spp cip-005 presentation

18
CIP-005-3a Electronic Security Perimeters A Primer in ESP Identification Brent Johnson, CISSP, CISA Project Consultant GDS Associates, Inc.

Upload: alexhobbsgds

Post on 27-Nov-2014

119 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: SPP CIP-005 Presentation

CIP-005-3a

Electronic Security Perimeters

A Primer in ESP Identification

Brent Johnson, CISSP, CISA

Project Consultant

GDS Associates, Inc.

Page 2: SPP CIP-005 Presentation

CIP-005: Electronic Security Perimeters

• 5 Requirements

• This presentation

deals specifically with

Identification of ESPs

Identify

Control

Monitor

Assess Vulnerabilities

Maintain Documentation

Page 3: SPP CIP-005 Presentation

Importance of ESP Documentation

• Documentation is the blueprint to network

security

– Visually shows how CCAs are electronically

protected

– Forces entities to confirm their electronic security

strategy

– Serves as a guide for auditors

Page 4: SPP CIP-005 Presentation

What is an ESP?

• Electronic Security Perimeter

• The logical border around a network

– All CCAs must be protected by an ESP

– Access is Controlled

Page 5: SPP CIP-005 Presentation

How is Access Controlled?

• Access Points

– The device that discriminates between authorized

and unauthorized traffic in and out of ESPs

– This may not always be the outermost device on

the network!

Page 7: SPP CIP-005 Presentation

Access Points

• A device accessible from outside the ESP* Unless this access is controlled by another device in the ESP

Device Accessible from Outside

• Anything serving as an endpoint of a tunnel where the other endpoint is outside the ESP

• This applies even when the other endpoint is in a different ESP

VPNs and Tunnels

• Externally connected dial-up devices

Dial-Up

Page 8: SPP CIP-005 Presentation

Access Points: Accessible from Outside

• Alice needs to access the File Server

– She has a username, password and network token

• The Firewall forwards all traffic on the VPN Server

port number without considering its origin

• The VPN Server is responsible for authenticating

users

Where is the access point?

Page 9: SPP CIP-005 Presentation

Access Points: VPNs

• Alice needs to check on Workstations A, B and C

• Once she authenticates with the VPN, she has a

secure tunnel to the ESP Firewall

• The ESP firewall only allows traffic in from the

VPN server, which is already authenticated

Page 10: SPP CIP-005 Presentation

Access Points: Modems

• The corporate internet connection goes down and

Alice needs to remotely access the protected

network

• Alice uses a cell phone modem to connect to the

dial-up server which then authenticates her

Page 11: SPP CIP-005 Presentation

Links Between ESPs

• Communication networks connecting discrete

ESPs together are not considered part of the ESP

– Equipment outside of ESP access points is out of

scope

Page 12: SPP CIP-005 Presentation

Links Between ESPs

• It is possible to create one logical ESP even if it is

broken into multiple physical locations

Page 13: SPP CIP-005 Presentation

Access Control & Monitoring Equipment

Logging

• Centralized Logging Servers

Intrusion Detection

• SIEM

• IDS/IPS

• Pattern Recognition

• Incident Response

Authentication

• Active Directory

• LDAP

• Kerberos

Functions of ACM Equipment

Page 14: SPP CIP-005 Presentation

Protecting ACM Equipment

Information

InformationProtection Plan

MonitoringElectronic Access

Security Status Monitoring

Disposal and Redeployment

Systems Security Management

Documentation Review

Physical Security

Personnel Risk Assessment

Electronic Access Control Systems (PSP)

Secure Configuration

Change Controland Configuration

Management

ElectronicAccess Controls

SecurityControls Testing

Account Management

Evolving Threat Response

Security Patch Management

Malicious Software Prevention

Cyber Vulnerability Assessment

Response and Recovery

Incident Reporting & Response Management

Recovery Plans

003

005

007

007

007

004

006

003

005

007

007

007

007

007

008

009

Page 15: SPP CIP-005 Presentation

Documenting an ESP: Components

• Good ESP documentation successfully identifies:

– Critical Cyber Assets

– Access Points

– Access Control and Monitoring Equipment

– All other assets inside the ESP

Page 16: SPP CIP-005 Presentation

Documenting an ESP

• Accuracy is imperative!

• Develop documentation based on known

configuration and confirm topology with:

– Network discovery of assets

• Nmap

– Physical Cable Inspection

• Documentation must contain all cyber assets

inside, regardless of Criticality

Page 17: SPP CIP-005 Presentation

Common Pitfalls in Documenting ESPs

• Not everything is included

• Redundant cabling/port connections are not

documented

• Failure to consider Access Points possibly behind

the outermost device

• Documentation not updated within 90 days of

changes made

Page 18: SPP CIP-005 Presentation

Questions

Available until 5/31 at:

http://bit.ly/GDS-CIP005

We have a blog too:

http://cip-gds.tumblr.com/