Chap 25 - Secure Network Access Control Flashcards
What is Cisco SAFE?
Security Architecture For the Enterprise
What are PINs?
Places In the Network
What are 6 PINs
- Branch
- Campus
- Data Center
- Edge
- Cloud
- WAN
What are the 4 top threats on PIN Branches?
- Endpoint malware (point-of-sale [POS] malware)
- Wireless infrastructure exploits such as rogue APs and man-in-the-middle (MitM) attacks
- Unauthorized/malicious client activity
- Exploitation of trust
What are 5 things that campuses are easy targets for?
- Phishing
- Web-based exploits
- Unauthorized network access
- Malware propagation
- Botnet infestations.
What are 7 popular threats to data centers?
- Data extraction
- Malware propagation
- Unauthorized network access (application compromise)
- Botnet infestation (scrumping)
- Data loss
- Privilege escalation
- Reconnaissance
What is the highest risk PIN
Edge
What are 4 popular threats to the Edge Network?
- Web server vulnerabilities
- Distributed denial-of-service (DDoS) attacks
- Data loss
- MitM attacks.
What are the 4 primary threats in the Cloud?
- Web server vulnerabilities
- Distributed denial-of-service (DDoS) attacks
- Data loss
- MitM attacks.
What are 4 typical threats seen in the WAN?
- Malware propagation
- Unauthorized network access
- WAN sniffing
- MitM attacks.
What are the 6 Security Concepts used to evaluate each PIN?
- Management
- Security Intelligence
- Compliance
- Segmentation
- Threat Defense
- Secure Services
What is the Management security concept?
Centralized device management is critical for consistent policy deployment, change management, and patching systems
What is the Security Intelligence security concept?
What does Security Intelligence provide?
What does it enable the infrastructure to do?
What 2 things does this enable?
- Security intelligence provides detection of emerging malware and cyber threats
- It enables an infrastructure to enforce policy dynamically, as reputations are augmented by the context of new threats.
- This enables accurate and timely security protection.
What are 3 examples of the Compliance security concept?
- PCI
- DSS 3.0
- HIPAA.
What is the Segmentation security concept?
What does it reduce?
How does it reduce that?
- Establishing boundaries for both data and users
- Reduces operational challenges
- By using identity-aware infrastructure to enforce policies in an automated and scalable manner
What does the Threat Defense security concept provide?
What 3 things does it use to provide that?
- Visibility into the most dangerous cyber threats
- Network traffic telemetry
- File reputation
- Contextual information
What 3 technologies does the Secure Services security concept include?
What 3 things does this protect?
- Technologies include
- access control
- VPNs
- Encryption.
- Applications
- Collaboration
- Wireless
What is provided by implementing the Cisco SAFE framework in an organization?
Advanced threat defense protection that spans the full attack continuum before, during, and after an attack for all the PINs.
What 2 things are required in the ‘Before’ phase?
- Full knowledge of all the assets that need to be protected
- Identification of the types of threats that could target those assets
What 3 actions happen during the ‘Before’ phase?
- Control
- Enhance
- Harden
What 5 Cisco solutions are used in the ‘Before’ phase?
- Next-generation firewalls
- Network access control
- Network security analysis
- Identity services
- Advanced Malware Protection (AMP)
What is defined in the ‘During’ phase?
The abilities and actions that are required when an attack gets through.
What 5 activities occur in the ‘During’ phase?
- Threat analysis
- Incident response
- Detect
- Block
- Defend
What 4 things can organizations leverage in the ‘During’ phase?
- Next-gen IPS (NGIPS)
- Next-gen firewalls (NGFW)
- AMP
- Email and web security solutions with AMP
What do the systems used in the ‘During’ phase provide?
They make it possible to detect, block, and defend against attacks that have penetrated the network and are in progress.
What is defined in the ‘After’ phase?
The ‘After’ phase is defined by the ability to detect, scope, contain, and remediate an attack.
In the ‘After’ phase what needs to be incorporated into the existing security solution?
Any lessons learned
What 4 things can organizations leverage in the ‘After’ phase?
- Cisco Advanced Malware Protection (AMP)
- Next-generation firewalls (NGFW)
- Malicious network behavior analysis using Stealthwatch
- Security Analytics
In the ‘After’ phase what can the leveraged tools accomplish?
The will quickly and effectively scope, contain, and remediate an attack to minimize damage.
What is Cisco TALOS?
What do they have that supports them?
What does it create?
What 3 things do they do with it?
- A team of security experts
- Sophisticated security systems
- Creates threat intelligence
- Detects known and emerging threats
- Analyzes known and emerging threats
- Protects known and emerging threats
What 3 teams comprise TALOS?
- IronPort Security Applications (SecApps)
- Sourcefire Vulnerability Research Team (VRT)
- The Cisco Threat Research, Analysis, and Communications (TRAC) team
What 6 intelligence feeds go into TALOS?
- Advanced Microsoft and industry disclosures
- AMP community
- Honeypots
- The Sourcefire Awareness, Education, Guidance, and Intelligence Sharing (AEGIS) program
- Private and public threat feeds
- Dynamic analysis
What 7 user communities does TALOS leverage?
- ClamAV
- Snort
- Immunet
- SpamCop
- SenderBase
- Threat Grid, and Talos user communities
What does TALOS do with the intelligence from their feeds?
It is fed into a wide range of security products and solutions to provide protection against an extensive range of threats.
What is Cisco Threat Grid?
A solution the can perform static and dynamic file analysis to determine if the file is malware.
What does Cisco Threat Grid do when it identifies a file as malware?
It begins to understand what it is doing or attempting to do, the scope of the threat it poses, and how to defend against it.
What are 3 examples of some of the things Threat Grid looks at for static file analysis?
- Filenames
- MD5 checksums
- File types
What 3 ways is Threat Grid made available?
- Appliance
- Cloud-based
- Integrated into other Cisco security products
What are 2 places where Threat Grid get files to analyze?
- Automatic submission from products integrated with Threat Grid
- Files can be manually uploaded
What is Cisco Advanced Malware Protection (AMP)?
It is a malware analysis and protection solution that goes beyond point-in-time detection.
How is AMP leveraged ‘Before’ an attack?
Global threat intelligence from Cisco Talos and Cisco Threat Grid feeds into AMP to protect against known and new emerging threats.
How is AMP leveraged ‘During’ an attack?
File reputation to determine whether a file is clean or malicious as well as sandboxing are used to identify threats during an attack.
How is AMP leveraged ‘After’ an attack?
Cisco AMP provides retrospection, indicators of compromise (IoCs), breach detection, tracking, analysis, and surgical remediation after an attack, when advanced malware has slipped past other defenses.
What are the 3 main components of the AMP architecture?
- AMP Cloud (public or private)
- AMP Connectors
- Threat intelligence from Cisco Talos and Cisco Threat Grid
What are the AMP Connectors?
- AMP for Endpoints (Microsoft Windows, macOS X, Google Android, Apple iOS, and Linux)
- AMP for Networks (NGFW, NGIPS, ISRs)
- AMP for Email (ESA)
- AMP for Web (WSA)
- AMP for Meraki MX
- Cisco Security Connector (AMP for Apple iOS)
What is the most important component of AMP architecture?
The AMP Cloud
What does the AMP Cloud contain?
The database of files and their reputations (malware, clean, unknown, and custom), also referred to as file dispositions.
What happens if an AMP connector uploads a sample file to AMP Cloud and the file’s reputation is deemed to be malicious?
it is stored in the cloud and reported to AMP connectors that see the same file.
What happens if an AMP connector uploads a sample file to AMP Cloud and the file’s reputation is deemed to be unknown?
The file is sent to Threat Grid, where its behavior is analyzed in a secure sandbox environment.
How does AMP go beyond point-in-time detection?
AMP Cloud performs decision making in real time, evolving constantly based on the data that is received. AMP Cloud is capable of identifying malware on files that were previously deemed to be clean.
How do AMP connectors remain lightweight?
By sending a hash to the cloud and allowing the cloud to make the intelligent decisions and return a verdict (about reputation or file disposition) of clean, malicious, or unknown.
What is Cisco AnyConnect Secure Mobility Client?
- It is a modular endpoint software product
- VPN client using Transport Layer Security (TLS)/ Secure Sockets Layer (SSL) and IPsec IKEv2
- Enhanced security through various built-in modules, such as a VPN Posture (HostScan) module and an ISE Posture module.
What do the modules do in AnyConnect?
They enable Cisco AnyConnect to assess an endpoint’s compliance for things like antivirus, antispyware, and firewall software installed on the host.
What does AnyConnect do if an endpoint is found not to be compliant?
Network access can be restricted until the endpoint is in compliance.
Along with the modules what other capabilities does AnyConnect have?
- Web security through Cisco Cloud Web Security
- Network visibility into endpoint flows within Stealthwatch
- Roaming protection with Cisco Umbrella
What platforms does AnyConnect support?
- Windows
- macOS
- iOS
- Linux
- Android
- Windows Phone/ Mobile
- BlackBerry * ChromeOS.
What is SSL/TLS?
SSL has been deprecated so it really means TLS
What does Cisco Umbrella do?
Cisco Umbrella provides the first line of defense against threats on the Internet by blocking requests to malicious Internet destinations (domains, IPs, URLs) using the Domain Name System (DNS) before an IP connection is established or a file is downloaded.
How is Cisco Umbrella delivered?
It is 100% cloud delivered, with no hardware to install or software to maintain.
Where is Cisco Umbrella located?
30 data centers around the world
How does Cisco Umbrella maintain 100% uptime?
It uses Anycast DNS
How is DNS traffic routed to the closest Cisco Umbrella site?
It has an Anycast Infrastructure
What does Cisco Umbrella do with the data it gathers?
It is fed in real time into Umbrella’s massive graph database, where statistical and machine learning models are continuously run against it. * It’s also analyzed by Umbrella researchers and TALOS.
How is Cisco Umbrella installed?
By the corporate network changing the DHCP configuration on all Internet gateways (that is, routers, access points) so that all devices, including guest devices, forward their DNS traffic to Umbrella’s global network.
How can a laptop off the network use Umbrella?
In the Cisco AnyConnect client, there is an option to enable a roaming security module, which allows for all DNS requests to be sent to Umbrella’s global network even when the VPN is turned off, and it does this without requiring an additional agent.
If a laptop is not using AnyConnect can it still access Umbrella?
The other option is to deploy the Umbrella roaming client, which tags, encrypts, and forwards DNS queries bound for the Internet to the Umbrella global network so per-device security policies can be enforced everywhere without latency or complexity.
What is Cisco’s Web Security Appliance?
(WSA) is an all-in-one web gateway that includes a wide variety of protections that can block hidden malware from both suspicious and legitimate websites by leveraging real-time threat intelligence from Cisco Talos and Cisco AMP Threat Grid
What does WSA do Before an attack?
It actively detects and blocks potential threats before they happen by applying web reputation filters and URL filtering and by controlling web application usage
What are 3 tools used by WSA Before an attack?
- Web reputation filters (TALOS)
- Web Filtering (traditional, also from TALOS)
- Cisco Application Visibility and Control (AVC)
What does WSA do During an attack?
It uses security intelligence from cloud access security broker (CASB) providers, Talos, and AMP for networks to identify and block zero-day threats that managed to infiltrate the network.
What are 5 tools used by WSA during an attack?
- Cloud access security
- Parallel antivirus (AV) scanning
- Layer 4 traffic monitoring
- File reputation and analysis with Cisco AMP
- Data loss prevention (DLP)
What does WSA do After an attack?
WSA inspects the network continuously for instances of undetected malware and breaches.
What 3 tools does WSA use after an attack and what does it do with the information gathered using those tools?
- Global Threat Analytics (GTA) analyzes web traffic
- Endpoint data from Cisco AMP for Endpoints
- Network data from Cisco Stealthwatch Enterprise.
- It then uses machine learning to identify malicious activity before it can exfiltrate sensitive data.
How is WSA deployed?
- Cloud
- Virtual appliance on-premises, or in a hybrid arrangement.
What is the Cisco Email Security Appliance (ESA)?
It enables users to communicate securely via email and helps organizations combat email security threats with a multilayered approach across the attack continuum.
What threat protection capabilities are used by ESA?
- Global threat intelligence (TALOS and Threat Grid)
- Reputation filtering (TALOS)
- Spam protection
- Forged email detection
- Cisco Advanced Phishing Protection (CAPP)
- Cisco Domain Protection (CDP)
- Malware defense
- Graymail detection and Safe Unsubscribe
- URL-related protection and control
- Outbreak filters
- Web interaction tracking
- Data security for sensitive content in outgoing emails
What is the Cisco Firepower Next Generation Intrusion Prevention System (NGIPS)?
It is a system that provides IDS functions and also automatically blocks intrusion attacks.
What are some of the capabilities included with Firepower?
- Real-time contextual awareness
- Advanced threat protection and remediation
- Intelligent security automation
- Unparalleled performance and scalability
- Application Visibility and Control (AVC)
- URL filtering
- Centralized management
- Global threat intelligence from the Cisco Talos
- Snort IPS detection engine
- High availability and clustering
- Third-party and open-source ecosystem
- Integration with Cisco ISE (Quarantine, Unquarantine, Shutdown)