SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Securing Wireless Communications
A Layered Approach
Jeremy Bennett
Security Architect
jbennett@arubanetworks.com
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Agenda
• Why?Layer 0
• EnvironmentLayer 1
• DataLayer 2
• NetworkLayer 3
• ManagementLayer 4
• Audit and ReportLayer 5
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Layer 0 – Why Security Matters
Security ICU
• Integrity
• Confidentiality
• Utility
Risks
• Rogue APs
• Data loss
• Brand
exposure
Rewards
• Flexibility
• Cost Savings
• Enabler
Regulation
• PCI
• Financial
• Government
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
A Word About PCI DSS
- A worldwide
consortium
- Started by major
card brands
- Includes card
issuers and banks
- Includes
merchants
- Includes
technology
providers
Who is PCI
- A digital security
standard
- Covers all aspects
of IT from systems
to storage to
networks
- Designed to
protect debit and
credit card data
- Mandatory for all
merchants
worldwide
What is PCI
- Protect the brand
- Avoid $160/card
breach penalty
under safe harbor
- Prevent $10,000 -
$100,000 a month
out-of-compliance
fine
- Lower per
transaction rates,
only available with
PCI compliance
Why Comply?
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Authored by the Wireless Special Interest Group
 A group of PCI members interested in wireless
 Many wireless experts
 NOT a new set of requirements
 Provides concrete guidance on how PCI DSS
requirements impact wireless networks
 Whether you have wireless or not
 Whether you use wireless for cardholder data or not
 Reviewed and approved by the PCI council
PCI DSS Wireless Guidelines
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Physical and RF space
 Threats
 Man in the Middle – device inserted between AP and port
 Rogue – device inserted into unused port
 Jamming & Interference
 Tampering with or stealing APs
 Regulation
 PCI DSS 11.1 – Wireless scanning
 PCI DSS 9.1, 9.2 – Secure ports and APs
Layer 1 – Environment
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Physically
secure devices
• Restrict access to network ports
• Lock down connected devices or ensure they contain no sensitive
data
• Prevent tampering with devices
• Ensure wireless network is resistant to jamming and noise
Allow only
authorized
devices
• Know  what’s  on  your  network:  Wired  or  Wireless
• Wireless devices extend the network in an uncontrolled manner
• Multiple techniques and multiple vectors ensures better discovery
and better classification
• PCI requires at least quarterly scans for wireless devices
Layer 1 - Secure the Environment
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Physically Secure Devices
• Centralized architecture means
no sensitive data is exposed if an
AP is lost
• Integrated TPMs mean APs
cannot be spoofed our swapped
out with altered devices
• Wired & wireless authentication
• Centralized management means
alerts can be generated if an AP
is lost or disconnected
• Spectrum monitoring and
Adaptive Radio Management
(ARM) ensure consistent
operation
Allow Only Authorized Devices
• Aruba AirMonitors scan the RF
space and correlate wireless and
wired traffic to accurately
categorize rogues
• AirWave RAPIDS proactively
scans the wired network through
switches, routers, and direct
probes to find all suspicious
devices.
• Multiple techniques and multiple
vectors ensures better discovery
and better classification
• Wired & wireless containment
reduces the threat of rogues
Layer 1 – Using Aruba
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Not just bytes but also the ability to trust them
 Threats
 Eavesdropping
 Data forging
 Floods & DoS
 802.11 protocol attacks
 Regulation
 PCI DSS 7.1, 7.1.2 – Access on need to know
 PCI DSS 7.2, 8.1 – Individual user accounts
 PCI DSS 4.1, 4.1.1 – Use strong encryption
Layer 2 – Data
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Layer 2 - Protect the Data
Secure the
protocol
• Avoid floods and DoS
attacks
• Use wireless IDS to
monitor all network
traffic
Authenticate
• Know your wireless
clients
• Prevent bogus clients
from getting online
• Devices should be
unusable for
business without a
valid user
• Use 802.1x where
possible
Encrypt
• WPA2 WLANs are
securely
authenticated and
encrypted.
• Open wireless + VPN
= Window of client
exposure
• Make sure the link
between the AP and
controller is secure
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Every frame received by the AP is processed by the IDS
 Dedicated AMs receive a few frames on every channel
 In AP mode all valid traffic is processed by the IDS, nothing is lost.
 All devices are tracked
 Client and AP associations are tracked and stored.
 All ad hoc networks are also tracked and stored
 Each frame is checked for known attacks
 Checked for syntactic correctness – is the frame OK?
 Checked for semantic correctness – does the frame make sense in
context?
 Any problems are sent to the controller for correlation and
disposition
 Repeat alerts are suppressed as per policy
 Traps and logs are generated for external systems like AirWave
Layer 2 – Aruba Secures 802.11
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Authenticate devices
 Aruba enforces machine authentication before user
authentication
 Prevent non-corporate devices from accessing the network
 Use a dynamic firewall like Aruba PEF to put authenticated
devices outside the CDE until a user logs in
 Authenticate users
 Recommend using a centralized directory for accounts
 PCI DSS requires processes for disabling and terminating
access.
Layer 2 - Authenticate
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Layer 2 – Encrypt
 ALL wireless traffic
 Use WPA2 Enterprise with
AES where possible
 If Enterprise is not feasible
use PSK
 Across unsecured wired
links
 Centralized encryption
allows APs to be deployed
in insecure areas
 Remote AP automatically
creates IPSec tunnels
back to controller even
over the Internet
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Layer 2 - Centralized Encryption
RADIUS Server
 Client finishes authentication
and the AP sends the wireless
packet to the controller
 The controller sends an access
request to the RADIUS server
 The RADIUS server sends the
accept and encrypted keys to
the controller
 All encryption is processed
centrally
NO keys are distributed to APs
Access Accept
Access Request
Your Keys Never Leave
Data Center
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Classic TCP/IP network (OSI 5-7)
 Threats
 Misbehaving users
 Unauthorized applications
 Bandwidth hogs
 Guests & Partners
 Regulation
 PCI DSS section 1 – use firewalls
 PCI DSS 4.1 requires strong network encryption
 PCI DSS section 7 – use strong access control
Layer 3 – Network
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Segment the network
 Use physical or virtual techniques to break the network into
manageable pieces
 Segment based on business need. Example PCI DSS allows
the  ‘cardholder  data  environment’  to  be  contained  in  a  
segment thus simplifying compliance
 Segment and control applications
 Use roles to grant access to secure applications
 Use QoS rules to enable streaming and prevent saturation
 Allow guests and partners minimal access or external-only
access
Layer 3 – Secure the Network
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Layer 3 - Physical Segmentation
No shared wires –
VLANs are not
sufficient
• VLAN tagging
does not prevent
a tap from
capturing data
• VLAN tags can
be spoofed
• If CDE traffic
must cross
untrusted
segments make it
strongly
encrypted
No shared switches
or routers
• Unless they have
a built-in firewall
• Overloaded
switches can be
fooled into
mishandling traffic
• Routing protocols
can be spoofed
No shared APs
• Unless they have
a built-in firewall
• Make sure CDE
SSID and non-
CDE SSID traffic
remains
separated
physically or by a
firewall at all
times
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Corner stone of Aruba Security Architecture
 Role-based
 Derived from client or server attributes or upon successful authentication
 Integrated architecture ensures no spoofing
 Every untrusted IP or MAC is assigned a role
 Layered: Layer 3 role overrides Layer 2 role
 Session ACLs define policy
 Applied to all IP traffic (i.e. TCP and UDP)
 From untrusted and to untrusted users
 Rules allow, deny, or limit bandwidth
 Application Level Gateways allow complex protocols through
simple rules
 FTP active and passive
 VoIP – SIP, RTP, etc
Policy Enforcement Firewall (PEF)
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Role-Based Separation
SSID: CORP
SSID: GUEST
Guest user
Employee
VoIP Device
Contractor
Default
Captive Portal
Switch Router
AAA Services
Radius, LDAP, AD
Mobility Controller
Access Point
Rights,
QoS, VLAN
Rights,
QoS, VLAN
Rights,
QoS, VLAN
Rights,
QoS, VLAN
CDE
Rights,
QoS, VLAN
Guest
Voice
Contractors
Employees
Sales
Multiple Classes of Users on Same Infrastructure are Kept Separate
Wired
Ports
Rights,
QoS, VLAN
Switch Router
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Default
Roles
• Configurable by
authentication method
• SSID
User
Rules
• Device-specific
attributes
• Encryption type
• AP used (by name or
BSSID)
Server
Derived
Roles
• Different access
privileges based on
security policy
• Can use single SSID for
all users/devices
• Role assignment based
on attributes from
authentication server
Role Derivation
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Session processing
 Identity-based firewall policies
 Traffic management
 Protocol processing
 Traffic cleanup
 Detects SYN, ping, ports scan attacks
 Can prevent continued attacks (black list station)
 Enforces TCP handshakes, prevents replay attacks
 Station blacklisting
 Authentication failure
 Firewall rule violation
 TCP attacks
Firewall Processing
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Layer 4 – Management
 People and process for controlling configuration and
operation of the network
 Threats
 Ignored rogues
 Accidental configuration errors
 Disgruntled ex-employees
 Stolen laptops
 Regulation
 PCI DSS section 10 requires network and security
monitoring
 PCI DSS section 12 requires documenting and following
security processes
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Layer 4 – Management
Monitor and Repair
• Mitigate rogues using
automated methods
• Physically remove rogues
• Repair configuration
problems
• Remove user access on
termination
• Remove device access when
devices are lost/stolen
• Review firewall hits and
address problems
Maintain Compliance
• Regularly check
configuration of all
equipment
• Regularly review firewall
configurations
• Regularly confirm authorized
users and devices
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Monitor and Repair
• Wired and wireless
containment minimizes
the threat of rogue APs
• AirWave reports,
location, switch, and
port of discovered
rogues
• Send alerts for
configuration problems
Maintain Compliance
• Automatic configuration
can repair mistakes
• Full log of all
configuration changes
is kept to prove
continuous compliance.
• Alerts can be sent if
compliance conditions
are violated
Layer 4 – Secure Management
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Deauth
 Less impact on the client device
 Best for steering authorized clients away from problem APs
 Tarpit*
 Less RF traffic than deauth and more effective
 Best for preventing any access to rogue APs
 May confuse client users and client software
 Wired Containment
 Poison ARP from AP
 Shutdown Wired Port with AirWave RAPIDs module
Multiple Rogue Containment Methods
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Compliance Maintenance Plan
Review Period Item
Every 90 days (A) Remove unused accounts (8.5.5)
Change passwords (8.5.9)
Wireless scan (11.1)
Vulnerability scan (internal and external) (11.2)
Every 6 months
(B)
All in A
Firewall and router configs (1.1.6)
Every year (C) All in A + B
Pen test (11.3)
Security policy (12.1.3)
Test Incident Response Plan
Rotate crypto keys (3.6.4) (or as recommended by vendor)
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Regular reviews of activity, process, and people
 Threats
 Miscommunication
 Disgruntled administrator
 Business and regulation changes
 Regulation
 PCI DSS requirements for process also require its review (e.g.
12.1.3)
 PCI DSS is updated every two years
Layer 5 – Audit and Report
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
Audit device
inventory
• AirWave
automatically
tracks all devices
• Device
classification can
be based on a
combination of
rules
• Authorized devices
are managed to
ensure compliance
Audit
configuration
• AirWave’s
interactive PCI
report highlights
potential problems
• Report can be
scheduled or run
on demand
Keep records
• AirWave can keep
records for more
than a year
• Many PCI reports
can be kept for
comparison
• All changes and
administrator
actions are logged
and audited.
Layer 5 - Audit and Report
Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.
 Rogues
 Classification
 Discovery and resolution workflow
 Alerting
 Configuration
 Alert resolution workflow
 Reporting
 Creating reports
 Scheduling reports
 Key security reports
Demo Flow

Contenu connexe

Tendances

8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...
Aruba, a Hewlett Packard Enterprise company
 
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Aruba, a Hewlett Packard Enterprise company
 

Tendances (20)

082112 aruba 11ac webinar
082112 aruba 11ac webinar082112 aruba 11ac webinar
082112 aruba 11ac webinar
 
Airheads vail 2011 air wave overview
Airheads vail 2011   air wave overviewAirheads vail 2011   air wave overview
Airheads vail 2011 air wave overview
 
Physically securing the wireless installation
Physically securing the wireless installationPhysically securing the wireless installation
Physically securing the wireless installation
 
Aruba wireless and clear pass 6 integration guide v1 1.3
Aruba wireless and clear pass 6 integration guide v1 1.3Aruba wireless and clear pass 6 integration guide v1 1.3
Aruba wireless and clear pass 6 integration guide v1 1.3
 
8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...
 
Mobility access switches_madani adjali
Mobility access switches_madani adjaliMobility access switches_madani adjali
Mobility access switches_madani adjali
 
Industry breakout focus on education open_dns_andy logan
Industry breakout focus on education open_dns_andy loganIndustry breakout focus on education open_dns_andy logan
Industry breakout focus on education open_dns_andy logan
 
Outdoor network engineering jeffrey weaver
Outdoor network engineering jeffrey weaverOutdoor network engineering jeffrey weaver
Outdoor network engineering jeffrey weaver
 
2012 ah apj mobile device fundamentals
2012 ah apj   mobile device fundamentals2012 ah apj   mobile device fundamentals
2012 ah apj mobile device fundamentals
 
2012 ah vegas deploying byod
2012 ah vegas   deploying byod2012 ah vegas   deploying byod
2012 ah vegas deploying byod
 
Industry breakout government military forum_jon green_stuart schulte
Industry breakout government military forum_jon green_stuart schulteIndustry breakout government military forum_jon green_stuart schulte
Industry breakout government military forum_jon green_stuart schulte
 
2012 ah apj rf troubleshooting
2012 ah apj   rf troubleshooting2012 ah apj   rf troubleshooting
2012 ah apj rf troubleshooting
 
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
 
2012 ah apj keynote - technology update
2012 ah apj   keynote - technology update2012 ah apj   keynote - technology update
2012 ah apj keynote - technology update
 
2012 ah apj wi fi design for voice & video
2012 ah apj   wi fi design for voice & video2012 ah apj   wi fi design for voice & video
2012 ah apj wi fi design for voice & video
 
2012 ah vegas wlan design fundamentals
2012 ah vegas   wlan design fundamentals2012 ah vegas   wlan design fundamentals
2012 ah vegas wlan design fundamentals
 
BYOD with ClearPass
BYOD with ClearPassBYOD with ClearPass
BYOD with ClearPass
 
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
4 healthcare forum deploying vocera on aruba wlan_kevin huey
4 healthcare forum deploying vocera on aruba wlan_kevin huey4 healthcare forum deploying vocera on aruba wlan_kevin huey
4 healthcare forum deploying vocera on aruba wlan_kevin huey
 

En vedette

Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Aruba, a Hewlett Packard Enterprise company
 

En vedette (19)

Air heads rio 2010 outdoor wla-ns
Air heads rio 2010   outdoor wla-nsAir heads rio 2010   outdoor wla-ns
Air heads rio 2010 outdoor wla-ns
 
Airheads barcelona 2010 rf design for retail warehousing manufacturing
Airheads barcelona 2010   rf design for retail warehousing manufacturingAirheads barcelona 2010   rf design for retail warehousing manufacturing
Airheads barcelona 2010 rf design for retail warehousing manufacturing
 
2012 ah vegas wlan design for voice video
2012 ah vegas   wlan design for voice video2012 ah vegas   wlan design for voice video
2012 ah vegas wlan design for voice video
 
2012 ah vegas mobile device fundamentals
2012 ah vegas   mobile device fundamentals2012 ah vegas   mobile device fundamentals
2012 ah vegas mobile device fundamentals
 
2012 ah vegas remote networking fundamentals
2012 ah vegas   remote networking fundamentals2012 ah vegas   remote networking fundamentals
2012 ah vegas remote networking fundamentals
 
2012 ah vegas top10 tips from aruba tac
2012 ah vegas   top10 tips from aruba tac2012 ah vegas   top10 tips from aruba tac
2012 ah vegas top10 tips from aruba tac
 
2012 ah vegas unified access fundamentals
2012 ah vegas   unified access fundamentals2012 ah vegas   unified access fundamentals
2012 ah vegas unified access fundamentals
 
Guest wlan via gu iv3
Guest wlan via gu iv3Guest wlan via gu iv3
Guest wlan via gu iv3
 
Mac authentication amigopod radius
Mac authentication amigopod radiusMac authentication amigopod radius
Mac authentication amigopod radius
 
Aruba webinar dorm wi fi design v4
Aruba webinar   dorm wi fi design v4Aruba webinar   dorm wi fi design v4
Aruba webinar dorm wi fi design v4
 
Gigabit wifi 802.11 ac in depth_peter thornycroft
Gigabit wifi 802.11 ac in depth_peter thornycroftGigabit wifi 802.11 ac in depth_peter thornycroft
Gigabit wifi 802.11 ac in depth_peter thornycroft
 
Hello instant 0612_1a
Hello instant 0612_1aHello instant 0612_1a
Hello instant 0612_1a
 
Creating an 802 1 xv3
Creating an 802 1 xv3Creating an 802 1 xv3
Creating an 802 1 xv3
 
80211ac faq 121311
80211ac faq 12131180211ac faq 121311
80211ac faq 121311
 
2012 ah vegas guest access fundamentals
2012 ah vegas   guest access fundamentals2012 ah vegas   guest access fundamentals
2012 ah vegas guest access fundamentals
 
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
 
Air heads rio 2010 controlling the air
Air heads rio 2010   controlling the airAir heads rio 2010   controlling the air
Air heads rio 2010 controlling the air
 
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
 
Airheads scottsdale 2010 maximizing 11n performance
Airheads scottsdale 2010   maximizing 11n performanceAirheads scottsdale 2010   maximizing 11n performance
Airheads scottsdale 2010 maximizing 11n performance
 

Similaire à Airheads barcelona 2010 securing wireless la ns

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
tardeep
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx

Similaire à Airheads barcelona 2010 securing wireless la ns (20)

Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless Security
 
Security advanced rich langston_jon green
Security advanced rich langston_jon greenSecurity advanced rich langston_jon green
Security advanced rich langston_jon green
 
Chapter08
Chapter08Chapter08
Chapter08
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Rfs4000 product snapshot
Rfs4000 product snapshotRfs4000 product snapshot
Rfs4000 product snapshot
 
Rfs4000 product snapshot
Rfs4000 product snapshotRfs4000 product snapshot
Rfs4000 product snapshot
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
 
Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1
 

Plus de Aruba, a Hewlett Packard Enterprise company

Plus de Aruba, a Hewlett Packard Enterprise company (20)

Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
Introduction to AirWave 10
 
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Airheads barcelona 2010 securing wireless la ns

  • 1. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Securing Wireless Communications A Layered Approach Jeremy Bennett Security Architect jbennett@arubanetworks.com
  • 2. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Agenda • Why?Layer 0 • EnvironmentLayer 1 • DataLayer 2 • NetworkLayer 3 • ManagementLayer 4 • Audit and ReportLayer 5
  • 3. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Layer 0 – Why Security Matters Security ICU • Integrity • Confidentiality • Utility Risks • Rogue APs • Data loss • Brand exposure Rewards • Flexibility • Cost Savings • Enabler Regulation • PCI • Financial • Government
  • 4. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. A Word About PCI DSS - A worldwide consortium - Started by major card brands - Includes card issuers and banks - Includes merchants - Includes technology providers Who is PCI - A digital security standard - Covers all aspects of IT from systems to storage to networks - Designed to protect debit and credit card data - Mandatory for all merchants worldwide What is PCI - Protect the brand - Avoid $160/card breach penalty under safe harbor - Prevent $10,000 - $100,000 a month out-of-compliance fine - Lower per transaction rates, only available with PCI compliance Why Comply?
  • 5. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Authored by the Wireless Special Interest Group  A group of PCI members interested in wireless  Many wireless experts  NOT a new set of requirements  Provides concrete guidance on how PCI DSS requirements impact wireless networks  Whether you have wireless or not  Whether you use wireless for cardholder data or not  Reviewed and approved by the PCI council PCI DSS Wireless Guidelines
  • 6. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Physical and RF space  Threats  Man in the Middle – device inserted between AP and port  Rogue – device inserted into unused port  Jamming & Interference  Tampering with or stealing APs  Regulation  PCI DSS 11.1 – Wireless scanning  PCI DSS 9.1, 9.2 – Secure ports and APs Layer 1 – Environment
  • 7. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Physically secure devices • Restrict access to network ports • Lock down connected devices or ensure they contain no sensitive data • Prevent tampering with devices • Ensure wireless network is resistant to jamming and noise Allow only authorized devices • Know  what’s  on  your  network:  Wired  or  Wireless • Wireless devices extend the network in an uncontrolled manner • Multiple techniques and multiple vectors ensures better discovery and better classification • PCI requires at least quarterly scans for wireless devices Layer 1 - Secure the Environment
  • 8. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Physically Secure Devices • Centralized architecture means no sensitive data is exposed if an AP is lost • Integrated TPMs mean APs cannot be spoofed our swapped out with altered devices • Wired & wireless authentication • Centralized management means alerts can be generated if an AP is lost or disconnected • Spectrum monitoring and Adaptive Radio Management (ARM) ensure consistent operation Allow Only Authorized Devices • Aruba AirMonitors scan the RF space and correlate wireless and wired traffic to accurately categorize rogues • AirWave RAPIDS proactively scans the wired network through switches, routers, and direct probes to find all suspicious devices. • Multiple techniques and multiple vectors ensures better discovery and better classification • Wired & wireless containment reduces the threat of rogues Layer 1 – Using Aruba
  • 9. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Not just bytes but also the ability to trust them  Threats  Eavesdropping  Data forging  Floods & DoS  802.11 protocol attacks  Regulation  PCI DSS 7.1, 7.1.2 – Access on need to know  PCI DSS 7.2, 8.1 – Individual user accounts  PCI DSS 4.1, 4.1.1 – Use strong encryption Layer 2 – Data
  • 10. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Layer 2 - Protect the Data Secure the protocol • Avoid floods and DoS attacks • Use wireless IDS to monitor all network traffic Authenticate • Know your wireless clients • Prevent bogus clients from getting online • Devices should be unusable for business without a valid user • Use 802.1x where possible Encrypt • WPA2 WLANs are securely authenticated and encrypted. • Open wireless + VPN = Window of client exposure • Make sure the link between the AP and controller is secure
  • 11. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Every frame received by the AP is processed by the IDS  Dedicated AMs receive a few frames on every channel  In AP mode all valid traffic is processed by the IDS, nothing is lost.  All devices are tracked  Client and AP associations are tracked and stored.  All ad hoc networks are also tracked and stored  Each frame is checked for known attacks  Checked for syntactic correctness – is the frame OK?  Checked for semantic correctness – does the frame make sense in context?  Any problems are sent to the controller for correlation and disposition  Repeat alerts are suppressed as per policy  Traps and logs are generated for external systems like AirWave Layer 2 – Aruba Secures 802.11
  • 12. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Authenticate devices  Aruba enforces machine authentication before user authentication  Prevent non-corporate devices from accessing the network  Use a dynamic firewall like Aruba PEF to put authenticated devices outside the CDE until a user logs in  Authenticate users  Recommend using a centralized directory for accounts  PCI DSS requires processes for disabling and terminating access. Layer 2 - Authenticate
  • 13. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Layer 2 – Encrypt  ALL wireless traffic  Use WPA2 Enterprise with AES where possible  If Enterprise is not feasible use PSK  Across unsecured wired links  Centralized encryption allows APs to be deployed in insecure areas  Remote AP automatically creates IPSec tunnels back to controller even over the Internet
  • 14. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Layer 2 - Centralized Encryption RADIUS Server  Client finishes authentication and the AP sends the wireless packet to the controller  The controller sends an access request to the RADIUS server  The RADIUS server sends the accept and encrypted keys to the controller  All encryption is processed centrally NO keys are distributed to APs Access Accept Access Request Your Keys Never Leave Data Center
  • 15. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Classic TCP/IP network (OSI 5-7)  Threats  Misbehaving users  Unauthorized applications  Bandwidth hogs  Guests & Partners  Regulation  PCI DSS section 1 – use firewalls  PCI DSS 4.1 requires strong network encryption  PCI DSS section 7 – use strong access control Layer 3 – Network
  • 16. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Segment the network  Use physical or virtual techniques to break the network into manageable pieces  Segment based on business need. Example PCI DSS allows the  ‘cardholder  data  environment’  to  be  contained  in  a   segment thus simplifying compliance  Segment and control applications  Use roles to grant access to secure applications  Use QoS rules to enable streaming and prevent saturation  Allow guests and partners minimal access or external-only access Layer 3 – Secure the Network
  • 17. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Layer 3 - Physical Segmentation No shared wires – VLANs are not sufficient • VLAN tagging does not prevent a tap from capturing data • VLAN tags can be spoofed • If CDE traffic must cross untrusted segments make it strongly encrypted No shared switches or routers • Unless they have a built-in firewall • Overloaded switches can be fooled into mishandling traffic • Routing protocols can be spoofed No shared APs • Unless they have a built-in firewall • Make sure CDE SSID and non- CDE SSID traffic remains separated physically or by a firewall at all times
  • 18. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Corner stone of Aruba Security Architecture  Role-based  Derived from client or server attributes or upon successful authentication  Integrated architecture ensures no spoofing  Every untrusted IP or MAC is assigned a role  Layered: Layer 3 role overrides Layer 2 role  Session ACLs define policy  Applied to all IP traffic (i.e. TCP and UDP)  From untrusted and to untrusted users  Rules allow, deny, or limit bandwidth  Application Level Gateways allow complex protocols through simple rules  FTP active and passive  VoIP – SIP, RTP, etc Policy Enforcement Firewall (PEF)
  • 19. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Role-Based Separation SSID: CORP SSID: GUEST Guest user Employee VoIP Device Contractor Default Captive Portal Switch Router AAA Services Radius, LDAP, AD Mobility Controller Access Point Rights, QoS, VLAN Rights, QoS, VLAN Rights, QoS, VLAN Rights, QoS, VLAN CDE Rights, QoS, VLAN Guest Voice Contractors Employees Sales Multiple Classes of Users on Same Infrastructure are Kept Separate Wired Ports Rights, QoS, VLAN Switch Router
  • 20. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Default Roles • Configurable by authentication method • SSID User Rules • Device-specific attributes • Encryption type • AP used (by name or BSSID) Server Derived Roles • Different access privileges based on security policy • Can use single SSID for all users/devices • Role assignment based on attributes from authentication server Role Derivation
  • 21. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Session processing  Identity-based firewall policies  Traffic management  Protocol processing  Traffic cleanup  Detects SYN, ping, ports scan attacks  Can prevent continued attacks (black list station)  Enforces TCP handshakes, prevents replay attacks  Station blacklisting  Authentication failure  Firewall rule violation  TCP attacks Firewall Processing
  • 22. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Layer 4 – Management  People and process for controlling configuration and operation of the network  Threats  Ignored rogues  Accidental configuration errors  Disgruntled ex-employees  Stolen laptops  Regulation  PCI DSS section 10 requires network and security monitoring  PCI DSS section 12 requires documenting and following security processes
  • 23. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Layer 4 – Management Monitor and Repair • Mitigate rogues using automated methods • Physically remove rogues • Repair configuration problems • Remove user access on termination • Remove device access when devices are lost/stolen • Review firewall hits and address problems Maintain Compliance • Regularly check configuration of all equipment • Regularly review firewall configurations • Regularly confirm authorized users and devices
  • 24. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Monitor and Repair • Wired and wireless containment minimizes the threat of rogue APs • AirWave reports, location, switch, and port of discovered rogues • Send alerts for configuration problems Maintain Compliance • Automatic configuration can repair mistakes • Full log of all configuration changes is kept to prove continuous compliance. • Alerts can be sent if compliance conditions are violated Layer 4 – Secure Management
  • 25. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Deauth  Less impact on the client device  Best for steering authorized clients away from problem APs  Tarpit*  Less RF traffic than deauth and more effective  Best for preventing any access to rogue APs  May confuse client users and client software  Wired Containment  Poison ARP from AP  Shutdown Wired Port with AirWave RAPIDs module Multiple Rogue Containment Methods
  • 26. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Compliance Maintenance Plan Review Period Item Every 90 days (A) Remove unused accounts (8.5.5) Change passwords (8.5.9) Wireless scan (11.1) Vulnerability scan (internal and external) (11.2) Every 6 months (B) All in A Firewall and router configs (1.1.6) Every year (C) All in A + B Pen test (11.3) Security policy (12.1.3) Test Incident Response Plan Rotate crypto keys (3.6.4) (or as recommended by vendor)
  • 27. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Regular reviews of activity, process, and people  Threats  Miscommunication  Disgruntled administrator  Business and regulation changes  Regulation  PCI DSS requirements for process also require its review (e.g. 12.1.3)  PCI DSS is updated every two years Layer 5 – Audit and Report
  • 28. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved. Audit device inventory • AirWave automatically tracks all devices • Device classification can be based on a combination of rules • Authorized devices are managed to ensure compliance Audit configuration • AirWave’s interactive PCI report highlights potential problems • Report can be scheduled or run on demand Keep records • AirWave can keep records for more than a year • Many PCI reports can be kept for comparison • All changes and administrator actions are logged and audited. Layer 5 - Audit and Report
  • 29. Aruba Networks CONFIDENTIAL. © 2010 All Rights Reserved.  Rogues  Classification  Discovery and resolution workflow  Alerting  Configuration  Alert resolution workflow  Reporting  Creating reports  Scheduling reports  Key security reports Demo Flow