SlideShare a Scribd company logo
SCAP for Inter-networking devices




                 Luis Nuñez
                 7th Annual IT Security Automation
                 Conference 2011
SCAP for Inter-networking devices
 Survey on SCAP for inter-networking devices such as routers and
 switches. The critical infrastructure and enterprise networks today are
 built on routers and switches to transport communications to endpoints
 and beyond. SCAP expansion into discovering and interrogating inter-
 networking devices fits into this continuous monitoring paradigm. The
 presentation will cover traditional SCAP methods used to probe devices
 and will discuss other methods. The presentation will also will explore
 current and future SCAP capabilities for inter-networking devices.




                                   www.apexassurance.com      © 2011 Apex Assurance Group
Apex Assurance Group


  – Product Security Assurance

  – FIPS-140

  – Common Criteria

  – DoD Information Assurance (IA)

  – Security Technical Implementation Guide (STIG)

  – Security Content Automation Protocol (SCAP)




                                     www.apexassurance.com   © 2011 Apex Assurance Group
SCAP




                      Servers
Endpoints




                                                           Inter-Networking Devices
            Windows             Windows                                               Cisco
            Linux               Linux                                                 IOS
                                                                                      Juniper
                                                                                      JunOS

                                   www.apexassurance.com                                  © 2011 Apex Assurance Group
Endpoints




            www.apexassurance.com   © 2011 Apex Assurance Group
The Network Infrastructure




                             www.apexassurance.com   © 2011 Apex Assurance Group
Differences: endpoints and Inter-Networking devices

 Data flows through and transits Inter-networking devices.
 Router/Switch config usually static.
 Inter-networking devices
    – Intermediary/transit devices

    – The network is the information highway for the endpoints




                                         www.apexassurance.com   © 2011 Apex Assurance Group
Why SCAP for inter-networking devices
 Anyone can write scripts to check the system?
    – RAT Perl script

    – TCL
 DISA STIG/XCCDF
 Leverage existing standards for consistent authoritative results




                                      www.apexassurance.com      © 2011 Apex Assurance Group
2 SCAP use cases


 Configuration Hygiene
    – Security Best practices (STIG)

    – Cisco IOS Check-list

    – Juniper JUNOS Check-list
 Vulnerability Check
    – IOS OVAL content




                                       www.apexassurance.com   © 2011 Apex Assurance Group
Cisco IOS OVAL content




                         www.apexassurance.com   © 2011 Apex Assurance Group
JunOS Network Time Protocol (NTP) hardening

  CCE example related to STIG


 system {                        CCI/STIG NET0813
    ntp {
  CCEauthentication-key [key-id] type md5 value "[pass-phrase]";
       trusted-key [key-id];
       /* Allow NTP to sync if server clock is significantly different than local clock
  CCE
 */
       boot-server 192.0.2.1;
       /* NTP server to sync to */
 CCE server 192.0.2.1;
       server 192.0.2.2 key [key-id] prefer;
      }
 }

   *Sample from team cymru
                                           www.apexassurance.com           © 2011 Apex Assurance Group
Cisco IOS Network Time Protocol hardening

  CCE example related to STIG

                         CCI/STIG
                         NET0813


              !enable NTP authentication
   CCE        ntp authenticate
              ntp authentication-key [key-id] md5 [hash]
   CCE        ntp trusted-key [key-id]
              ntp peer [peer_address] key [key-id]
   CCE        ntp server [server_address] key [key-id]




   *Sample from team cymru
                                     www.apexassurance.com   © 2011 Apex Assurance Group
Device access methods
 SSH
 NETCONF
 SNMP
 RESTful




                        www.apexassurance.com   © 2011 Apex Assurance Group
Direct connect Methods


                 SSH connection


                                                     Config
   SCAP App

                  NETCONF connection



   SCAP App                                        Config




                           www.apexassurance.com   © 2011 Apex Assurance Group
NETCONF


   RFC 6241 Network Configuration Protocol
   “The Network Configuration Protocol (NETCONF) defined in this
  document provides mechanisms to install, manipulate, and delete
  the configuration of network devices. It uses an Extensible Markup
  Language (XML)-based data encoding for the configuration data as
  well as the protocol messages. The NETCONF protocol operations
  are realized as remote procedure calls (RPCs).”
  http://tools.ietf.org/html/rfc6241




                                       www.apexassurance.com   © 2011 Apex Assurance Group
Leverage existing network management tools
 RESTFul HTTP based
 JunOS Spaces
 SNMP
                                                             confi
                                                               g



                   RESTful connection
                                                                           confi
                                                                             g




                                                         confi
                                                           g

SCAP App


                                 www.apexassurance.com           © 2011 Apex Assurance Group
 Online and offline OVAL analysis
 online direct connection and probe of the device
 offline parsing of system config and state information
 Leveraging existing network management systems for system
  information
 On box agents
    – Cisco IOS TLC parser

    – Cisco Embedded Event Manager (EEM)




                                      www.apexassurance.com   © 2011 Apex Assurance Group
Challenges


 Content contribution
 Vendor participation
 Network device role
    – Edge Router/Filter Router/L3/L2/Purpose device (Voice GW)
 Virtualization
 IOS CPE
 OVAL test content for Inter-networking devices




                                      www.apexassurance.com       © 2011 Apex Assurance Group
Future
 EMAP - Events of interests from a network perspective
 Trusted Computing Group –Trusted Network Connect and SCAP
 TMSAD Trust Model for Security Automation Data
    – http://csrc.nist.gov/publications/nistir/ir7802/NISTIR-7802.pdf
 SCAP for NIAP Common Criteria Protection Profile




                                          www.apexassurance.com         © 2011 Apex Assurance Group
Luis Nuñez
     lnunez@apexassurance.com
        lnunez@c3isecurity.com




      www.apexassurance.com
20             www.apexassurance.com   © 2011 Apex Assurance Group
Cisco IOS Tips
 “show running-config” – outputs the current running configuration (in
  memory)
 “show startup-config” – outputs the last saved configuration
 “show running-config all” – outputs all configuration include some
  defaults
 “show tech-support” – outputs vital statics
 “show version”




                                      www.apexassurance.com      © 2011 Apex Assurance Group
Cisco IOS show version
splinter1#show version
Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 15.0(1)M4, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2010 by Cisco Systems, Inc.
Compiled Thu 28-Oct-10 17:09 by prod_rel_team


ROM: System Bootstrap, Version 12.3(8r)T7, RELEASE SOFTWARE (fc1)


splinter1 uptime is 12 weeks, 6 days, 3 hours, 13 minutes
System returned to ROM by power-on
System image file is "flash:c2800nm-adventerprisek9-mz.150-1.M4"
Last reload type: Normal Reload


Cisco 2851 (revision 53.51) with 509952K/14336K bytes of memory.
Processor board ID FTX0925A1BF
2 Gigabit Ethernet interfaces
1 Virtual Private Network (VPN) Module
DRAM configuration is 64 bits wide with parity enabled.
239K bytes of non-volatile configuration memory.
62720K bytes of ATA CompactFlash (Read/Write)


License Info:


License UDI:


-------------------------------------------------
Device#         PID            SN
-------------------------------------------------
*0       CISCO2851               FTX0925A1BF


Configuration register is 0x2102



                                                                              www.apexassurance.com        © 2011 Apex Assurance Group
Last IOS configuration change
Router# show run
Building configuration...
!
! Last configuration change at 20:40:41 GMT Nov 2 2011 by lnunez
!
Version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname router
!
boot-startmarker
boot-end-marker
!
no aaa new-model




                                                           www.apexassurance.com   © 2011 Apex Assurance Group
Cisco ASA Firewall “fips enable” command


Copyright (c) 1996-2005 by Cisco Systems, Inc.
Restricted Rights Legend


Use, duplication, or disclosure by the Government is subject to restrictions as set forth
in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR
sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.


               Cisco Systems, Inc.
               170 West Tasman Drive
               San Jose, California 95134-1706


....
Cryptochecksum (unchanged): 6c6d2f77 ef13898e 682c9f94 9c2d5ba9


INFO: FIPS Power-On Self-Test in process. Estimate completion in 90 seconds.
......................................................
INFO: FIPS Power-On Self-Test complete.
Type help or '?' for a list of available commands.
sw8-5520>


                                                                     www.apexassurance.com   © 2011 Apex Assurance Group
Cisco IOS versions (Trains)




                          www.apexassurance.com   © 2011 Apex Assurance Group
Juniper JUNOS SCAP
 junos-definitions-schema.xsd
 junos-system-characteristics-schema.xsd




                                   www.apexassurance.com   © 2011 Apex Assurance Group

More Related Content

What's hot

UCS Automation through the use of API's and UCS PowerTool
UCS Automation through the use of API's and UCS PowerToolUCS Automation through the use of API's and UCS PowerTool
UCS Automation through the use of API's and UCS PowerTool
Cisco Canada
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure Mobility
Cisco Canada
 
What you can do with cisco avb
What you can do with cisco avbWhat you can do with cisco avb
What you can do with cisco avb
IT Tech
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
solarisyougood
 
Cisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliancesCisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliances
IT Tech
 
The latest isr 4000 model comparison
The latest isr 4000 model comparisonThe latest isr 4000 model comparison
The latest isr 4000 model comparison
IT Tech
 
Sem cis collab
Sem cis collabSem cis collab
Sem cis collab
Lino Quivén
 
Cisco one advanced security
Cisco one advanced securityCisco one advanced security
Cisco one advanced security
IT Tech
 
Sba dc netapp_dg (1)
Sba dc netapp_dg (1)Sba dc netapp_dg (1)
Sba dc netapp_dg (1)purushotham m
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Cisco spa303 administration guide
Cisco spa303   administration guideCisco spa303   administration guide
Cisco spa303 administration guide
kaka010
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
Cisco Canada
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball Networks
 
Presentation cisco plus tech datacenter virtualisering
Presentation   cisco plus tech datacenter virtualiseringPresentation   cisco plus tech datacenter virtualisering
Presentation cisco plus tech datacenter virtualisering
xKinAnx
 
Cisco_data_center_solution_for_HondaTH
Cisco_data_center_solution_for_HondaTHCisco_data_center_solution_for_HondaTH
Cisco_data_center_solution_for_HondaTH
Predee Kajonpai
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guide
IT Tech
 
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...Cisco Russia
 

What's hot (20)

UCS Automation through the use of API's and UCS PowerTool
UCS Automation through the use of API's and UCS PowerToolUCS Automation through the use of API's and UCS PowerTool
UCS Automation through the use of API's and UCS PowerTool
 
AnyConnect Secure Mobility
AnyConnect Secure MobilityAnyConnect Secure Mobility
AnyConnect Secure Mobility
 
What you can do with cisco avb
What you can do with cisco avbWhat you can do with cisco avb
What you can do with cisco avb
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 
Vpn
VpnVpn
Vpn
 
Cisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliancesCisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliances
 
The latest isr 4000 model comparison
The latest isr 4000 model comparisonThe latest isr 4000 model comparison
The latest isr 4000 model comparison
 
Sem cis collab
Sem cis collabSem cis collab
Sem cis collab
 
Cisco one advanced security
Cisco one advanced securityCisco one advanced security
Cisco one advanced security
 
Sba dc netapp_dg (1)
Sba dc netapp_dg (1)Sba dc netapp_dg (1)
Sba dc netapp_dg (1)
 
Ccna security
Ccna securityCcna security
Ccna security
 
Cisco spa303 administration guide
Cisco spa303   administration guideCisco spa303   administration guide
Cisco spa303 administration guide
 
AhmetCemilKaratas
AhmetCemilKaratasAhmetCemilKaratas
AhmetCemilKaratas
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration Guide
 
Presentation cisco plus tech datacenter virtualisering
Presentation   cisco plus tech datacenter virtualiseringPresentation   cisco plus tech datacenter virtualisering
Presentation cisco plus tech datacenter virtualisering
 
Cisco_data_center_solution_for_HondaTH
Cisco_data_center_solution_for_HondaTHCisco_data_center_solution_for_HondaTH
Cisco_data_center_solution_for_HondaTH
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guide
 
Cisco AP 1200 Series
Cisco AP 1200 SeriesCisco AP 1200 Series
Cisco AP 1200 Series
 
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
Решения Cisco для Автоматизации Облачных Услуг - Cisco Intelligent Automation...
 

Viewers also liked

Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
Siddique Ibrahim
 
Networking devices
Networking devicesNetworking devices
Networking devices
frestoadi
 
Networking devices
Networking  devices Networking  devices
Networking devices
Aswini Badatya
 
Networking devices
Networking devicesNetworking devices
Networking devices
Mubassir Ambekar
 
Networking devices
Networking devicesNetworking devices
Networking devices
Ramola Dhande
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 

Viewers also liked (6)

Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking devices
Networking  devices Networking  devices
Networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

Similar to ITSAC 2011 SCAP for Inter-networking Devices

SCAP and NETCONF
SCAP and NETCONFSCAP and NETCONF
SCAP and NETCONF
c3i
 
SDN in the Enterprise
SDN in the EnterpriseSDN in the Enterprise
SDN in the Enterprise
Cisco Canada
 
PLNOG 8: Gaweł Mikołajczyk - Securing the Cloud Infrastructure - from Hyperv...
PLNOG 8: Gaweł Mikołajczyk - Securing the Cloud Infrastructure -  from Hyperv...PLNOG 8: Gaweł Mikołajczyk - Securing the Cloud Infrastructure -  from Hyperv...
PLNOG 8: Gaweł Mikołajczyk - Securing the Cloud Infrastructure - from Hyperv...
PROIDEA
 
Oval Internetworking Devices
Oval Internetworking DevicesOval Internetworking Devices
Oval Internetworking Devices
c3i
 
Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
IT Tech
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Cisco Mobility
 
Router Defense - BRUcon 2010
Router Defense - BRUcon 2010Router Defense - BRUcon 2010
Router Defense - BRUcon 2010
fropert
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
Cisco Canada
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
InnoTech
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
Chaing Ravuth
 
Eng.Abd Elrhman.pdf
Eng.Abd Elrhman.pdfEng.Abd Elrhman.pdf
Eng.Abd Elrhman.pdfINOGHOST
 
M2M関連状況 roll&core WG meeting in IETF86
M2M関連状況 roll&core WG meeting in IETF86M2M関連状況 roll&core WG meeting in IETF86
M2M関連状況 roll&core WG meeting in IETF86
Shoichi Sakane
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
Intel
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
NetworkCollaborators
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XR
Cisco Canada
 
Cisco at v mworld 2015 theater presentation brfarnha
Cisco at v mworld 2015 theater presentation brfarnhaCisco at v mworld 2015 theater presentation brfarnha
Cisco at v mworld 2015 theater presentation brfarnha
ldangelo0772
 
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
Cisco DevNet
 
Presentation cisco nexus enabling the cloud infrastructure
Presentation   cisco nexus enabling the cloud infrastructurePresentation   cisco nexus enabling the cloud infrastructure
Presentation cisco nexus enabling the cloud infrastructure
xKinAnx
 
Nfd18 anuta-networks
Nfd18 anuta-networksNfd18 anuta-networks
Nfd18 anuta-networks
Kiran Sirupa
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
Robb Boyd
 

Similar to ITSAC 2011 SCAP for Inter-networking Devices (20)

SCAP and NETCONF
SCAP and NETCONFSCAP and NETCONF
SCAP and NETCONF
 
SDN in the Enterprise
SDN in the EnterpriseSDN in the Enterprise
SDN in the Enterprise
 
PLNOG 8: Gaweł Mikołajczyk - Securing the Cloud Infrastructure - from Hyperv...
PLNOG 8: Gaweł Mikołajczyk - Securing the Cloud Infrastructure -  from Hyperv...PLNOG 8: Gaweł Mikołajczyk - Securing the Cloud Infrastructure -  from Hyperv...
PLNOG 8: Gaweł Mikołajczyk - Securing the Cloud Infrastructure - from Hyperv...
 
Oval Internetworking Devices
Oval Internetworking DevicesOval Internetworking Devices
Oval Internetworking Devices
 
Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
 
Router Defense - BRUcon 2010
Router Defense - BRUcon 2010Router Defense - BRUcon 2010
Router Defense - BRUcon 2010
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1CCNA3 Verson6 Chapter1
CCNA3 Verson6 Chapter1
 
Eng.Abd Elrhman.pdf
Eng.Abd Elrhman.pdfEng.Abd Elrhman.pdf
Eng.Abd Elrhman.pdf
 
M2M関連状況 roll&core WG meeting in IETF86
M2M関連状況 roll&core WG meeting in IETF86M2M関連状況 roll&core WG meeting in IETF86
M2M関連状況 roll&core WG meeting in IETF86
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XR
 
Cisco at v mworld 2015 theater presentation brfarnha
Cisco at v mworld 2015 theater presentation brfarnhaCisco at v mworld 2015 theater presentation brfarnha
Cisco at v mworld 2015 theater presentation brfarnha
 
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
 
Presentation cisco nexus enabling the cloud infrastructure
Presentation   cisco nexus enabling the cloud infrastructurePresentation   cisco nexus enabling the cloud infrastructure
Presentation cisco nexus enabling the cloud infrastructure
 
Nfd18 anuta-networks
Nfd18 anuta-networksNfd18 anuta-networks
Nfd18 anuta-networks
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

ITSAC 2011 SCAP for Inter-networking Devices

  • 1. SCAP for Inter-networking devices Luis Nuñez 7th Annual IT Security Automation Conference 2011
  • 2. SCAP for Inter-networking devices Survey on SCAP for inter-networking devices such as routers and switches. The critical infrastructure and enterprise networks today are built on routers and switches to transport communications to endpoints and beyond. SCAP expansion into discovering and interrogating inter- networking devices fits into this continuous monitoring paradigm. The presentation will cover traditional SCAP methods used to probe devices and will discuss other methods. The presentation will also will explore current and future SCAP capabilities for inter-networking devices. www.apexassurance.com © 2011 Apex Assurance Group
  • 3. Apex Assurance Group – Product Security Assurance – FIPS-140 – Common Criteria – DoD Information Assurance (IA) – Security Technical Implementation Guide (STIG) – Security Content Automation Protocol (SCAP) www.apexassurance.com © 2011 Apex Assurance Group
  • 4. SCAP Servers Endpoints Inter-Networking Devices Windows Windows Cisco Linux Linux IOS Juniper JunOS www.apexassurance.com © 2011 Apex Assurance Group
  • 5. Endpoints www.apexassurance.com © 2011 Apex Assurance Group
  • 6. The Network Infrastructure www.apexassurance.com © 2011 Apex Assurance Group
  • 7. Differences: endpoints and Inter-Networking devices  Data flows through and transits Inter-networking devices.  Router/Switch config usually static.  Inter-networking devices – Intermediary/transit devices – The network is the information highway for the endpoints www.apexassurance.com © 2011 Apex Assurance Group
  • 8. Why SCAP for inter-networking devices  Anyone can write scripts to check the system? – RAT Perl script – TCL  DISA STIG/XCCDF  Leverage existing standards for consistent authoritative results www.apexassurance.com © 2011 Apex Assurance Group
  • 9. 2 SCAP use cases  Configuration Hygiene – Security Best practices (STIG) – Cisco IOS Check-list – Juniper JUNOS Check-list  Vulnerability Check – IOS OVAL content www.apexassurance.com © 2011 Apex Assurance Group
  • 10. Cisco IOS OVAL content www.apexassurance.com © 2011 Apex Assurance Group
  • 11. JunOS Network Time Protocol (NTP) hardening  CCE example related to STIG system { CCI/STIG NET0813 ntp { CCEauthentication-key [key-id] type md5 value "[pass-phrase]"; trusted-key [key-id]; /* Allow NTP to sync if server clock is significantly different than local clock CCE */ boot-server 192.0.2.1; /* NTP server to sync to */ CCE server 192.0.2.1; server 192.0.2.2 key [key-id] prefer; } } *Sample from team cymru www.apexassurance.com © 2011 Apex Assurance Group
  • 12. Cisco IOS Network Time Protocol hardening  CCE example related to STIG CCI/STIG NET0813 !enable NTP authentication CCE ntp authenticate ntp authentication-key [key-id] md5 [hash] CCE ntp trusted-key [key-id] ntp peer [peer_address] key [key-id] CCE ntp server [server_address] key [key-id] *Sample from team cymru www.apexassurance.com © 2011 Apex Assurance Group
  • 13. Device access methods  SSH  NETCONF  SNMP  RESTful www.apexassurance.com © 2011 Apex Assurance Group
  • 14. Direct connect Methods SSH connection Config SCAP App NETCONF connection SCAP App Config www.apexassurance.com © 2011 Apex Assurance Group
  • 15. NETCONF  RFC 6241 Network Configuration Protocol “The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs).” http://tools.ietf.org/html/rfc6241 www.apexassurance.com © 2011 Apex Assurance Group
  • 16. Leverage existing network management tools  RESTFul HTTP based  JunOS Spaces  SNMP confi g RESTful connection confi g confi g SCAP App www.apexassurance.com © 2011 Apex Assurance Group
  • 17.  Online and offline OVAL analysis  online direct connection and probe of the device  offline parsing of system config and state information  Leveraging existing network management systems for system information  On box agents – Cisco IOS TLC parser – Cisco Embedded Event Manager (EEM) www.apexassurance.com © 2011 Apex Assurance Group
  • 18. Challenges  Content contribution  Vendor participation  Network device role – Edge Router/Filter Router/L3/L2/Purpose device (Voice GW)  Virtualization  IOS CPE  OVAL test content for Inter-networking devices www.apexassurance.com © 2011 Apex Assurance Group
  • 19. Future  EMAP - Events of interests from a network perspective  Trusted Computing Group –Trusted Network Connect and SCAP  TMSAD Trust Model for Security Automation Data – http://csrc.nist.gov/publications/nistir/ir7802/NISTIR-7802.pdf  SCAP for NIAP Common Criteria Protection Profile www.apexassurance.com © 2011 Apex Assurance Group
  • 20. Luis Nuñez lnunez@apexassurance.com lnunez@c3isecurity.com www.apexassurance.com 20 www.apexassurance.com © 2011 Apex Assurance Group
  • 21. Cisco IOS Tips  “show running-config” – outputs the current running configuration (in memory)  “show startup-config” – outputs the last saved configuration  “show running-config all” – outputs all configuration include some defaults  “show tech-support” – outputs vital statics  “show version” www.apexassurance.com © 2011 Apex Assurance Group
  • 22. Cisco IOS show version splinter1#show version Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 15.0(1)M4, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2010 by Cisco Systems, Inc. Compiled Thu 28-Oct-10 17:09 by prod_rel_team ROM: System Bootstrap, Version 12.3(8r)T7, RELEASE SOFTWARE (fc1) splinter1 uptime is 12 weeks, 6 days, 3 hours, 13 minutes System returned to ROM by power-on System image file is "flash:c2800nm-adventerprisek9-mz.150-1.M4" Last reload type: Normal Reload Cisco 2851 (revision 53.51) with 509952K/14336K bytes of memory. Processor board ID FTX0925A1BF 2 Gigabit Ethernet interfaces 1 Virtual Private Network (VPN) Module DRAM configuration is 64 bits wide with parity enabled. 239K bytes of non-volatile configuration memory. 62720K bytes of ATA CompactFlash (Read/Write) License Info: License UDI: ------------------------------------------------- Device# PID SN ------------------------------------------------- *0 CISCO2851 FTX0925A1BF Configuration register is 0x2102 www.apexassurance.com © 2011 Apex Assurance Group
  • 23. Last IOS configuration change Router# show run Building configuration... ! ! Last configuration change at 20:40:41 GMT Nov 2 2011 by lnunez ! Version 15.1 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname router ! boot-startmarker boot-end-marker ! no aaa new-model www.apexassurance.com © 2011 Apex Assurance Group
  • 24. Cisco ASA Firewall “fips enable” command Copyright (c) 1996-2005 by Cisco Systems, Inc. Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 .... Cryptochecksum (unchanged): 6c6d2f77 ef13898e 682c9f94 9c2d5ba9 INFO: FIPS Power-On Self-Test in process. Estimate completion in 90 seconds. ...................................................... INFO: FIPS Power-On Self-Test complete. Type help or '?' for a list of available commands. sw8-5520> www.apexassurance.com © 2011 Apex Assurance Group
  • 25. Cisco IOS versions (Trains) www.apexassurance.com © 2011 Apex Assurance Group
  • 26. Juniper JUNOS SCAP  junos-definitions-schema.xsd  junos-system-characteristics-schema.xsd www.apexassurance.com © 2011 Apex Assurance Group

Editor's Notes

  1. Endpoints – Workstations, Laptops, Tablets, Smart Phones and Servers
  2. Sample taken from http://www.team-cymru.org/ReadingRoom/Templates/secure-ntp-template.htmlSecurity Technical Implementation Guide (STIG)Control Correlation Identifier (CCI)
  3. Sample taken from http://www.team-cymru.org/ReadingRoom/Templates/secure-ntp-template.html
  4. http://tools.ietf.org/html/rfc6241
  5. http://www.juniper.net/us/en/products-services/software/junos-platform/junos-space/