Brkaci 2110
Brkaci 2110
Brkaci 2110
Internal Blog
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Typical Network Security vs. Zero Trust
Start Here
Internal Blog
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Typical Network Security vs. Zero Trust
Start Here
Internal Blog
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Typical Network Security vs. Zero Trust
Start Here Start Here
Internal Blog
Internal Blog
Sensitive Data
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Typical Network Security vs. Zero Trust
Start Here Start Here
Internal Blog
Internal Blog
Sensitive Data
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Typical Network Security vs. Zero Trust
Start Here Start Here
Internal Blog
Internal Blog
Internal Blog
Sensitive Data
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Typical Network Security vs. Zero Trust
Start Here Start Here
Internal Blog
Don’t Let
Internal Blog Someone Else Party In
Internal Blog
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
The Best Way to Secure a Workload?
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
More Realistically?
• Australian Signals Directorate TOP4
• https://www.asd.gov.au/publications/protect/top_4_mitigations.htm
1. Application Whitelisting
2. Patching Systems
3. Restricting Administrative Privileges
4. Creating a Defense in Depth System
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Micro Segmenting in an Heterogeneous Data
Center
Campus
and Many different types of workloads running in a Data Center
Branch Users
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKACI-2110
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Challenges in Building a Secure Hybrid IT
Environment Without Compromising Agility?
Know your applications – Understand what can/should Create a single source of truth
what’s running, what’s critical, be deployed in public cloud vs. to avoid mistakes
Understand what workloads on premise
are running vulnerable
software
Minimize attack surface with Automate policy as workloads Define a compliance model to
fine grained segmentation and scale or move across track changes and policy
zero trust policy infrastructure violations
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
ACI: Simple, Consistent, Automated Networking
1
Point of management for all your Physical,
Virtual, Container-based and Cloud Networking
Spine Layer
Nexus 9000
Leaf Layer
Nexus 9000
WAN Legacy
Networks
(N5K/N7K)
L4-L7 Services
VM VM VM VM
ACI
The network made simple
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Tetration
Operations Advanced Security
Actions
White-list Application Policy
Policy Segmentation Compliance
Port, Server and Process Process Anomaly Software Vulnerability Security Risk
Details Operational Efficiency Detect Suspicious behavior Detection Assesment
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Tetration: On-premises deployment
options
On-premises appliance options Virtual appliance options
Software subscription license based on number of workloads; available in 1-, 3-, and 5-year terms
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Cisco Tetration software-as-a-service option
Cisco Tetration™ SaaS
Software subscription license based on number of workloads; available in 1- and 3-year terms
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Next-Level Visibility
What Does the Sensor Collect
Device
Process Information:
Information: Buffer/ACL Drops,
Which process etc.
Application is it, who started Application
Process Process
it, hash, etc. Process Process
Sockets Sockets
Transport Transport
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Core Sensor Functionality
Per-packet Source/Destination IP, Port, Protocol
Flow Size/Duration
Network or Application Issue? Application Per-packet flow metadata Switches and Interfaces User Identity
Response Time, SRTT, TCP Resets, Retransmits,
Window Size Issues, TCP Performance and Source/Dest IP, Port, Protocol Hop-by-hop Topology LDAP group information
Bottleneck Data Mapping *FX
Process
Open Used and Unused Ports Hop-by-hop Forward and
Reverse Network Paths *FX URL
Hostname, Interfaces, OS Version
Hop-by-hop Latency *FX
Process Name, Launch String, PID, Lifecycle,
and SHA 256 Hash Burst and Drop Statistics *FX
User Access
Flow Information – Src/Dst IP, Flow Information – Src/Dst IP, Netstat Data Load Balancers
Port, Protocol Port, Protocol
Hostname DNS
Includes data on AWS PaaS
services OS Version Inventory Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
What Does the Sensor Collect?
Network and App InfoSec
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
What Does the Sensor Collect?
Network and App Operations
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Pervasive Visibility In A Multi-Cloud Environment
192.168.19.3
10.4.51.5 10.200.21.110
10.43.223.221 Internet
10.85.232.4
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Visibility with Context and Control
Asset Tagging & Tetration Integration
192.168.19.3
Employee
10.4.51.5 10.200.21.110
Supplier Server
10.43.223.221 Internet
Shared Internet
Server 10.85.232.4
Employee
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Network Performance
and Troubleshooting
Nexus 9000 Cloudscale ASIC
• Collects full flow information plus metadata
• 5-tuple flow info
• Interface/queue info
• Flow start/stop time
• Flow latency – Nano-second accuracy (Requires PTP)
• Direct hardware export
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Micro-Burst Detection
• Hardware FX and Deep software
sensors can report burst events in 1ms
granularity
• Two metrics to search against:
• Fwd/Rev Burst Indicators:
• The number of burst events per flow per minute
• Long sum aggregated across flows
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
ACI Advantage: Encapsulated Remote SPAN
VMWare vSwitches
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
ACI Advantage: Tetration Annotations
Real-Time Endpoint
State
Leaf, Port, Tenant, VRF,
EPG,…
https://github.com/CiscoSE/tet-aci-annotations
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Identifying Bottlenecks – SW Sensor
Identify where the potential bottleneck could be: Information is correlated based on:
• Network • TCP retransmissions
• Application (consumer or provider) • Window size changes
• Both • Latency and other factors
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Identifying Bottlenecks – SW Sensor
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Data-Driven Troubleshooting Methodology
Discover
Commonality
Find Problem Test Potential
and Verify Solution
Areas Solutions
Characterize
the Problem
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Issue #2: “Database Outage”
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Issue #2: Confirming the Scope of Impact
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Issue #2: And in the mean time…
Primary database continues normal operation for all other web servers in app
and within the same VIP. What happened to those 6 servers!?
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Demo – Visibility and
Troubleshooting
Zero-Trust Policy Intent
& Discovery
The Traditional Approach
Gather Data
App Guy
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
The Traditional Approach
Implement the
Gather Data Analyze the Data Policy 1 Year
Later?
100 Billion
Events in 3
Months
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
The Traditional Approach
Implement the
Gather Data Analyze the Data Policy 1 Year
Later?
100 Billion
Events in 3
Months
Troubleshooting?
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Tetration Policy Lifecycle
Collect High
Application Automated Policy Enforce Policy Policy
Quality
Dependency Whitelist Policy Simulation and (Natively or Compliance
Network
Mapping Generation Impact Externally) and Auditability
Behavior and
Assessment
Identity Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Policy Discovery – What Talks to What
Dynamic
Discovered
Cluster/EPG of
Endpoints
Zero Trust Policy Dynamically Discovered
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
The Value of Big Data and Machine Learning
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Rule-processing order
Security Intent Application Zero Trust Intent
Rule Flattening
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
It’s not only about the network
• Attacks are mainly driven by application vulnerabilities, not network
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Understanding Exposure
• Tetration Stores all CVE information since 1999
• And collects the list of installed packages in order to detect known vulnerabilities
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
And Taking Action!
• As Tetration is Tag and Metadata driven we can easily segment based on CVE
• Or Installed packages
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Policy Compliance and Simulation
What was seen
on the network
Permitted that was out of
Traffic Seen on Policy
the network
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Policy Enforcement
Layered Enforcement Points
Consistent Policy - Cisco Tetration
cloud or on-premise.
Virtual Cloud
Physical Containers
(Any Hypervisor) (Azure/AWS/Google)
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Enforcement of policy across any floor tile
Cisco Tetration Analytics™
Enforcement
tetration-postman
https://github.com/CiscoSE/tetration-postman
Postman collection for interacting with the Cisco Tetration API
tetration-diagram
https://github.com/CiscoSE/tetration-diagram
Script to convert Tetration's ADM output to a diagram format
tet-aci-annotations
https://github.com/CiscoSE/tet-aci-annotations
Synchronizes endpoint state information with Cisco Tetration
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
ACI Security
For a pure network-based micro-
segmentation security approach visit:
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
The ACI Policy Model
Tenant ≈ GlobalWealth
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
The ACI Policy Model – Network Centric Configuration
Tenant
Global VRF/Routing Table and Protocol
VLAN 10
VLAN 20BD
BD VLAN 30 BD
10.10.10.1/24
10.10.20.1/24 10.10.30.1/24
VLAN 10
VLAN 20EPG
EPG VLAN 30 EPG
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
The ACI Policy Model – Network Centric Configuration
Tenant
Global VRF/Routing Table and Protocol Connect
To Externa
Switch
VLAN 10 BD VLAN 20 BD VLAN 30 BD
10.10.10.1/24 10.10.20.1/24 10.10.30.1/24
L2 External
(802.1q Trunk)
VLAN 10 EPG VLAN 20 EPG VLAN 30 EPG
L3 External
(Routed
Interface)
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
ACI Policy Model – Micro Segmentation
Application Profile
Zero Trust in the Real World
ACI Preferred Groups: Selective Segmentation
Advanced Policy Building Block
Inside the
Preferred Group there VRF – MyVRF
is unrestricted
communication Preferred Group
EPG-2
Contract-2
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Dynamic EPGs (uSeg) with ACI
Advanced Policy Building Block
Attributec Type
MAC Address Filter Network
IP Address Filter Network
Hypervisor Identifier VM vDS Cisco AVS IP/MAC EPG Hyper-V vSwitch Open vSwitch Open vSwitch
VMM Domain VM
Datacenter VM
Custom Attribute VM
(VMWare AVS/vDS only)
Operating System VM EPG-Web
Micro-Segmentation Across any Workload
Same Policy Model Across the Hybrid Cloud
KVM Open OpFlex ESXi VMware Cisco Hyper-V MSFT vSwitch Docker Open OpFlex Bare Metal
vSwitch Agent DVS AVS vSwitch Agent
VM VM VM VM VM VM VM VM VM Docker1 Docker2
1 2 1 1 2 1 1 2 1
Docker1 Docker2
AVE: Extending Policy to the Virtual Machine
Advanced Policy Building Block
Native Switch
ACI Virtual Edge (AVE) Hypervisor
VM VM VM VM VM VM VM
Bare Metal Server
Annotations
Base EPG: VLAN-1 Base EPG: VLAN-2 Filter: Cluster 1 Cluster 2 ADM Results
Preferred Group Preferred Group Optional &
Quarantine x.x.x.x/32 x.x.x.x/32
Zero-Trust Policy Zero-Trust Policy
x.x.x.x/32 x.x.x.x/32
*Include Fine on External
Dependencies
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Typical Network Security vs. Zero Trust
Internal Blog
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Typical Network Security vs. Zero Trust
Start Here
Internal Blog
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Typical Network Security vs. Zero Trust
Start Here
Internal Blog
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Typical Network Security vs. Zero Trust
Start Here Start Here
Internal Blog
Internal Blog
Sensitive Data
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Typical Network Security vs. Zero Trust
Start Here Start Here
Internal Blog
Internal Blog
Sensitive Data
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Typical Network Security vs. Zero Trust
Start Here Start Here
Internal Blog
Internal Blog
Internal Blog
Sensitive Data
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Typical Network Security vs. Zero Trust
Start Here Start Here
Internal Blog
Sensitive Data
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Document on CCO
• Title: Cisco Application Centric Infrastructure Best Practices When Using Contracts
White Paper
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKACI-2110
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Complete your online
session survey
• Please complete your Online Session
Survey after each session
• Complete 4 Session Surveys & the Overall
Conference Survey (available from
Thursday) to receive your Cisco Live T-
shirt
• All surveys can be completed via the Cisco
Events Mobile App or the Communication
Stations
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Continue Your Education
BRKACI-2110 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Thank you