SlideShare a Scribd company logo
Securing your presence
at the perimeter
Ben Rothke, CISSP CISA
BT Global Services
Senior Security Consultant
About me….
•
•
•
•

Ben Rothke (too many certifications)
Senior Security Consultant – British Telecom
Frequent writer and speaker
Author - Computer Security: 20 Things Every Employee
Should Know

BT Americas Inc.

2
The perimeter is not necessarily dead
• Firewalls and border routers are still the cornerstone for
perimeter security
• Always will be a place for VPNs
• Attacks occur at the application layer
– So ensure app security

BT Professional Services

3
But the perimeter it is getting blurred…
• VPNs
• complicated network connections with multiple partners
– contractors, consultants
– 3rd party collaboration
– vendors

• wireless networks
• laptops
• malicious insiders
– worms (compromised computers can be seen as malicious
insiders)

BT Professional Services

4
Ok, the perimeter is dead, the cloud proves it

BT Professional Services

5
Perimeter challenges
•
•
•
•
•
•
•
•

Determining proper firewall design
access to resources for remote users
effective monitoring and reporting
need for enhanced packet inspection
security standards compliance
long-term maintenance
ensuring attackers don’t find that single vulnerability
data leakage

BT Professional Services

6
Was your perimeter designed in 30 minutes?

BT Professional Services

7
Key points
• Perimeter security is popular
– cheap, convenient, somewhat effective
– firewalls and IDS most common tools for network security

• Firewalls and IDS fighting an uphill battle
– both attackers and legitimate users struggle to avoid/evade
them

• Security management is a key challenge

BT Professional Services

8
Securing network perimeters
• Goal is to provide adequate access without
jeopardizing confidential or mission-critical areas
• Elements:
– firewalls, IDS, bastion host, Network Address Translation
(NAT), proxy servers
– combined with authentication mechanisms

• Bastion host
– provides Web, FTP, e-mail, or other services running on a
specially secured server

BT Professional Services

9
But the firewall is not a panacea
• Malicious traffic that is passed on open ports and not
inspected by the firewall
• any traffic that passes through an encrypted tunnel or
session
• attacks after a network has been penetrated
• traffic that appears legitimate
• users and administrators who intentionally or
accidentally install viruses
• administrators who use weak passwords

BT Professional Services

10
Policy is required to secure a perimeter
• Firewall policies typically lists of allow or deny rules
• what should the default rule be?
• Default allow:
– convenient since doesn’t interfere with legitimate activity

• Default deny:
– more secure, since every allowed use undergoes security
review
– if policy too restrictive, people complain and it gets fixed
– if policy too permissive, only learn about it too late after an
attack

BT Professional Services

11
Other policy issues
• Scale
– Large organizations have thousands of rules
– How do you process them efficiently?
– How do you know they are correct?

• Ingress vs. egress filtering
– Ingress: filter packets from the Internet
– Egress: filter traffic to the Internet (why?)

BT Professional Services

12
Operational weaknessess
• Technology
– firewall rules not adequately maintained
– system configurations and access not being monitored
– passwords

• Standards
–
–
–
–

unpatched software/firmware
no criteria for hiring outside auditors and IT pros
no consistent security assessments
production data being used for dev/QA apps

BT Professional Services

13
Start thinking about DLP
• Small data leaks lead to major damage
– a minor water leak…
– becomes major structural damage

BT Professional Services

14
There is a lot DLP can do
• Detect sensitive content in any combination of network
traffic, data at rest or endpoint operations
• Detect sensitive content using
– sophisticated content-aware detection techniques, including
partial/exact document matching, structured data fingerprinting,
statistical analysis, extended regular expression matching,
conceptual and lexicon analysis, and more

• Support detection of sensitive data content in structured
and unstructured data, using registered or described
data definitions
• Block email communication policy violations
BT Professional Services

15
Do you have authority over your data?
• DLP enables you to finally control your data:
–
–
–
–
–
–

Identify: know where your data resides
Monitor: what is happening, who did it, when
Warning: user alerted when moving sensitive data
Prevention: unauthorized actions are thwarted
Control: only approved devices can be used
Reporting: compliance reports (SoX, PCI, HIPAA / HITECH,
GLBA, Euro-SoX, and more)

BT Professional Services

16
Testing
• Publicly-accessible systems
– IP-hosts
– all web apps
– web services

• Web interfaces:
– routers
– firewalls
– email

• Wireless

BT Professional Services

17
Ask lots of questions and fill up whiteboards
1. What are we doing beyond vulnerability scans to find
security flaws?
2. Are we looking at all of our critical perimeter systems?
3. When are we going to get to everything else?
4. What are the results of our latest external security
assessment?
5. What’s being done to resolve these issues?
6. Even if nothing is turned up, when’s our next round of
testing scheduled for?
7. Have we started thinking about the data?
8. Should we consider DLP?
BT Professional Services

18
Use tools
• There are myriad tools, use them judiciously
–
–
–
–
–
–
–

QualysGuard
WebInspect
Acunetix WVS
CommView for WiFi
Web browsers
Google
other exploit tools

– Make sure your staff reads Security Strategy: From
Requirements to Reality
– http://amzn.to/fT2yG6
BT Professional Services

19
Creating and maintaining a strong perimeter
• Good design
• updated design
• built and designed by engineers
– with management oversight

• risk-based
• business needs understood
• maintained
– competent staff
– maintained at an adequate level

BT Professional Services

20
Contact info…

• www.linkedin.com/in/benrothke
• www.twitter.com/benrothke
• www.slideshare.net/benrothke

BT Professional Services

21

More Related Content

PPTX
Rothke rsa 2013 - deployment strategies for effective encryption
PPTX
Rothke rsa 2013 - the five habits of highly secure organizations
PPTX
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
PPTX
E5 rothke - deployment strategies for effective encryption
PDF
System of security controls
PPTX
It and-cyber-module-2
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PDF
A Case Study of the Capital One Data Breach
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
E5 rothke - deployment strategies for effective encryption
System of security controls
It and-cyber-module-2
Top 20 Security Controls for a More Secure Infrastructure
A Case Study of the Capital One Data Breach

What's hot (17)

PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
PPTX
A holistic approach to risk management 20210210 w acfe france & cyber rea...
PPTX
Architecting for Security Resilience
PPTX
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
PPSX
Next-Gen security operation center
DOCX
SEC440: Incident Response Plan
PDF
Comptia security sy0 601 domain 4 operation and incident response
PPTX
Security Operations Center
PPTX
An introduction to SOC (Security Operation Center)
PDF
From Business Architecture to Security Architecture
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PPTX
Cyber risks in supply chains
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Identifying Code Risks in Software M&A
PPTX
Rothke rsa 2012 building a security operations center (soc)
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Architecting for Security Resilience
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Next-Gen security operation center
SEC440: Incident Response Plan
Comptia security sy0 601 domain 4 operation and incident response
Security Operations Center
An introduction to SOC (Security Operation Center)
From Business Architecture to Security Architecture
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Cyber risks in supply chains
Dealing with Information Security, Risk Management & Cyber Resilience
Cybersecurity roadmap : Global healthcare security architecture
Identifying Code Risks in Software M&A
Rothke rsa 2012 building a security operations center (soc)
Ad

Viewers also liked (20)

PPT
1. security management practices
PPTX
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
PPTX
Risk Management and Security in Strategic Planning
PPTX
Purple Teaming - The Collaborative Future of Penetration Testing
PDF
Forum ICT Security 2016 - Regolamento EU 2016/679: le tecnologie a protezione...
PDF
Oss. Informaton Security & Privacy
PPT
Cyber risk e assicurazioni
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PPSX
AIS Lecture 1
PDF
Security Framework for Digital Risk Managment
PPTX
Metodology Risk Assessment ISMS
PPTX
Cissp- Security and Risk Management
PDF
Information security management system (isms) overview
PPTX
Iso27001 Audit Services
PPSX
CIS Audit Lecture # 1
PPTX
Why ISO-27001 is a better choice?
PPT
Rothke Patchlink
PPTX
Iso27001 Approach
PDF
Slide Deck CISSP Class Session 3
1. security management practices
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Risk Management and Security in Strategic Planning
Purple Teaming - The Collaborative Future of Penetration Testing
Forum ICT Security 2016 - Regolamento EU 2016/679: le tecnologie a protezione...
Oss. Informaton Security & Privacy
Cyber risk e assicurazioni
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
AIS Lecture 1
Security Framework for Digital Risk Managment
Metodology Risk Assessment ISMS
Cissp- Security and Risk Management
Information security management system (isms) overview
Iso27001 Audit Services
CIS Audit Lecture # 1
Why ISO-27001 is a better choice?
Rothke Patchlink
Iso27001 Approach
Slide Deck CISSP Class Session 3
Ad

Similar to Securing your presence at the perimeter (20)

PDF
Securing your presence at the perimeter
PDF
Locking down server and workstation operating systems
PPT
Information Security
PPTX
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
PPTX
Enterprise IT Security| CIO Innovation and Leadership
PPT
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PDF
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
PPTX
Check Point: Defining Your Security blueprint
PDF
Protect the data - Cyber security - Breaches - Brand/Reputation
PPTX
PaloAlto Ignite Conference 2015
PDF
Secure Mobility from GGR Communications
PDF
Barbed Wire Network Security Policy 27 June 2005 7
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Security Delivery Platform: Best practices
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
Securing your presence at the perimeter
Locking down server and workstation operating systems
Information Security
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Enterprise IT Security| CIO Innovation and Leadership
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Check Point: Defining Your Security blueprint
Protect the data - Cyber security - Breaches - Brand/Reputation
PaloAlto Ignite Conference 2015
Secure Mobility from GGR Communications
Barbed Wire Network Security Policy 27 June 2005 7
Today's Cyber Challenges: Methodology to Secure Your Business
Security Delivery Platform: Best practices
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs

More from Ben Rothke (20)

PDF
Mobile security blunders and what you can do about them
PDF
Lessons from ligatt from national cyber security nationalcybersecurity com
PDF
Lessons from ligatt
PDF
Interop 2011 las vegas - session se31 - rothke
PDF
Infosecurity Needs Its T.J. Hooper
PDF
Rothke effective data destruction practices
PDF
Rothke computer forensics show 2010
PDF
The Cloud is in the details webinar - Rothke
PDF
Webinar - Getting a handle on wireless security for PCI DSS Compliance
PDF
La nécessité de la dlp aujourd’hui un livre blanc clearswift
PDF
The Need for DLP now - A Clearswift White Paper
PDF
Rothke secure360 building a security operations center (soc)
PDF
Infotec 2010 Ben Rothke - social networks and information security
PDF
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
PDF
Rothke stimulating your career as an information security professional
PDF
Ben Rothke - Effective Data Destruction Practices
PDF
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
PDF
Virtualization, Cloud Computing And The Pci Dss
PDF
Ben Rothke RSA PK 2010
PDF
Rothke Using Kazaa To Test Your Security Posture
Mobile security blunders and what you can do about them
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt
Interop 2011 las vegas - session se31 - rothke
Infosecurity Needs Its T.J. Hooper
Rothke effective data destruction practices
Rothke computer forensics show 2010
The Cloud is in the details webinar - Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
La nécessité de la dlp aujourd’hui un livre blanc clearswift
The Need for DLP now - A Clearswift White Paper
Rothke secure360 building a security operations center (soc)
Infotec 2010 Ben Rothke - social networks and information security
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke stimulating your career as an information security professional
Ben Rothke - Effective Data Destruction Practices
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Virtualization, Cloud Computing And The Pci Dss
Ben Rothke RSA PK 2010
Rothke Using Kazaa To Test Your Security Posture

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
A Presentation on Artificial Intelligence
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
CIFDAQ's Market Insight: SEC Turns Pro Crypto
A Presentation on Artificial Intelligence
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf

Securing your presence at the perimeter

  • 1. Securing your presence at the perimeter Ben Rothke, CISSP CISA BT Global Services Senior Security Consultant
  • 2. About me…. • • • • Ben Rothke (too many certifications) Senior Security Consultant – British Telecom Frequent writer and speaker Author - Computer Security: 20 Things Every Employee Should Know BT Americas Inc. 2
  • 3. The perimeter is not necessarily dead • Firewalls and border routers are still the cornerstone for perimeter security • Always will be a place for VPNs • Attacks occur at the application layer – So ensure app security BT Professional Services 3
  • 4. But the perimeter it is getting blurred… • VPNs • complicated network connections with multiple partners – contractors, consultants – 3rd party collaboration – vendors • wireless networks • laptops • malicious insiders – worms (compromised computers can be seen as malicious insiders) BT Professional Services 4
  • 5. Ok, the perimeter is dead, the cloud proves it BT Professional Services 5
  • 6. Perimeter challenges • • • • • • • • Determining proper firewall design access to resources for remote users effective monitoring and reporting need for enhanced packet inspection security standards compliance long-term maintenance ensuring attackers don’t find that single vulnerability data leakage BT Professional Services 6
  • 7. Was your perimeter designed in 30 minutes? BT Professional Services 7
  • 8. Key points • Perimeter security is popular – cheap, convenient, somewhat effective – firewalls and IDS most common tools for network security • Firewalls and IDS fighting an uphill battle – both attackers and legitimate users struggle to avoid/evade them • Security management is a key challenge BT Professional Services 8
  • 9. Securing network perimeters • Goal is to provide adequate access without jeopardizing confidential or mission-critical areas • Elements: – firewalls, IDS, bastion host, Network Address Translation (NAT), proxy servers – combined with authentication mechanisms • Bastion host – provides Web, FTP, e-mail, or other services running on a specially secured server BT Professional Services 9
  • 10. But the firewall is not a panacea • Malicious traffic that is passed on open ports and not inspected by the firewall • any traffic that passes through an encrypted tunnel or session • attacks after a network has been penetrated • traffic that appears legitimate • users and administrators who intentionally or accidentally install viruses • administrators who use weak passwords BT Professional Services 10
  • 11. Policy is required to secure a perimeter • Firewall policies typically lists of allow or deny rules • what should the default rule be? • Default allow: – convenient since doesn’t interfere with legitimate activity • Default deny: – more secure, since every allowed use undergoes security review – if policy too restrictive, people complain and it gets fixed – if policy too permissive, only learn about it too late after an attack BT Professional Services 11
  • 12. Other policy issues • Scale – Large organizations have thousands of rules – How do you process them efficiently? – How do you know they are correct? • Ingress vs. egress filtering – Ingress: filter packets from the Internet – Egress: filter traffic to the Internet (why?) BT Professional Services 12
  • 13. Operational weaknessess • Technology – firewall rules not adequately maintained – system configurations and access not being monitored – passwords • Standards – – – – unpatched software/firmware no criteria for hiring outside auditors and IT pros no consistent security assessments production data being used for dev/QA apps BT Professional Services 13
  • 14. Start thinking about DLP • Small data leaks lead to major damage – a minor water leak… – becomes major structural damage BT Professional Services 14
  • 15. There is a lot DLP can do • Detect sensitive content in any combination of network traffic, data at rest or endpoint operations • Detect sensitive content using – sophisticated content-aware detection techniques, including partial/exact document matching, structured data fingerprinting, statistical analysis, extended regular expression matching, conceptual and lexicon analysis, and more • Support detection of sensitive data content in structured and unstructured data, using registered or described data definitions • Block email communication policy violations BT Professional Services 15
  • 16. Do you have authority over your data? • DLP enables you to finally control your data: – – – – – – Identify: know where your data resides Monitor: what is happening, who did it, when Warning: user alerted when moving sensitive data Prevention: unauthorized actions are thwarted Control: only approved devices can be used Reporting: compliance reports (SoX, PCI, HIPAA / HITECH, GLBA, Euro-SoX, and more) BT Professional Services 16
  • 17. Testing • Publicly-accessible systems – IP-hosts – all web apps – web services • Web interfaces: – routers – firewalls – email • Wireless BT Professional Services 17
  • 18. Ask lots of questions and fill up whiteboards 1. What are we doing beyond vulnerability scans to find security flaws? 2. Are we looking at all of our critical perimeter systems? 3. When are we going to get to everything else? 4. What are the results of our latest external security assessment? 5. What’s being done to resolve these issues? 6. Even if nothing is turned up, when’s our next round of testing scheduled for? 7. Have we started thinking about the data? 8. Should we consider DLP? BT Professional Services 18
  • 19. Use tools • There are myriad tools, use them judiciously – – – – – – – QualysGuard WebInspect Acunetix WVS CommView for WiFi Web browsers Google other exploit tools – Make sure your staff reads Security Strategy: From Requirements to Reality – http://amzn.to/fT2yG6 BT Professional Services 19
  • 20. Creating and maintaining a strong perimeter • Good design • updated design • built and designed by engineers – with management oversight • risk-based • business needs understood • maintained – competent staff – maintained at an adequate level BT Professional Services 20
  • 21. Contact info… • www.linkedin.com/in/benrothke • www.twitter.com/benrothke • www.slideshare.net/benrothke BT Professional Services 21