocking) and IDS (alerting) modes. Network tap. A tap is a hardware device that provides a way to access the data flowing across a network. A bypass tap is typically used for inline IPS configurations for IPS devices that lack a fail-open capability or for organizations that may wish to disconnect their inline IPS from the network regularly for maintenance or reconfiguration. A regeneration tap is used for passive IDS configurations typically when the span ports on monitored switch devices are already consumed. Switch span port. This is a port on a network switch where a copy of all traffic that flows through the switch can be monitored. This supports a passive IDS configuration. Interface sets on an inline IPS should be configurable to fail open, meaning that all network traffic should continue to flow through the IPS sensor in the event of a hardware or software failure in the IPS. This ensures high availability of the network.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
12
Internet
Router
Switch
Firewall Monitoring interface IPS Sensor Management interface Monitoring interface Switch Management Switch
Internal Network
Enterprises will typically have many IPS sensors, each located in a different part of the network. Some of the common places where an IPS sensor might be placed are: Perimeter or DMZ. Here, the IPS sensor is detecting traffic flowing from the Internet to public-facing web servers (and other hosts) placed in the Demilitarized Zone (DMZ) or hosts located near the perimeter behind the firewall.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
13
Often, an IPS placed at the perimeter or DMZ will operate in inline IPS blocking mode to fend off potential attacks. Core or data center network. More organizations are extending protection of their perimeter IPS by installing IPS sensors (typically placed in passive IDS mode) in the core or data center. This provides an additional layer of defense and helps to detect attacks hand-carried into the office on mobile computing devices. Extranets. Larger organizations with extranet connections to partner or supplier networks may place an inline IPS device in front of associated routers to both defend against potential incoming attacks and to ensure that local malware doesnt spread to partner networks. Wireless access points. Contractors and guests commonly connect to the network through wireless access points. As these devices are typically uncontrolled by IT, many organizations place IPS sensors behind wireless access points to monitor for potential unwanted traffic. Virtualization platforms. Although virtualization provides significant cost-saving benefits, it also introduces new risks and uncertainties. A physical IPS placed in front of a virtualization network, or a virtual IPS installed on each virtualization host, can help defend against hidden attacks originating from within or targeting virtual machines. Critical network segments. These may be networks containing critical systems (such as servers containing financial or medical data, for instance), where intrusions would be especially serious. The Payment Card Industry Data Security Standard (PCI DSS) mandates the use of IPS technology on networks that process credit card transactions. Learn more about the role of an IPS for PCI DSS compliance in Chapter 5. IPS sensors placed at the perimeter and strategic points inside the network serve as the organizations eyes and ears for defending against todays most sophisticated threats.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
14
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2
ntrusion prevention systems (IPSs) are designed to block many different types of attacks. It is easier to understand IPSs if you better understand the types of things theyre designed to detect and prevent. If this were a book about law enforcement, this chapter would be about different types of criminals and the crimes they commit. Understanding the types of attacks youre trying to prevent helps you gain perspective on the strategic role of a network IPS. In this chapter, I look at the types of attacks that intrusion prevention systems are designed to prevent.
Worms
A worm is a program that is designed to self-propagate from one computer to the next. Typical worms are designed to discover nearby computers with specific features, particularly
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
16
Trojan horses
A Trojan horse is another type of malware. Like a worm, a Trojan is designed to propagate itself from system to system. But unlike a worm, a Trojan requires human intervention to keep it moving. A Trojan horse is so-named because it is disguised as something benign. For example, a Trojan may be embedded inside a computer program purported to be a game, screen saver, or other program. But once activated, a Trojan will do whatever harmful things that it was designed to do.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
17
When activated, a Trojan may scan nearby networks for neighboring systems that are potential victims. Or, the Trojan may scan the users system to look for valuable data, or install other malware that it is carrying.
Buffer overflows
A buffer overflow is a specific type of attack against a system, where the attack is designed to confuse the system into executing the attackers instructions. A buffer overflow attack works like this. An attacking program establishes a communications session with a specific component on the target system, and sends a specially crafted message to the target system. The message deliberately sends too much data into the target systems input buffer. In a program that is vulnerable to a buffer overflow attack, the excess data will overwrite program instructions in the vulnerable program, and eventually the program will execute those instructions (thinking that it is executing its original instructions). Those new instructions usually contain code to open the target system and permit a partial or complete takeover of the target system. Sound complicated? You bet it is! A buffer overflow attack isnt easy to develop. It takes detailed knowledge of the target systems internal architecture (both software and hardware), as well as detailed knowledge of the program or service being attacked. That said, hackers who develop buffer overflow exploits often build a kit that makes it easy for others to exploit the same vulnerability. Worms, Trojans, viruses, and other types of malware often use buffer overflows as a way of gaining a foothold in a new victim system. Buffer overflows account for a significant portion of the attacks against systems on the Internet.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
18
Spyware
Spyware is a term ascribed to a wide range of techniques used to covertly obtain information from computers. Spyware most often takes on the form of computer code that is installed on a users computer without his or her knowledge or consent, gathers specific information, and sends that information to a central source. Spyware may also alter the behavior of the victims computer. The activities performed by spyware include: Tracking sites visited with a browser Recording keystrokes and mouse clicks Changing browser settings (for instance, changing home page, default search engine, and so on) Unlike other types of malware such as viruses and Trojans, spyware doesnt usually contain code for making copies of itself onto other computers.
Phishing
A pun on the word fishing, a phishing attack is an attack on computer users in an attempt to con them into performing an action that is intended to cause them harm. That harm may take the form of financial fraud or the installation of malware or spyware on their computer, for instance. A typical phishing scam works like this: The bait. The scammer sends out large quantities of genuine-looking e-mail messages to intended victims in an effort to entice them to open an attachment or click a URL. The hook. Although most people ignore or dont receive (because of anti-spam) the message, a few believe it is legitimate, or theyre just curious. They open the attachment or click on the link.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
19
The harm. The attachment installs malware or spyware on the victims computer, which may steal information, install a key logger, or perform some other harmful action. If the user clicks a URL, the website may trick the user into believing she is logging into a legitimate website (such as online banking). If she types in her user ID and password, the scam artist will use these credentials to log in later and steal money from the victim. Also, the website may attempt to infect the users computer with malware. The victims computer may also be made a part of a botnet, which is discussed later in this section. Phishing scams account for a significant portion of computer security incidents and malware infections by preying on a users gullibility.
Botnets
A botnet is a collection of victim computers that have been commandeered into a bot army, a powerful computing resource awaiting instructions from its owner. Creators of botnets are typically financially motivated. Here is how a botnet works. An individual or group will write a small software program a bot that will enable the computer its running on to be remotely controlled. This bot will be packaged into a worm, malware program, or loaded on a malicious website, at which time a campaign of some sort (say, a phishing scam) will ensue to get the bot installed on as many computers as possible. The owner of these bots, usually known as a bot herder, has a centralized command and control program that can be used to control all the computers that are running his bots. This control program can then be used to perform work on behalf of the bot herder, such as: Spam. A bot army can be used to send millions of spam messages which themselves may contain malware intended to grow the bot army. Denial of service attacks. The bot army can be used to remotely attack a computer or network of the bot herders choosing. Denial of service attacks are discussed later in this chapter.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
20
SYN floods
A SYN flood is an attack on a target system, specifically an attack in a key design attribute of the TCP/IP networking protocol. In a SYN flood, the attacker sends thousands of SYN packets to a target system. A SYN packet is ordinarily a message sent from another computer that wants to establish a network connection with the target. Upon receiving the SYN, the target system will reply with a SYN/ACK, at which point the conversation will begin. An important fact to note is that the target computer will allocate resources (mainly, memory) in anticipation of the new connection. But in a SYN flood, the attacker sends thousands of SYNs and ignores all the SYN/ACKs. The purpose of this is to flood the target system until it is incapable of communicating on any legitimate channels. A SYN flood is a special type of a denial of service attack. These attacks are discussed in the next section.
Denial of service
A denial of service (DoS) attack is an attack on a target system where the objective of the attack is to partially or completely incapacitate the target system. The purpose of a DoS attack is to render the target system unusable for legitimate purposes.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
21
The reason that an attacker would carry out a DoS attack could include revenge, jealousy, ideology, or economics. Committing a DoS attack is akin to blocking the entrances to a business so that its customers are unable to patronize it. There are two basic types of DoS attacks: Flooding. The most common form of DoS attack is one where the attacker sends such a high volume of messages to a target system that it either malfunctions or is otherwise unavailable for legitimate purposes. Malfunction. The other common form of DoS attack is one where a specially crafted message is sent to the target system; the message causes the target system to malfunction or crash. Another type of DoS attack is known as the Distributed Denial of Service (DDoS) attack. In a DDoS attack, the attacker causes many different systems to flood a target system simultaneously. Such an attack can be nearly impossible to block if there are hundreds or thousands of different sources. Botnets are often used to commit DDoS attacks.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
22
Zero-Day Attacks
A zero-day attack is a brand new attack on a previously unknown vulnerability, or a new type of an attack on an existing vulnerability. The term zero day comes from the number of days of warning between the time when the vulnerability is announced and when it is exploited. In other words, these are vulnerabilities for which no patches are available. Zero-day attacks are significant because signature-based (exploit-based) IPS devices are generally defenseless against them. However, IPSs that also use anomaly-based detection and leverage vulnerability-based rules (as opposed to exploitbased signatures) can protect effectively against zero-day attacks.
What is APT
To understand what APT is and what it is not, start with a short definition and then delve into the details. An advanced persistent threat is information warfare, conducted by sophisticated adversaries who are determined to control information systems and gather intelligence on persons, organizations, and governments.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
23
Advanced persistent threats are malicious, and they certainly fall into the class of malware. However, for highly sophisticated threats, you wont find signatures of this malware in anti-virus products or intrusion detection systems, because these threats are custom made for their specific targets. Advanced persistent threats do consist of attacks that are detectable. However, these attacks may be subtle and take place over a very long period of time. Traditional defenses such as anti-virus, IPS, and firewalls may not see anything at all. The actors behind an advanced persistent threat dont want to set off any alarms.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
24
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
25
File integrity monitoring (FIM). Another good idea for detecting unauthorized changes to operating system and application files. FIM also helps to detect other types of threats, including systems engineers who make changes to systems without going through proper procedures, such as change management. These other security controls comprise a defense-in-depth strategy necessary to combat APT. APTs, while more difficult to detect than ordinary malware, can often be detected, provided the organization is willing to invest in the tools required to repel them.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
26
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3
ntrusion Prevention Systems have come a long way since the introduction of open source Snort in 1998. Although a typical IPS contains everything you need to bring the box online and start blocking attacks, a new breed of IPS technology has raised the bar in terms of what organizations should expect from their IPS investment. In this chapter, I contrast the key features of a typical IPS against those of a Next-Generation IPS (NGIPS), with emphasis on capabilities related to security, automation, and total cost of ownership (TCO). I also discuss strategies for SSL (Secure Sockets Layer) inspection and integration with existing IT security products and infrastructure.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
28
Key IPS Attributes Inline IPS & Passive IDS Modes Default Detection Policy Reports, Alerts & Dashboards Custom Rules Vulnerability-Based Protection Automated Impact Assessment Automated Tuning User Identity Tracking Application Monitoring Network Behavior Analysis Virtual IPS & Management Console
Common functions
Virtually all of todays IPS devices share the following common functions: Inline IPS and passive IDS modes. However, when an IPS device is placed inline, be sure it supports fail-open ports. Some IPS providers offer fail-open ports on only aportion of their models. Default detection policy. Every IPS vendor should provide a detection policy comprised of the most common IPS rules to help get you started. But an organization should never just rely on a default policy because it never adapts to your dynamically changing network environment. Dont let IPS vendors fool you about this. Tuning is required to select the IPS rules that are most relevant for your organization. In IPS, one size does not fit all. Reports, alerts, and dashboards. Most IPS providers offer a selection of reports, alerts, and dashboards usually present in the management console. Reporting
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
29
should be flexible, alerts should be offered through e-mail, syslog, and SNMP, and dashboards should be customizable based on the users role in the organization. The managers who paid for IPS want to see their reports and dashboards, to know that the IPS is really working and providing business value.
Advanced protection
Most of todays IPS devices are black boxes that offer little visibility into the protection being offered. However, a Next-Generation IPS especially one based on an open architecture is different: Visibility. Vendors with IPS offerings based on closed architectures require you to trust that they have the best protection for your needs, as you have no visibility into how the detection engine works or whether their rules (or signatures) are designed to defend vulnerabilities or simply detect known threats. In contrast, a NGIPS features an open architecture with full visibility into the detection engine and rules, yielding higher quality products, increased effectiveness, and peace of mind. Custom rules. Most typical IPS vendors will tell you that you can create custom rules, but few provide the means to do it effectively. Its best to select an IPS vendor that makes it easy to create custom IPS rules through training and an easy-to-use wizard interface. Vulnerability-based protection. Most IPS providers offer exploit-based signatures that detect a single variant of malware. A Next-Generation IPS puts in the extra effort to construct IPS rules to detect any possible variant of an exploit that targets an operating system or application vulnerability. This approach provides the best security and offers the greatest zero-day protection. Its better to be able to detect any possible exploit of a faulty lock than it is to have to detect every possible skeleton key. The general trend in IT products is the capability to see inside the product to view and manage detailed configuration and operation. Make sure you select an IPS that gives you the capability to view and manage detection rules.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
30
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
31
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
32
SSL inspection
Every network security device is blind to SSL-encrypted traffic, including a network IPS. This is because an SSL session is encrypted end-to-end, and the IPS in between sees only encrypted data. As the use of SSL grows within an organization oftentimes comprising one-quarter to onethird of traffic the potential of an SSL-encrypted attack rises. To mitigate this risk, a Next-Generation IPS should be complemented by a dedicated SSL inspection appliance whether from the same vendor or another third party. The SSL inspection device should decrypt SSL traffic, pass it to the IPS for inspection, and then re-encrypt the (clean) traffic before placing it back onto the wire all with minimal added latency. When placed inline, the SSL inspection appliance should also feature fail-open ports. Beware of IPS providers that only offer on-board SSL decryption. Enabling SSL decryption on an IPS can adversely affect the performance (for example, throughput) of the box by up to 80 percent. In most instances, organizations will want to offload the SSL decryption process to a stand-alone appliance, which not only decrypts traffic for the IPS, but all network security devices placed behind it. But regardless of whether SSL is decrypted by the IPS or a stand-alone appliance, ensure the SSL decryption capability also re-encrypts the original (clean) traffic before placing it back onto the wire to maintain confidentiality of the data and to maintain compliance with PCI or other regulatory standards.
Third-party integration
A best-of-breed security device should integrate with other devices on your network to share intelligence, coordinate responses, and lower total cost of ownership. The following are common examples of how a Next-Generation IPS can integrate with popular third-party systems:
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
33
Network infrastructure devices. Remediate to routers, switches, and NAC devices from leading network infrastructure providers (for example, Cisco, Juniper, Check Point) to quarantine hosts related to security and compliance events. Network forensics. Launch packet-level forensics queries directly from the IPS management console to leading network forensics devices (for example, NetWitness, Solera), saving both time and effort. After you integrate your IPS into your SEIM and other platforms, youll be humming right along at a level of security your organization has not experienced before.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
34
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4
irtualization and cloud computing are revolutionizing information technology by facilitating a more efficient use of computing resources. Virtualization is the technology that enables many separately running operating system instances to occupy a single computer. Each virtual machine (VM) instance runs as though it were occupying its own dedicated server. This can enable an organization to more easily deploy and manage servers. Cloud computing is the term encompassing many technologies that enable an organization to enjoy a dynamically expanding and contracting computing environment. Organizations can build their own clouds, or buy services offered by external cloud computing providers. In this chapter, I discuss virtualization and cloud computing, and the relationship that each has with intrusion prevention systems.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
36
Before virtualization, an organization whose environment required six servers had to purchase six separate hardware servers. With virtualization, the organization can purchase one server and install six virtual machines on that server. The primary benefit of virtualization is that an organization can implement new virtual machines at will and with very little effort. The primary risk of virtualization is that an organization can implement new virtual machines at will and with very little effort. Yes, you read that right: The main benefit is also the main risk. What Im saying here is that, without proper safeguards, virtualization can introduce risks that can negate the benefits.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
37
Agility. Virtualization allows an organization to respond more quickly to changing needs in its technical environment. Rapid deployment. With virtualization technology, you can build and deploy a new server in just a few minutes. No more running down to the local computer store for a server and loading an OS. Improved system availability. Virtualization enables an organization to implement servers that are more consistent with each other. Consistency breeds higher availability, because there are fewer differences between systems, which means systems engineers are less likely to make mistakes that cause unexpected downtime. Energy savings. Running many virtual servers on just a few physical servers means there are a lot fewer physical servers consuming energy. Space savings. The amount of space that servers consume is expensive, especially in commercial data centers that literally charge for rack space by the inch. With these benefits, whats not to love? However, there are also risks related to virtualization, and its important to understand these risks, so that you wont make the same mistakes that others have made. VM sprawl. Because virtualization makes it so incredibly easy to deploy a new server, it can sometimes be tempting for an engineer to deploy a server and bypass the management processes that usually accompany the deployment of a new server. The result can be many unauthorized servers that are doing who-knows-what. VMs created outside of management processes may be unmanaged and invite malware infection. For more on the topic, see the section Controlling VM sprawl, later in the chapter. Vulnerabilities. One of the neat features of virtualization is the capability to roll back to an earlier snapshot, which is a fancy way of reverting to an earlier version of the virtual server. Doing so, however, can also result in the
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
38
Securing Virtualization
Like any information technology, virtualization needs to be secured. In other words, virtualization needs to be configured and managed in a way that will result in the virtualization environment being free of vulnerabilities that could lead to compromised systems. There are three main areas where virtualization needs security controls: with the people, processes, and the virtualization technology itself.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
39
Virtualization processes
Like personnel, a virtualized environment will not be very secure unless the right business processes are in place. Some of the processes that I feel are important include: Change management. Changes to virtual machines, as well as changes to virtualization configuration, should be done under the control of a formal change management process. Just how formal this process should be is dependent on the organizations needs. However, under no circumstances should changes be made without at least informing all affected parties! Technical standards. Configuration settings for virtualization, as well as the virtual machines themselves, should be written down. This is not a one-time exercise, but a process of establishing standards and then sticking to them. Sure, things need to change in that case, you use Change Management to manage change. Audit. Virtualization settings and virtual machines need to be examined from time to time, to ensure that theyre being deployed and operated properly, and that no unauthorized activity is going on.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
40
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
41
Controlling VM sprawl
VM sprawl is a result of the practice of deploying virtual machines without obtaining approval. Because engineers can unilaterally deploy VMs without obtaining approval, some enterprises are liable to experience uncontrolled growth of VMs and the chaos that results. Here I discuss some neat ways that IPSs can be used to control it. Better IPSs can help to control VM sprawl by detecting a VM by its virtual network cards MAC address. An IPS can be configured to generate an alert whenever it sees a new VM on the network. This can help management to keep an eye on new VMs, so it is important that these alerts not be sent to the individuals who create VMs but to other personnel, in order to prevent engineers from creating VMs on the sly. Organizations that are zealous about controlling VMs can use their IPSs to prevent new, unauthorized VMs from being able to communicate on the network. This is one important way that segregation of duties can be retained in a virtualized environment.
Virtualizing Security
Virtualization creates several new opportunities, including the capability to implement more than just operating systems in virtual environments. Besides OSs, you can also deploy network switches, firewalls, and IPSs as virtual machines, thus leveraging the cost-saving benefits that virtualization brings. At first blush, it may appear that cost savings is the only motivator for virtualizing security devices. Sure, virtual versions of security devices may (or may not) cost less than their physical counterparts, but sometimes using a virtualized security device is the right thing to do. For example, imagine that an Internet-facing application is deployed in a virtualized environment. The application consists of a web server, an application server, and a database server. Regulation requires IPS protecting the web server
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
42
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
43
The controls used to protect cloud-borne applications and data from threats are discussed in the remainder of this chapter. These controls are necessary, whether an organization is building and running its own cloud, or using the services from a cloud services provider.
Firewalls
These access control devices are used to control the communications flowing to and from networks and specific endpoints by blocking unauthorized access as well as many types of intrusion attempts.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
44
Logging
Significant events at every layer of the cloud infrastructure need to be logged. Preferably, logging will be centralized for ease of management and the capability to correlate individual separate events and be able to see them as incidents. Precise time synchronization is a key ingredient for accurate logging. Computers time-of-day clocks are notoriously inaccurate; use NTP to synchronize all computer and network device clocks to well-known standard time sources.
Change management
Change management is the formal process where all changes in an environment are formally requested, reviewed, scheduled, performed, and documented. The heart of an effective change management process is a period change review meeting, where stakeholders discuss upcoming proposed changes. This helps ensure that changes will have the desired effect, be coordinated with the right parties, and help to reduce unscheduled downtime.
Configuration management
Developing good standards and using tools to ensure consistent configuration helps to make systems more resistant to intrusion and misuse. Configuration management tools can help to automate the settings on each virtual machine, enabling even instantaneous configuration changes across allsystems in a virtualized environment.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5
regulations
Knowing how COBIT supports Sarbanes Oxley, Basel II, and SSAE16 Seeing why IPS supports most security-related regulations and
standards
When organizations put their information and their business processes online and made them available over the Internet, there were scores of large-scale security breaches and thousands of smaller incidents. This resulted in a backlash of laws and regulations designed to force organizations to take at least basic safeguards to protect information stored online. Regulations and standards regarding information security are still young but beginning to mature. Many consistent themes are emerging that allow an organization to figure out how to be compliant to different laws and regulations. This chapter discusses the heavyweights of laws and regulations, and how IPSs can help.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
46
Security or compliance?
As various laws and regulations on data security emerged, conflicted with one another, and matured, often there was a question of whether an organization was secure or compliant. What does this mean? Some of todays laws and standards on data security are very exacting in their demands. They require specific processes and technologies, regardless of the actual risk associated with those processes and technologies. And some of these same laws ignore other measures that organizations need to take. Organizations that are focusing on compliance often take their eyes off the need for security. One cant be sacrificed for the other. Although compliance is important, security is even more important. Organizations cant rely merely on compliance to be secure, although many do just that. Organizations still need to perform a periodic risk assessment in order to determine where the risks are. Controls mandated by laws and regulations will take care of many but not all of those risks. Organizations need to put additional controls in place to manage risks not covered by regulations.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
47
1.1 - Configuration standards and acceptable ports/ services for business use. Organizations are required to develop configuration standards for all information systems and devices. These standards must contain a list of ports and services on these systems that are required for those systems to properly run. 2.2 - Development and enforcement of configuration policy. An IPS can be configured to generate alarms or block traffic that violates these standards. Better IPS solutions offer compliance rules and whitelists, enabling customers to monitor and continuously enforce acceptable use policies (AUPs) for use of operating systems, applications, ports, protocols, and services. 6.2 - Identify and remediate vulnerabilities. Organizations are required to have a formal vulnerability management program to proactively identify and remediate vulnerabilities in all layers of infrastructure. Better IPS solutions incorporate passive network intelligence collection to complement active scanning technologies to better defend the network against emerging zero-day threats. 11.2 - Quarterly vulnerability scans. Organizations are required to undergo scans that are carried out by PCIapproved scanning vendors. Leading IPSs augment this by delivering this information to organizations security specialists in real time. This helps an organization to discover and remediate vulnerabilities prior to the official quarterly scans. 12.5.2 - Monitor and analyze events. Organizations are required to monitor systems for security events. An IPS can perform this monitoring. 12.9 - Incident response. PCI requires organizations to have an organized incident response program and test it at least once per year. An IPS can provide automated alerting and response, as well as provide alerts to personnel who can perform manual analysis and remediation. Every organization that is required to comply with PCI must have an IPS there is no way to interpret this requirement in any other way.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
48
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
49
164.312 - Technical safeguards. Organizations are required to implement controls to detect and prevent security threats. An IPS is a part of the total solution for blocking network-based threats, from the Internet as well as from within the organization. 164.316 - Documentation requirements. Organizations are required to implement reasonably appropriate policies and procedures to comply with standards and implementation specifications. It would be hard to imagine a HIPAA-compliant organization that lacked an intrusion prevention system.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
50
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
51
DS5.3, 5.4, 5.10 - System infrastructure is properly configured to prevent unauthorized access. Intruders arent welcome! An IPS helps to prevent unauthorized access by blocking unwelcome access attempts. DS9.2 - Authorized software only on IT assets. An IPS can help to detect the presence of unauthorized software on IT systems through the detection of new types of network traffic. Whether an organization adopts COBIT or another set of controls for SOX compliance, certainly these controls will include those listed here. An IPS is a key component for achieving compliance with these controls.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
52
Basel II
Basel II is the second of the Basel Accords, an international standards committee on banking laws and regulations. The purpose of Basel II is sound capital management for banks and other depositor institutions.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
53
Like Sarbanes-Oxley, Basel II doesnt prescribe specific controls, but many organizations that are required to comply with Basel II adopt the Control Objectives for Information and related Technology (COBIT) framework of controls. See the earlier section on Sarbanes-Oxley for information on how IPS supports compliance to COBIT controls.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
54
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 6
SMB organizations
Unraveling industry specific requirements Exploring independent test labs
o here you are in the selection criteria section. Youre probably thinking about getting an IPS for your organization now, or at least thinking about thinking about it. Or maybe you want to see what criteria other organizations use when theyre ready to buy. Regardless, it is important to develop objective criteria for any IT system, and then compare various products against your criteria. This may sound tedious, but would you rather buy based on emotion? Well, it may feel good at the moment, but later on you might not be happy with what you purchased at the time.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
56
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
57
Support. Everyone gets stumped now and then, and every product is going to be prone to hardware or software trouble, no matter how good its quality program is. You want a company that stands behind its product and is ready to offer whatever kind of help you need. Cost. Dont be afraid to understand and specify your spending limits. In the rest of this section, I discuss requirements that are specific to large (enterprise) organizations, smaller organizations, and government.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
58
In addition to the general requirements discussed earlier in this chapter, enterprises are generally also interested in some of these requirements: Management. Rather than just a single administrative user for their IPS, enterprises need an IPS that can support many users and different roles. Forensics. Enterprises need their IPSs to be able to provide forensics-quality information to support security events related to sophisticated threats or those that may find their way into the criminal justice system as evidence. Fault tolerance. Enterprises build high-availability, fault-tolerant infrastructures to support high-demand applications. These organizations need IPSs that can match the five-nines availability environments they support, meaning there is practically zero minutes of unscheduled downtime per calendar year. High throughput. Moores Law has proven that processing speed is doubling every two years. Thus, you will continue to see network speeds grow. IPS vendors, in particular, should have a broad range of products to support the smallest to the very largest network needs. Low TCO. Although enterprises have larger operating budgets than smaller organizations, they also have greater
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
59
demands for securing the network. Thus, enterprises must select an IPS that helps them to work smarter not harder by automating key functions, such as impact assessment, user identification, and IPS tuning.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
60
Industry-Specific Considerations
Organizations in some industries will impose additional requirements on IPS vendors, generally as a pass through where organizations are asserting requirements on the suppliers that are imposed upon them.
Public utilities
Power, water, natural gas, and other public utilities rely on Supervisory Control and Data Acquisition (SCADA), Process Control Network (PCN), and Smart Grid technology for remote control and monitoring of utility equipment. These systems are almost always IP-based and frequently utilize the public Internet for transmission. An IPS helps to secure SCADA, PCN, and Smart Grid systems by detecting and blocking intrusions that could include terrorist attacks. Leading IPS solutions may offer special SCADA, PCN, and/or Smart Grid rule sets and may also incorporate passive network intelligence collection for correlating threats without actively scanning the network.
Healthcare
Healthcare providers and other industry organizations subject to HIPAA requirements need to incorporate IPSs into their network infrastructure as part of their technical safeguards. These organizations requirements will often resemble those required for most enterprises, as discussed earlier in this chapter.
Financial
Banks, credit unions, brokerages, and insurance companies are required to protect sensitive customer information from
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
61
theft and abuse. These organizations will often impose enterprise level requirements, including enterprise scalability and management. FISMA and Basel II are the primary regulations requiring financial institutions to protect their systems and networks.
Telecommunications
Common carriers, including telecommunications providers and Internet service providers, have the worlds most extensive networks over which the worlds Internet and private communications take place. Most of these organizations are under market or regulatory pressure to provide five-nines availability. Such organizations will require the most robust IPS platforms, including support for high-throughput environments, fault-tolerant hardware, and fail-open interfaces.
Hardware Considerations
Organizations shopping for IPSs need to understand what hardware features are important for them. Hardware centric requirements will generally fall into these categories: Inline IPS or passive IDS. An organization needs to decide whether it is looking for an inline IPS, which will block unwanted traffic, or a passive IDS, which will only report on (but not block) unwanted traffic. Although there are no purely passive IDS products available, this requirement speaks more to the functional requirement and purpose of the IPS primarily whether it is intended to be an active (blocking) or passive (reporting only) device. Purpose-built appliances. Organizations may wish to specify whether theyre looking for IPS software that they would install on their own servers, generic appliances, or a purpose-built appliance with IPS features built into the hardware. If you consider an IPS vendor with purposebuilt appliances, ensure that this doesnt hinder the extensibility of the solution by verifying the availability of Virtual IPS offerings for VMware, Xen, or other virtualization platforms.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
62
Third-Party Testing
There are two independent test laboratories in particular that actively test IPS products ICSA Labs and NSS Labs. These companies evaluate leading IPS devices for accuracy, reliability, and performance. Organizations that are serious about the desired quality of their IPS systems should consider only products that have been independently evaluated by a reputable third-party testing organization. Test reports on leading IPS products may be purchased from ICSA Labs and NSS Labs directly or can often be obtained at no charge from the IPS vendors themselves.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 7
hen assessing the cost of a network IPS, its not only important to assess the acquisition costs and annual maintenance fees, but also the cost to deploy and maintain the IPS which often represents the bulk of total cost of ownership (TCO) over a three- to five-year period. A Next-Generation IPS leverages real-time network, application, behavior, and user awareness to automate key IPS functions. These awareness capabilities provide you with unparalleled visibility, minimizing your reliance on other IT teams and empowering you to automate key IPS functions that a more traditional IPS simply cant. By leveraging this newfound awareness, a Next-Generation IPS offers numerous advantages over a traditional IPS, including: Stronger network protection Superior performance, scalability, and availability Simpler deployment and ongoing maintenance Lower total cost of ownership
Total cost of ownership (TCO) includes all costs associated with acquiring, deploying, maintaining, and operating a system in this case, a network IPS. Through powerful
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
64
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
65
Remove network blind spots through SSL inspection. Improve your security posture by decrypting SSL traffic prior to IPS inspection. Ensure that original (clean) SSL traffic is re-encrypted before being placed back onto the wire to maintain data confidentiality and regulatory (for example, PCI) compliance. Reduce the surface area of attack through compliance rules and whitelists. Todays Next-Generation IPS can help you model and enforce your organizations acceptable use policies (AUPs). Leverage compliance rules and whitelists to help reduce your networks surface area of attack. Detect threats from the inside that your IPS may miss. A perimeter IPS will miss every exploit that is handcarried through the office front door on mobile computing devices. Increase your defense-in-depth posture by implementing Network Behavior Analysis (NBA) to baseline normal network traffic and detect anomalies. Improve security by controlling VM sprawl. Be alerted when new VMware, Xen, or other virtual machines (VMs) pop up on the network without knowledge or approval of the IT security team. Audit new VMs for compliance with internal security policies. This will help you to be in control of your VM infrastructure. Integrate your IPS into your existing IT security infrastructure. Leverage existing investments in SIEM, vulnerability management, network forensics, network access control (NAC), and other infrastructure components to share intelligence, automate remediation, and accelerate incident response.
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
66
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
TM
These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited.
Find out why intrusion prevention systems are needed and which features are most important for your organization
Intrusion prevention systems are a critical part of an organizations overall network and systems protection strategy. Without them, youre fighting the bad guys with one arm tied behind your back. This book gives you the need-to-know information that can help you understand how these solutions improve the security in an organizations networks. How intrusion prevention systems work and the ways they detect network-based attacks What types of threats that IPSs are designed to detect and deflect including some of the nastier threats such as zero-day and advanced persistent threats Which features and functions are found in Next-Generation IPSs including impact assessment, application monitoring, automated IPS tuning, and user identification How cloud and virtualization fit in and the role that IPSs play to protect these new types of environments Look at IPS and standards and regulations such as PCI, HIPAA, GLBA, SAS70, and FISMA Select the right IPS get your IPS shopping list organized so that you get the IPS that is right for your organization
Open the book and find:
What constitutes a zeroday attack A look at the benefits and risks of virtualization A list of ways to lower the total cost of ownership Information on complying with regulations The difference between passive and inline systems
Go to Dummies.com
for videos, step-by-step examples, how-to articles, or to shop!
Steve Piper, CISSP, SFCP, is Sr. Director of Product Marketing with Sourcefire and an 18-year high-tech veteran. Prior to Sourcefire, Steve held senior-level positions with Citrix and NetIQ and has achieved technical certifications from ISC2, Microsoft, Novell, Sourcefire, and more. Steve holds BS and MBA degrees from George Mason University.