SlideShare ist ein Scribd-Unternehmen logo
1 von 25
ARE
 YOU
 READY
 FOR
 
THE
 NEXT
 ATTACK?
Reviewing the SP Security Checklist
Barry Greene - bgreene@senki.org
Checklist Approach
Checklist are one of the most essential tools for
productivity we have in the industry.
Surprisingly, too few “Internet” and “Telecom”
operators use the checklist approach to optimize their
operations.
What follows is the first in several “check list” designed
for Internet Service Providers, be they Mobile,
traditional Telco, Content, of ISPs.
They can be cut/pasted and used in your organization.
Additions to the checklist are always welcomed.
* Thanks to Stephen Stuart @ Google for pointing out Atul Gawande’s book
Note: If this is new to you, read the book “The Checklist Manifesto” and watch the
TED talk:
http://www.ted.com/talks/atul_gawande_how_do_we_heal_medicine
[T]he malware that was used would
have gotten past 90 percent of the Net
defenses that are out there today in
private industry and [would have
been] likely to challenge even state
government,
Joe Demarest, Assistant Director - US
FBI’s Investigation’s Cyberdivision.
Do we have your attention?
Our Traditional View of the World
The Internet is not organized based on countries. It is a
group of “Autonomous System Networks” (ASNs) all
interconnected in a Global Network.
The Reality of the Internet - No Borders
How does a government enforce the rule of law

where the Internet’s risk are all trans-national?
Work on the Right Security Problem
This is nice to know
Who we need to Target
The Good Guys are the Big Part of the Security Problem
Threat Vectors have Evolved
Cyber-Criminal Threats
Cyber-Crime is an International Legal
problem that has no short term resolution.
There will always be someplace in the
Political, Patriotic, Protestors
There are always going to be someone,
somewhere, who is upset with society - with
the ability to make their anxiety know
through any network - any where.
Nation State Threats
Post-Snowden, the secret world of nation
state security is now all in the open. Your
network is a valid “Battle Space” for any
Cyber-War.
What really happens if I’m attacked?
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
The market does not penalize!
http://www.informationisbeautiful.net/
The “market” is forgiving IF you have a
security reaction plan.
A security reaction plan will not prevent
revenue losses, customer churn, and legal
actions, but … organizations do recover
from “big data breaches”
Security Threats are a Force of Nature
Think of the current and future
security threats as a force of of the
environment we live in. This is not
new to human society. We have to
live with the issues of nature all the
time.
Like a hurricane, it is not a matter of
if, but when. Even worse, you can
be in a zone where the hurricane,
tornado, flood, earth quake, and
blizzard are all a major risk.
Forces of Nature cannot be stopped - the only thing
you can do is mitigate risk through your design,
preparation, and investment.
“Security” Excuses
•LaLaLa if I ignore you may be you will go away.
•It is someone else's problem.
•I don’t know where to start?
•I need to wait for someone to tell me what to do.
•No one has been killed ..... Yet.
•I need more training!
•We cannot afford all the security equipment.
•We need to wait for ISO 27001 Certification.
Reality - there is a lot of “talk” about security, but most
operations just do not care …. until the s!@# hits the fan.
Positive Control
Have positive control over all elements in your
network.
Know who is accessing, when they are accessing, and
where they are accessing from. Think beyond TACACS
+. Start asking for Diameter and two factor
authorization with IPv6 only access. Log everything and
expect all there threat vectors probing. Consequences
of neglect is severe.
This is always the #1 issue risk assessors find in
networks! Who is that who logging in? Why does node in
from country X login?
VTY ACLs are Critical
Put VTY Access list everywhere, log it, plot in
MRTG/Cati, and create the alert scripts.
The VTY access list trick is on of the key cost effective
tools that consistently delivers key indicators of
attackers probing the network, exploring the network,
or trying to break into the elements of the network.
The only way to make this work effectively is to build
your own script or use tool from companies like
6Connect.
Why is someone trying to telnet into my eNodeB from
another eNodeB? Why are there a increase in “drops” on
my internal SSH?
Force Vendor Security Partnerships
Use the Vendor Security Checklist with all your
vendors now.
Set up the meetings, have them comply, and push if
non-compliant. Then have these items part of all your
RFPs. Vendors will NOT pay attention to security until
their customers demand security …. or if you take legal
action for liability against the vendors.
Waiting for the dialog is going to create problems when
the s!@# with a specific vendor.
* E-mail and ask for a copy with the Security “RFP” questions.
What is the Upgrade Plan?
Every element in your system needs a tested Upgrade
Plan.
Don’t wait for an emergency patch to find out that a major
routers take 6 hours to upgrade! Create the upgrade plan. Write
the MOP for the test as a template. Rest the plan in your lab, or I
the vendor's lab. Table top exercise how you would have a rolling
upgrade through out the entire system. Map the other systems
which are coupled dependencies or collaterally impacted. Once
all of this is done, start working on designs where you can do
these upgrades without the massive service impact.
Your first reaction would be “isn’t this basic?” Start asking
for details and you will be surprised. One vendor thought is
was normal for a router to be upgraded in 4 hours!
IPv6 Check = Security
Bring in all your vendors and review the IPv6
Check list.
Don't wait for the next RFP. The Cyber-Criminal and
Nation-State threat vectors both know that IPv6 is the
easy entry for getting into and through a network.
There is way too many 1/2 completed IPv6
deployments with equipment that is not ready (I.e. No
IPv6 security features).
Cyber-Criminals figured out that IPv6 was a
backdoor into a network 5 years ago.
Build your Attack Trees
Learn Attack Trees, build your attack trees, explore
all the ways you can break and network.
Once you have your own list of dirty tricks to break your
network, start building reaction plans with the tools you
have in place right now. If brave, get someone to facilitate
a Red Team - Blue Team table top exercise.
Write your BGP Policy!
Write your BGP policy down so that your CEO
understands it!
What are you going to send? What are you going to
receive? How are you going to monitor? How are you going
to enforce? How do you manage your customers? The
days when “BGP policy” is in a “Cisco config script” will not
work when the threat environment is so hostile. One of the
barriers to RPKI ROA registration is the lack of proactive
thinking, planning, and documentation around an
operator’s interconnection policy.
You will make important discoveries of “BGP risk” when
you write it down in a way that everyone can understand!
Review your DNS Architecture!
Review all of your DNS Architecture to Ensure it is
Resilient.
Several of the major “DNS outages” in 2014 had a root
cause in how they were designed. Do not listen to the
vendors, they would want to sell you a solution that will
put all the DNS functionality into one box, creating
single points of failure.

Weitere ähnliche Inhalte

Was ist angesagt?

NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysNDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
Bryson Bort
 

Was ist angesagt? (20)

Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
How would you handle and prevent fires from IoT forests?
How would you handle and prevent fires from IoT forests?How would you handle and prevent fires from IoT forests?
How would you handle and prevent fires from IoT forests?
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
The Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityThe Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and Cybersecurity
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
 
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysNDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 

Andere mochten auch

Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDE
Engineers Australia
 

Andere mochten auch (20)

Security acqua 4 0 telecontrollo 2015 versione_estesa
Security acqua 4 0 telecontrollo 2015 versione_estesaSecurity acqua 4 0 telecontrollo 2015 versione_estesa
Security acqua 4 0 telecontrollo 2015 versione_estesa
 
Red Teaming and the Supply Chain
Red Teaming and the Supply ChainRed Teaming and the Supply Chain
Red Teaming and the Supply Chain
 
Ciclo de vida
Ciclo de vidaCiclo de vida
Ciclo de vida
 
Security in the New World of Content and Documents
Security in the New World of Content and DocumentsSecurity in the New World of Content and Documents
Security in the New World of Content and Documents
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Innomantra - Intellectual Property Consulting & Services
Innomantra - Intellectual Property Consulting & ServicesInnomantra - Intellectual Property Consulting & Services
Innomantra - Intellectual Property Consulting & Services
 
Are Your CPG Brands Maximizing the Return on Your Digital Investment?
Are Your CPG Brands Maximizing the Return on Your Digital Investment?Are Your CPG Brands Maximizing the Return on Your Digital Investment?
Are Your CPG Brands Maximizing the Return on Your Digital Investment?
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data Breaches
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDE
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 

Ähnlich wie Are you ready for the next attack? Reviewing the SP Security Checklist

Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Michele Chubirka
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
WilheminaRossi174
 

Ähnlich wie Are you ready for the next attack? Reviewing the SP Security Checklist (20)

Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devops
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Mongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons LearnedMongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons Learned
 
Network cloaking sansv2_
Network cloaking sansv2_Network cloaking sansv2_
Network cloaking sansv2_
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
Logging "BrainBox" Short Article
Logging "BrainBox" Short ArticleLogging "BrainBox" Short Article
Logging "BrainBox" Short Article
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 

Mehr von APNIC

Mehr von APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Kürzlich hochgeladen

6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 

Are you ready for the next attack? Reviewing the SP Security Checklist

  • 1. ARE
  • 7.  ATTACK? Reviewing the SP Security Checklist Barry Greene - bgreene@senki.org
  • 8. Checklist Approach Checklist are one of the most essential tools for productivity we have in the industry. Surprisingly, too few “Internet” and “Telecom” operators use the checklist approach to optimize their operations. What follows is the first in several “check list” designed for Internet Service Providers, be they Mobile, traditional Telco, Content, of ISPs. They can be cut/pasted and used in your organization. Additions to the checklist are always welcomed. * Thanks to Stephen Stuart @ Google for pointing out Atul Gawande’s book Note: If this is new to you, read the book “The Checklist Manifesto” and watch the TED talk: http://www.ted.com/talks/atul_gawande_how_do_we_heal_medicine
  • 9. [T]he malware that was used would have gotten past 90 percent of the Net defenses that are out there today in private industry and [would have been] likely to challenge even state government, Joe Demarest, Assistant Director - US FBI’s Investigation’s Cyberdivision. Do we have your attention?
  • 10. Our Traditional View of the World The Internet is not organized based on countries. It is a group of “Autonomous System Networks” (ASNs) all interconnected in a Global Network.
  • 11. The Reality of the Internet - No Borders How does a government enforce the rule of law
 where the Internet’s risk are all trans-national?
  • 12. Work on the Right Security Problem This is nice to know Who we need to Target The Good Guys are the Big Part of the Security Problem
  • 13. Threat Vectors have Evolved Cyber-Criminal Threats Cyber-Crime is an International Legal problem that has no short term resolution. There will always be someplace in the Political, Patriotic, Protestors There are always going to be someone, somewhere, who is upset with society - with the ability to make their anxiety know through any network - any where. Nation State Threats Post-Snowden, the secret world of nation state security is now all in the open. Your network is a valid “Battle Space” for any Cyber-War.
  • 14. What really happens if I’m attacked? http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 15. The market does not penalize! http://www.informationisbeautiful.net/ The “market” is forgiving IF you have a security reaction plan. A security reaction plan will not prevent revenue losses, customer churn, and legal actions, but … organizations do recover from “big data breaches”
  • 16. Security Threats are a Force of Nature Think of the current and future security threats as a force of of the environment we live in. This is not new to human society. We have to live with the issues of nature all the time. Like a hurricane, it is not a matter of if, but when. Even worse, you can be in a zone where the hurricane, tornado, flood, earth quake, and blizzard are all a major risk. Forces of Nature cannot be stopped - the only thing you can do is mitigate risk through your design, preparation, and investment.
  • 17. “Security” Excuses •LaLaLa if I ignore you may be you will go away. •It is someone else's problem. •I don’t know where to start? •I need to wait for someone to tell me what to do. •No one has been killed ..... Yet. •I need more training! •We cannot afford all the security equipment. •We need to wait for ISO 27001 Certification. Reality - there is a lot of “talk” about security, but most operations just do not care …. until the s!@# hits the fan.
  • 18. Positive Control Have positive control over all elements in your network. Know who is accessing, when they are accessing, and where they are accessing from. Think beyond TACACS +. Start asking for Diameter and two factor authorization with IPv6 only access. Log everything and expect all there threat vectors probing. Consequences of neglect is severe. This is always the #1 issue risk assessors find in networks! Who is that who logging in? Why does node in from country X login?
  • 19. VTY ACLs are Critical Put VTY Access list everywhere, log it, plot in MRTG/Cati, and create the alert scripts. The VTY access list trick is on of the key cost effective tools that consistently delivers key indicators of attackers probing the network, exploring the network, or trying to break into the elements of the network. The only way to make this work effectively is to build your own script or use tool from companies like 6Connect. Why is someone trying to telnet into my eNodeB from another eNodeB? Why are there a increase in “drops” on my internal SSH?
  • 20. Force Vendor Security Partnerships Use the Vendor Security Checklist with all your vendors now. Set up the meetings, have them comply, and push if non-compliant. Then have these items part of all your RFPs. Vendors will NOT pay attention to security until their customers demand security …. or if you take legal action for liability against the vendors. Waiting for the dialog is going to create problems when the s!@# with a specific vendor. * E-mail and ask for a copy with the Security “RFP” questions.
  • 21. What is the Upgrade Plan? Every element in your system needs a tested Upgrade Plan. Don’t wait for an emergency patch to find out that a major routers take 6 hours to upgrade! Create the upgrade plan. Write the MOP for the test as a template. Rest the plan in your lab, or I the vendor's lab. Table top exercise how you would have a rolling upgrade through out the entire system. Map the other systems which are coupled dependencies or collaterally impacted. Once all of this is done, start working on designs where you can do these upgrades without the massive service impact. Your first reaction would be “isn’t this basic?” Start asking for details and you will be surprised. One vendor thought is was normal for a router to be upgraded in 4 hours!
  • 22. IPv6 Check = Security Bring in all your vendors and review the IPv6 Check list. Don't wait for the next RFP. The Cyber-Criminal and Nation-State threat vectors both know that IPv6 is the easy entry for getting into and through a network. There is way too many 1/2 completed IPv6 deployments with equipment that is not ready (I.e. No IPv6 security features). Cyber-Criminals figured out that IPv6 was a backdoor into a network 5 years ago.
  • 23. Build your Attack Trees Learn Attack Trees, build your attack trees, explore all the ways you can break and network. Once you have your own list of dirty tricks to break your network, start building reaction plans with the tools you have in place right now. If brave, get someone to facilitate a Red Team - Blue Team table top exercise.
  • 24. Write your BGP Policy! Write your BGP policy down so that your CEO understands it! What are you going to send? What are you going to receive? How are you going to monitor? How are you going to enforce? How do you manage your customers? The days when “BGP policy” is in a “Cisco config script” will not work when the threat environment is so hostile. One of the barriers to RPKI ROA registration is the lack of proactive thinking, planning, and documentation around an operator’s interconnection policy. You will make important discoveries of “BGP risk” when you write it down in a way that everyone can understand!
  • 25. Review your DNS Architecture! Review all of your DNS Architecture to Ensure it is Resilient. Several of the major “DNS outages” in 2014 had a root cause in how they were designed. Do not listen to the vendors, they would want to sell you a solution that will put all the DNS functionality into one box, creating single points of failure.
  • 26. Review your DNS Architecture! Example: Generic DNS Authoritative Infrastructure EXAMPLE.COM Authoritative Module Zone Updates Where is www.example.com? 12 3 3 3
  • 27. Review your DNS Architecture! Example: Generic DNS Resolver Infrastructure Customers Users Where is www.example.com? DNS Resolver Cluster Optional www.example.com Optional
  • 28. Review your DNS Architecture! Example: LTE has Five Separate DNS “Architectures!” IMS E-UTRAN Operator’s IP Services Gxc (Gx+) S11 (GTP-C) S1-U (GTP-U) S6a (DIAMETER) S1-MME (S1-AP) S5 (GTP-C,GTP-U) Gx (Gx+) SWx (DIAMETER) S6b (DIAMETER) SGi Rx+ Tracking Area/APN DNS Resolver DNS S10 (GTP-C Infrastructure DNS Authoritative DNS Roam DNS (ENUM)
  • 29. Where is your “Security Community?” Proactively build a security community of peers. The Internet is a network of people! Major security issues on the Internet are solved by communities of people who have aligned interest. These communities take proactive investment. Many times you will be working with your competitors. Yet, the effort will save your network. If not tomorrow, then next year or the year after. Can you pick up the phone, call several of your peers, and start working on a security issue that is impacting everyone?
  • 30. Checklist Summary Positive Control VTY ACLs are Critical Force Vendor Security Partnerships Every element in your system needs a tested Upgrade Plan. Bring in all your vendors and review the IPv6 Check list. Learn Attack Trees, build your attack trees, explore all the ways you can break and network. Write your BGP policy down so that your CEO understands it! Review all of your DNS Architecture to Ensure it is Resilient. Proactively build a security community of peers. More to come …..
  • 31. What’s Next? Commit to do something to prepare your organization. You do not need to ask permission, just start doing something ….. Where to get the “Checklist?” www.senki.org Barry’s Linkedin Post - http://www.linkedin.com/ in/barryrgreene/ or Twitter: @BarryRGreene Reach out and Build a Community