零信任:保護不斷發展的工作場所.pdf

編號:138873 PDF 89頁 6.09MB 下載積分:VIP專享
下載報告請您先登錄!

零信任:保護不斷發展的工作場所.pdf

1、#CiscoLive#CiscoLiveDarrin Miller Distinguished Technical Marketing Engineer(TME)vancsprBRKSEC-2053Securing the Evolving WorkplaceZero TrustAgenda 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicCisco Live HousekeepingIntroduction to Zero TrustEvolving Workplace Use CasesSecuring th

2、e WorkplaceSummaryBRKSEC-20533Objectives:Understand Zero Trust Principles and their application to evolving workplace networks.2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveAbout MeDarrin MillerSecurity focused Technical Marketing EngineerFocused on Architecture,Policy,a

3、nd ThreatAuthor of Books,CVDs,Whitepapers,Patents,etc.Cisco Live Distinguished Speaker Hall of Fame Elite20+years at Cisco:Research,Development,TMEBRKSEC-20536 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveEnter your personal notes hereCisco Webex App Questions?Use Cisco

4、 Webex App to chat with the speaker after the sessionFind this session in the Cisco Live Mobile AppClick“Join the Discussion”Install the Webex App or go directly to the Webex spaceEnter messages/questions in the Webex spaceHowWebex spaces will be moderated by the speaker until June 9,2023.12347https

5、:/ 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicBRKSEC-20537Introduction to Zero Trust 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveZero Trust means different things to differentpeopleIts endpoint securityIts firewallIts identityIts ZTNAIts segmentat

6、ionBRKSEC-20539 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicWhat Zero Trust Means to UsNever assume trust.Always verify.Enforce least privilege.BRKSEC-205310 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCisco believes Zero Trust must be defined holi

7、sticallyZero TrustFeaturesCapabilitiesStrategyPlatformPrinciplesTechnologiesBRKSEC-205311 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveStrong Strong SecuritySecurityDrags down execution(users bogged down by access requirements)High High ProductivityProductivityCreates r

8、isk exposure(no constraints on the users)Greater Business SecurityGreater User ProductivityTodays trade-off is holding back Zero TrustSecurity vs.productivityBRKSEC-205312 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveZero Trust Zero Trust“Sweet Spot”“Sweet Spot”Strong s

9、ecurity AND high productivityempower users to do the right thing security is everyones businessStrong Strong SecuritySecurityDrags down execution(users bogged down by access requirements)High High ProductivityProductivityCreates risk exposure(no constraints on the users)Greater Business SecurityGrea

10、ter User ProductivityEliminate the trade-offFrustrate attackers,not usersHigh Risk/High Risk/High FrictionHigh FrictionBRKSEC-205313 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat it takes to get Zero Trust rightZero Trust requirementsEstablish TrustEnforce Trust-Bas

11、ed AccessContinuously Verify TrustRespond to Change in TrustBRKSEC-205314Evolving Work Place Use Cases 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveEvolving PerimeterMajor Shift in IT LandscapeUsers,devices and apps are everywhereRemote UsersPersonal&Mobile DevicesIoT D

12、evicesCloud ApplicationsHybrid InfrastructureCloud InfrastructureBRKSEC-205316 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveZero Trust StateTransition from Flat Network to Zero Trust SegmentationFlat ArchitectureFlat ArchitectureCurrent StateZero Trust Zero Trust Archit

13、ectureArchitectureAs Published by Cisco Press Book:“Zero Trust Architecture”BRKSEC-205317Let me tell you a story of a breach.2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveIts about a Casino 19 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBRK

14、SEC-2053 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveThey had a fish tank with smart thermometer in the lobby20 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBRKSEC-2053 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#Cisc

15、oLiveA hacker noticed this networked thermometer21 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBRKSEC-2053 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveand took control by exploiting vulnerabilities on it22 2023 Cisco and/or its affiliates

16、.All rights reserved.Cisco Public#CiscoLiveBRKSEC-2053 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveand then,through the thermometer he got access to the casinos customer database23 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBRKSEC-2053 2

17、023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive.and then exfiltrated high-rollers data over days to a remote server 24 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBRKSEC-2053End of the story 2023 Cisco and/or its affiliates.All rights reserve

18、d.Cisco Public#CiscoLiveWhat is said about(ZT)Making it realityZero Trust Network Access(ZTNA)can remove all network controlsAssumes there is only a single use case to be solved.Users on smart devices accessing modern applications.Company breakdown of users on smart devices and application infrastru

19、cture may or may not allow thisZTNA can simplify network securityI want a caf like experience for all my usersEasier on boarding for devicesSeamless Wi-Fi experience.Few have adopted unencrypted totally open networksBRKSEC-205326 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#Cisc

20、oLiveWhat is said about ZT Making it realityUse the same user/device least privilege on prem as off premDepends on company and use casesApplication performance considerations depending on architecture.Hair-pining in CloudLatency sensitive applicationsUsers interactions to non ZTNA capable deviceWe c

21、an get rid of networksHybrid work may move cost of networking to the employeeSmaller offices may simplify what the Network doesDramatic rise of IOT and Smart buildings might change primary focus of the network“Gartner:Zero Trust Is Not a Security Panacea” article January 25th2023BRKSEC-205327 2023 C

22、isco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveIaaSOff Prem AccessInternetAccessSDWANSIGACITraditional DCSaaSBRKSEC-205328 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveIaaSOn Prem AccessInternetAccessSDWANSIGACITraditional DCSaaSBRKSEC-205329Securi

23、ng the Workplace 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveZero Trust StateTransition from Flat Network to Zero Trust SegmentationFlat ArchitectureFlat ArchitectureCurrent StateZero Trust Zero Trust ArchitectureArchitectureAs Published by Cisco Press Book:“Zero Trust

24、 Architecture”BRKSEC-205331 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveService DeskZero Trust Success More than Technology(Layer 8)Business GovernanceAnd Executive SponsorshipITIL ManagementSecurityInfrastructurePolicyService OwnerOperational NeedsPolicyDefinitionDefi

25、nitionExecutionBusiness DriversRegulatory(Federal/Industry)Availability(Factories must run)Others Drivers?Execution of Policy RulesConfiguration of infrastructure to enforce the policyApplication Owner”Policy Decision Maker”Approves and drives policyGives the command to block communicationsOwns serv

26、ice impact Users/Application/IOT DeviceWhat does it need to talk to?Where do endpoints and host reside?Availability/Business Continuance RequirementsNetwork OperationsNetwork EngineeringPolicyAudit&ComplianceEvent ManagementOperational NeedsBRKSEC-205332 2023 Cisco and/or its affiliates.All rights r

27、eserved.Cisco Public#CiscoLiveCiscos Zero Trust capabilitiesUser/device/service identity Posture+contextRisk-based authentication Micro-segmentationUnified access controlLeast privilege+explicit trustRe-assessment of trustIndicators of compromiseShared signalsBehavior monitoring threat and non-threa

28、t activityVulnerability managementPrioritized incident responseOrchestrated remediationIntegrated+open workflowsEstablish TrustEnforce Trust-Based AccessContinuously Verify TrustRespond to Change in TrustUser&DeviceSecurityNetwork&Cloud SecurityApplication&Data SecurityBRKSEC-205333Establish Trust 2

29、023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveISE Provides Zero Trust for the Workplace Cisco ISEStandalone ISEMulti-node ISEVM/ApplianceCloud ImagesEndpointsUsersDevicesThingsCisco DNA Center Security ServicesNetwork AnalyticsSecure FirewallPartnersSecurityEnterpriseIden

30、tity ServicesAzure/AD/LDAPMDMSAML/MFANetwork DevicesSwitchesWLCs/APsVPNISEBRKSEC-205335 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveContext Build,Summarize,ExchangeVisibility and Access ControlISE builds context and applies access control restrictions to users and devi

31、cesContext Reuseby eco-system partners for analysis&controlSecure Network AnalyticsSecure FirewallDNAC+3rdParty PartnerspxGridREST APISyslogWhoWhatWhenWhereHowPostureEndpointsMobility Services EngineVulnerability ScannersThreat IntelligenceThreatVulnerabilityMobile Device ManagersDirectory ServicesS

32、ystem managersSecurity GroupISEBRKSEC-205336 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveML AnalyticsML AnalyticsEndpointEndpointProfilingProfilingDataDataAggregationAggregationNetwork Telemetry ProbesEasy Onboarding ToolsRF Fingerprinting(Roadmap)DPI-based Fingerprint

33、/BehaviorCMDB Connector3rd Party Visibility ToolImproving Profiling AI Endpoint Analytics on Cisco DNA Center?Rapidly reducing the unknowns to gain visibility on the pathway to Zero TrustBRKSEC-205337 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveClassification based on

34、Deep Packet InspectionDHCPClass-IDMSFTProbesProbesGE Optima GE Optima CT Scanner 540CT Scanner 540(Runs Windows 7)L7L6DICOM:GE CT540 Deep Packet Deep Packet InspectionInspectionEndpoint Type:CT ScannerCT ScannerOperating System:MS Windows 7MS Windows 7Manufacturer:General Electric(GE)General Electri

35、c(GE)Model:Optima CT 540Optima CT 540Multifactor ClassificationML AnalyticsML AnalyticsEndpointEndpointProfilingProfilingDataDataAggregationAggregationPowered by NBAR Powered by NBAR(SD(SD-AVC Agent)AVC Agent)ML AnalyticsDPICMDBConnector3rdParty Visibility ToolBRKSEC-205338 2023 Cisco and/or its aff

36、iliates.All rights reserved.Cisco Public#CiscoLiveBetter Classification reduces unauthorized accessCisco ISECisco ISEDNACDNACSGT 10SGT 10SGT 11SGT 11SGT 12SGT 12ML AnalyticsML AnalyticsEndpointEndpointProfilingProfilingDataDataAggregationAggregationEndpoint Type:CT ScannerCT ScannerOperating System:

37、MS Windows 7MS Windows 7Manufacturer:General Electric(GE)General Electric(GE)Model:Optima CT 540Optima CT 540Multifactor ClassificationCisco DNA CenterCisco DNA CenterBRKSEC-205339 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveRule creationRule creationCreates a rule tha

38、t uniquely groups together endpoint clustersML analyticsDPICMDBconnectorThird-party Visibility toolClusteringClusteringML groups different endpoints into clusters based on attribute dataKnownEA on DNA CenteriPhonesDevice data lakeUnknownEndpoint dataCisco ISE Third partySD-AVCNetFlowAttribute BAttri

39、bute ACluster 2Cluster 1=done in cloudEndpoint Endpoint l labelingabelingScenario 1:Scenario 1:Customer teaches ML what the endpoints are.These are Bosch Coffee MachinesThese are Apple Watches.Active learningActive learningML learns new labels and validates existing labels.New labelsNew labelsBosch

40、Coffee Machine=Apple Watch=Reducing unknowns when using MLMust forward endpoint attributes to ML cloud(available 3.2p1)Air gapped environments not supportedBRKSEC-205340 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCrowdsourcing using MLDPICMDBconnectorThird-party visib

41、ility toolActive learningActive learningML learns new ML learns new labelslabelsBosch Coffee Machine=AI cloudAI cloudCustomer ACustomer ACustomer BCustomer BClassification Classification suggestionsuggestionClusteringClusteringML groups endpoints into clusters based on attribute dataAttribute BAttri

42、bute ACluster These are Bosch Coffee Machines.Confirm?ML analyticsBRKSEC-205341 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveMultiMulti-Factor Classification Factor Classification(MFC)on ISE 3.3(MFC)on ISE 3.3Current endpoint profiles in ISE are simple strings,making it

43、 hard to filter endpoints on simple attributes and set consistent authorization policyProblemProfiles are now made up of four factors:MFC-Manufacturer,MFC-Model,MFC-OS,and MFC-Endpoint Type.Benefits include easily setting policy based on these four MFC attributes,as well as compatibility with Ciscos

44、 AI/ML profiling engineSolutionNot turned on by defaultDoes not work with current custom profilesCaveats/PrerequisitesFeed Service(Online/Offline)Device TypeModelOSManufacturerCiscoArloAppleLenovoIP-PhoneCameraLaptopLaptopIP Phone 7980Pro wireless Cam MacBook ProThinkpad 540iOSLinuxmacOS 12.0.1 Wind

45、ows EnterpriseISEBRKSEC-205342 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveUse WiUse Wi-Fi Edge Analytics data for ISE 3.3Fi Edge Analytics data for ISE 3.3Apple,Samsung,and Intel devices are sharing rich data with WLCs that can improve profiling but was not usable in

46、the pastProblem9800 WLCs will now pass endpoint specific attributes to ISE,enabling for fast,accurate,and simple profiling of Samsung,Apple,and Intel devicesSolutionMust have 9800 WLCsIOS-XE 17.10Caveats/PrerequisitesModel NumberOS VersionFirmware VersionCountry CodeDevice formISERADIUS AcctModel=Ga

47、laxy S1OUI=Samsung=Samsung Galaxy S1Model=iPadOUI=Apple=Apple iPadModel=MacBook ProOUI=Apple=Apple MacBook ProBRKSEC-205343Enforce Trust-Based Access 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveTwo Level Hierarchy Macro LevelBuilding Management Building Management VNVN

48、NetworkCampus Users Campus Users VNVNFirst level Segmentation that ensures zerozero communication between specific groups.Ability to consolidate multiple networks into one management plane.Virtual Network(VN)/Virtual Network(VN)/Virtual Private Network(VPN)/Virtual Private Network(VPN)/VRF/ZonesVRF/

49、ZonesBRKSEC-205345 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveTwo Level Hierarchy Micro LevelBuilding Management Building Management VNVNNetworkCampus Users Campus Users VNVNSecond level Segmentation ensures ensures role based access controlrole based access control(l

50、east privilege)between two groups within or between Virtual Network(s).Provides the ability to segment the network into either line of businesses or functional blocks.Group Based Policy(SGT)Group Based Policy(SGT)Finance SGEmployee SGBRKSEC-205346 2023 Cisco and/or its affiliates.All rights reserved

51、.Cisco Public#CiscoLiveGroup Based Policy Simplifies Trust Based PolicyUse existing topology and automate security policy to reduce OpExVoiceVLANVoiceTraditional SegmentationAccess LayerAggregationLayerVACLSecurity Policy based on TopologyHigh cost and complex maintenanceEmployee TagSupplier TagNon-

52、Compliant TagGroup Based PolicyStatic ACLRoutingRedundancyDHCP ScopeAddressVLANMicro/Macro SegmentationCentral Policy ProvisioningNo Topology ChangeNo VLAN ChangeQuarantineVLANNon-CompliantVoiceVLANGuestVLANDataVLANBYODVLANEnterpriseBackboneVoiceEmployeeSupplierBYODDataVLANBYODEmployeeSupplierNon-Co

53、mpliantPolicyAccess LayerDC ServersEnterpriseBackboneISEISEBRKSEC-205347 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveThe Value of Group-Based PoliciesEnhanced simplicity for better enforcement and managementIndividual users in campusand branchIndividual servers indata

54、centerSampleSampleuser groupsuser groupsEmployeePartnerContractorGuest unknownSample Sample server groupsserver groupsNDAconfidentialSensitiveGeneral accessCompanyconfidentialSource Source policy policy entities are entities are enormously enormously reducedreducedDestination Destination policy poli

55、cy entities are entities are also also enormously enormously reducedreducedGBPGBPBRKSEC-205348 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveView/Model PolicyAnalyze the NetworkVisualize traffic flowsCreate groups Identify policiesTrust-Based Policy WorkflowMonitorEnforc

56、eDetect123Establish PolicyEstablish the policiesEstablish Group-Based Segmentation PolicyTrial/Monitor group-basedpoliciesApply group-based PolicyVerify PolicyContinuous Trust MonitoringMonitor Policies effectiveness Detect Policy violationsDeduce policy updates requirements BRKSEC-205349View/Model

57、Policy 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveGroup-Based Policy Analytics(GBPA)Application on Cisco DNA Center(Netops)Policy ModelingPolicy EnforcementPolicy DiscoveryGroup-GroupActivityEndpoint AnalyticsMFCISE Scalable Groups and ProfilesSecure Network Analytics

58、 Host GroupsFlow InfoCisco DNA CenterBRKSEC-205351 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveGroup to Group Activity(GBPA App on Cisco DNA Center)BRKSEC-205352 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveDetecting Ports/Protocols Betwee

59、n Groups(GBPA App on Cisco DNA Center)Ports 104,1550 and 11112 detected between Scanners and Storage groups,all used for DICOM interactionN.B.DICOM:Digital Imaging and Communications in MedicineIdentify the specific ports/protocols needed in access control policiesBRKSEC-205353 2023 Cisco and/or its

60、 affiliates.All rights reserved.Cisco Public#CiscoLiveContract and Discovered Information Side-by-Side(GBPA App on Cisco DNA Center)BRKSEC-205354 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCreate/Edit Contract Easily Based on Discovered Flows(GBPA App on Cisco DNA Cen

61、ter)BRKSEC-205355 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSecure Network Analytics:Visualizing communications between SGTs(NetSecOps)Report on all observed SGT group communicationsQuickly see which SGTs are communicatingClick on a cell todisplay amounts of data tra

62、nsmittedView up to 300 SGTs BRKSEC-205356Establish Policy 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive?SDSD-WANWANSDSD-WANWANNOW:Context retained in the transitNOW:Context retained in the transitBEFORE:Context Lost in the transitBEFORE:Context Lost in the transitMacro

63、segmentation with VNs and Macro segmentation with VNs and MicroMicro-segmentation with SGTssegmentation with SGTsVisibilityVisibilitySegmentationSegmentationContainmentContainmentPolicy ApplicationRetain policy contextRetain policy contextExchange the rich context at scale across distributed trusted

64、 domainsUniform security policyUniform security policyHaving same rich context everywhere enables uniform policy application without having to reclassify endpointsController IntegrationController IntegrationFully Automated,flexible deployment models between SDA and SD-WANRequires endpoint reclassifi

65、cationMultidomain:Integration for ScalingConnecting distributed trusted domains at scale ISEDNA-CentervManageMeraki58 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveGroup-Based Policy in Operation-StatelessEnforcementDynamicClassificationPropagationRoutersProductionServer

66、sWirelessRemoteAccessSwitchDC SwitchApplicationServersUser-B8SGT7SGTGroup-AApp_ServProd_ServApp_ServProd_ServPermit AllPermit AllDeny AllPermit AllDeny AllDeny AllSourceDestinationEgress PolicyVPVPN NCisco ISENetwork6SGT59StaticClassificationUser-A5SGTGroup-AGroup-BGroup-AGroup-BPermit AllPermit All

67、Deny AllDeny AllSourceDestinationEgress PolicyDeny AllPermit AllBRKSEC-205359 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveGroup-Based Policy in Operation StatefulEnforcementDynamicClassificationPropagationRoutersNGFWProductionServersWirelessRemoteAccessSwitchDC SwitchA

68、pplicationServersUser-B8SGT7SGTGroupr-AGroup-BProd_ServApp_ServApp_ServPermit AllPermit AllPermit SQLDeny AllSourceNGFW ManagerAccess Control PolicyVPVPN NCisco ISENetwork6SGT60StaticClassificationUser-A5SGTGroup-AGroup-BGroup-AGroup-BPermit AllPermit AllDeny AllDeny AllSourceDestinationEgress Polic

69、yDeny AllPermit AllpxGridProd_ServActionDestinationBRKSEC-205360 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveGroup-Based Policy in Operation Lateral movementEmployee SGT(5)10.1.100.1Contractor SGT(10)10.2.200.6Cisco ISEAuthc/AuthzContractorDeny AllPermit AllDeny AllEmp

70、loyeePLCContractorEmployeePermit AllPermit AllDeny AllSourceDestinationEgress PolicyBRKSEC-205361 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveAutonomousCatalyst SiteGroup Based Policy Integrated Domains-PolicyCisco Zero Trust Extension of Policy to Private/Public Cloud

71、sSD-WAN FabricWAN EdgeSD-Access Fabric SiteSD-Access Fabric SiteWAN EdgePublic CloudWAN EdgeWAN EdgeWAN EdgePrivate CloudMeraki SitesBRKSEC-205362 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveISE/Cisco SD-WAN IntegrationRel.17.10 Dec22ContractorDeny AllPermit AllDeny Al

72、lEmployeePLCContractorEmployeePermit AllPermit AllDeny AllSourceDestinationZBFW PolicyIAAS,SAASPrivate AppsISEEmployeeEmployeeContractorContractorPxGridPxGridZBFW policyOMP-IP to SGT mappingGranular Security Control at User/Group LevelUnified Security policy and intentActive Directory/LDAP/CMDBUser/

73、Device to SGT mappingBRKSEC-205363 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveGrouped Based Policy SD-WAN Group(SGT)IntegrationBRKSEC-205364 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveMeraki Adaptive Policy(SGT)and ISE SyncSGACL Enforce

74、ment(Adaptive Policy)Policies provisioned by DashboardAll Meraki MS390 switchesC9K CoreInline SGTs passed inline802.11ac wave 2 and Wi-FI 6 MR Policies downloaded From ISEISECisco DNA Center(optional)SGT Policies syncd to MerakiISE 3.2 p1BRKSEC-205365 2023 Cisco and/or its affiliates.All rights rese

75、rved.Cisco Public#CiscoLiveISE Meraki Policy SyncBRKSEC-205366 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveOpen Implementations3rd parties support SGTs via pxGrid-IETF proposal for Security Automation and Continuous Monitoring(SACM)Checkpoint amongst othersSXP publishe

76、d as an Informational Draft to the IETF,based on customer requestsshipping partner implementationsOpen Source SXP Implementations Java in OpenDaylight,C on Includes the Cisco Meta Data(CMD)format for inclusion of the SGT with Ethernet frames(detailed on the next slides)https:/datatracker.ietf.org/do

77、c/draft-smith-kandula-sxp/All Major NGFW Vendors are interoperable via pxGridSD-WAN competitors are interoperable via inline tagging and pxGridSwitching and Wireless Competitors have implemented SGT3rdParty ASIC Vendors are publishing CMD/SGT supportBRKSEC-205367Verify Policy 2023 Cisco and/or its a

78、ffiliates.All rights reserved.Cisco Public#CiscoLivePolicy Counters Cisco DNA Center-NetopsTable ViewPermits and Denies per policy108670847231BRKSEC-205369 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSNA:Validate ISE policy is being observed-near real time network tele

79、metry(NetSecOps)BRKSEC-205370 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSGACL Logging Open Telemetry16.3 Initial support in C9K17.3 Performance optimization for CPU protection*Jan 27 13:33:43.355:%RBM-6-SGACLHIT:ingress_interface=GigabitEthernet1/0/24 sgacl_name=Deny

80、IP_Log-01 action=Deny protocol=tcp src-vrf=default src-ip=10.10.18.101 src-port=64382 dest-vrf=default dest-ip=10.10.35.201 dest-port=80 sgt=4 dgt=4 logging_interval_hits=1BRKSEC-205371 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSGT/DGT Hit Counters via Open Telemetry

81、NCC https:/ cisco-p nbv_1234-x/trustsec-state-period 50-callback sample trustsec-state.txtSubscription Result:notif-bis:okSubscription Id :2147483648-Event time :2019-01-27 22:26:46.910000+00:00Subscription Id:2147483648Type :1Data :datastore-contents-xml:trustsec-state:cts-rolebased-policies:cts-ro

82、lebased-policy:dst-sgt:4,hardware-deny-count:145,hardware-monitor-count:0,hardware-permit-count:0,last-updated-time:1548631492542928,monitor-mode:false,num-of-sgacl:1,policy-life-time:86400,sgacl-name:dev_emp_deny_log-02;,software-deny-count:0,software-monitor-count:0,software-permit-count:0,src-sgt

83、:8,total-deny-count:145,total-permit-count:0,BRKSEC-205372 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveOpen Telemetry Example SGACL MonitoringBRKSEC-205373Continuously Verify 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSharing signals acr

84、oss all control pointsUser&DeviceSecurityNetwork&Cloud SecurityApplication&Data SecurityDuoSecure EndpointKenna SecurityIdentity Services Engine(ISE)UmbrellaSecure FirewallSecure Network AnalyticsSecure WorkloadSecure Cloud AnalyticsEnforce zero trust policies across the broadest set of control poin

85、tsCisco XDREstablish TrustEnforce Trust-Based AccessContinuously Verify TrustRespond to Change in TrustBRKSEC-205375 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveDNAC Trust Analytics:Continuous validation of endpoints(Netops)3 3Trust ScoreSecure authentication and Postu

86、re Impersonation attacksLow reputation IP ConnectionsVulnerability/Threat Metrics MML LContinuously monitor Risk/Trustworthiness and restrict accessEAEASupportedUnauthorized ports and weak credentialsEmbedded/Machine LearningSecurity EcosystemRoadmapDNAC and ISEBRKSEC-205376 2023 Cisco and/or its af

87、filiates.All rights reserved.Cisco Public#CiscoLiveSecure Network Analytics(SNA)(NetSecOps)Customer Security Event(CSE)using TrustSec(SGT)and Geo-IP AttributesBRKSEC-205377Respond to Trust 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLive8 88 81010Endpoint Analytics:Trust S

88、core after MABNetwork devicesCisco ISEMABMAB802.1X(PEAP)802.1X(PEAP)EAEAEndpoint Type:IP CameraOS Type:LinuxManufacturer:Camera_MfgModel:X255ZPassword Compliance:CompliantMAC Spoofing:Non Compliant802.1X(EAP802.1X(EAP-TLS)+TLS)+AnyconnectAnyconnect PosturePostureQuarantineQuarantine5 5Adaptive Netwo

89、rk Control(ANC)API CallBRKSEC-205379 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveThreat Visibility Rapid Threat Containment(RTC)1Threat from Jims device3AMP on Endpoint notifies the cloud24JimHarryAlice5Cisco ISEBRKSEC-205380 2023 Cisco and/or its affiliates.All rights

90、 reserved.Cisco Public#CiscoLiveVulnerability Assessment(Threat-Centric NAC)On-prem Scanner1Scan Jims Endpoint2Scans3Scan report4CVSS=105CVSS:Common Vulnerability Scoring SystemAuthorization PolicyIfCVSS is Greater than 5Quarantine=true,thenJimHarryAlice6Cisco ISEBRKSEC-205381 2023 Cisco and/or its

91、affiliates.All rights reserved.Cisco Public#CiscoLiveRADIUS CoANetFlow&ETAISE PxGrid ANCTrigger CoACoA via ISETelemetryTelemetry provided by network devices network devices to Secure Network Analytics(SNA)Flexible outcomes:Flexible outcomes:Policy ViolationThreat Detection and ResponseBRKSEC-205382S

92、ummary 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSummaryCiscos Zero Trust Architecture is a comprehensive approach to securing all access across your network,applications,and environmentCisco Zero Trust Architecture provides a scalable layered approach to Zero Trust

93、that allows it to evolve with the customers needsAs use cases evolve for Zero Trust,Cisco is innovating with products to provide least privilege access with Cisco Zero Trust for the workplaceCisco Zero Trust for the Workplace provides unrivaled visibility,segmentation and containment BRKSEC-205384 2

94、023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveLearning MapBRKSEC-205385 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveFill out your session surveys!Attendees who fill out a minimum of four session surveys and the overall event survey will get

95、Cisco Live-branded socks(while supplies last)!These points help you get on the leaderboard and increase your chances of winning daily and grand prizesAttendees will also earn 100 points in the Cisco Live Challenge for every survey completed.BRKSEC-205386 2023 Cisco and/or its affiliates.All rights r

96、eserved.Cisco PublicContinue your educationVisit the Cisco Showcase for related demosBook your one-on-oneMeet the Engineer meetingAttend the interactive education with DevNet,Capture the Flag,and Walk-in LabsVisit the On-Demand Library for more sessions at www.CiscoL you#CiscoLive 2023 Cisco and/or

97、its affiliates.All rights reserved.Cisco Public#CiscoLive89Gamify your Cisco Live experience!Get points Get points for attending this session!for attending this session!Open the Cisco Events App.Click on Cisco Live Challenge in the side menu.Click on View Your Badges at the top.Click the+at the bottom of the screen and scan the QR code:How:123489 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicBRKSEC-2053#CiscoLive

友情提示

1、下載報告失敗解決辦法
2、PDF文件下載后,可能會被瀏覽器默認打開,此種情況可以點擊瀏覽器菜單,保存網頁到桌面,就可以正常下載了。
3、本站不支持迅雷下載,請使用電腦自帶的IE瀏覽器,或者360瀏覽器、谷歌瀏覽器下載即可。
4、本站報告下載后的文檔和圖紙-無水印,預覽文檔經過壓縮,下載后原文更清晰。

本文(零信任:保護不斷發展的工作場所.pdf)為本站 (2200) 主動上傳,三個皮匠報告文庫僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對上載內容本身不做任何修改或編輯。 若此文所含內容侵犯了您的版權或隱私,請立即通知三個皮匠報告文庫(點擊聯系客服),我們立即給予刪除!

溫馨提示:如果因為網速或其他原因下載失敗請重新下載,重復下載不扣分。
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站