Wat zijn de veiligheidsrisico s van SSL- VPN verbindingen voor thuiswerk? Kennisdag Informatieveiligheid bij Gemeentebesturen en OCMW s



Vergelijkbare documenten
Dell SonicWALL product guide

IT Galaxy 2018 ON THE RIGHT TRACK ON THE RIGHT TRACK #PQRITG18 #PQRITG18

Cisco Cloud. Collaboration. Ronald Zondervan David Betlem September, Presentation_ID 2010 Cisco Systems, Inc. All rights reserved.

Targets. Wie zou er iets tegen ons hebben? We zijn toch geen bank? Wat kunnen ze doen met onze gegevens?

Technical Note #047 Auteur:Mark Vork Gemaakt op:14 februari 2003 Gewijzigd op:9 februari 2004

Mobile Devices, Applications and Data

The bad guys. Motivatie. Info. Overtuiging. Winst

Michiel Snoep Remote Access / SSL. 14 april 2005 GvIB, De Kuip Rotterdam

802.11b Wireless router w. 4 port switch. StarTech ID: BR411BWDC

Session Educa-on October 2013

HET NIEUWE WERKEN. Hype of Realiteit


Virtual Enterprise Centralized Desktop

Hoe met Windows 8 te verbinden met NDI Remote Office (NDIRO) How to connect With Windows 8 to NDI Remote Office (NDIRO

VMware View 4.5 een overview. Eline Klooster Technical Trainer

Cloud werkplek anno Cloud werkplek anno 2014

Configureren van een VPN L2TP/IPSEC verbinding

DrayTek Sm art VPN Client. PPTP / I PSec / L2TP

4Passief: n Afluisteren. n Geen gegevens gewijzigd of vernietigd. n Via de routers van WAN. n Via draadloze verbindingen. 4Fysieke afsluiting

tot de nieuwe omgeving. Dus niet alleen de intramurale medewerkers, die in de

Certified Ethical Hacker v9 (CEH v9)

Creating a marketplace where expertise is made available through videoconferencing. Roland Staring Community Support Manager roland.staring@surfnet.

SECURITY UITDAGINGEN 2015

F5 NETWORKS Good, Better & Best. Nick Stokmans Account Manager

VPN Remote Dial In User. DrayTek Smart VPN Client

MANAGED FIREWALL. Bescherming van netwerken en systemen. SOPHOS-UTM Next generation firewall. SOPHOS VS S-BOX Vergelijking Sophos-UTM en S-Box

Settings for the C100BRS4 MAC Address Spoofing with cable Internet.

Enterprise SSO Manager (E-SSOM) Security Model

Configureren van een VPN L2TP/IPSEC verbinding. In combinatie met:

SuperOffice Systeemvereisten

EVO:RAIL VDI AANPAK Plaveit VMware EVO:RAIL de weg voor VDI?

Beveiliging in Industriële netwerken. Waarom monitoring een goed idee is

Tetra Industriële Security

De Enterprise Security Architectuur

PSO bij Ericsson. Loet Pessers Head of HR Netherlands

De Lync naar Het Nieuwe Werken. Utrecht - 25 januari 2011

8 nov InAudit 1. Cybersecurity: moet ROBBERT KRAMER

MCS Mixe Communiction Solutions Jan van Rossum. LoRa als basis voor IoT in gebouwbeheer

Van Small Business Server naar Cloud Small Business Services. Uw vertrouwde Small Business Server in de cloud

Disaster Recovery. VMware Cloud on AWS

Smart data op de werkvloer. Data op het juiste moment, voor de juiste persoon, op de juiste plek

Documentnaam: Technisch Ontwerp Datum: Samenstelling: Bas, Chris & Teun Team Bas / Teun / Chris Versie: 1.4. Overzicht Tekening...

Implementing Citrix NetScaler 11 for App and Desktop Solutions + exam

M : Pro: Windows 7, Enterprise Desktop Support Technician

m.b.v. digitale certificaten en PKI Versie: mei 2002 Beknopte Dienstbeschrijving beveiligen van VPN s

Handleiding installatie VPN Authenticatiesysteem Remote Access Microdata (Versie voor de Mac)

Ontsluiten iprova via Internet Voorbeeld methoden

Third party mededeling

Activant Prophet 21. Prophet 21 Version 12.0 Upgrade Information

Welkom bij IT-Workz. Etten-Leur, 16 november Altijd en overal werken en leren. Applicatie en Desktop Delivery met Quest vworkspace

Zorg dat op de DC een DHCP scope word geïnstalleerd en NPS Role. Vul bij de scope de gateway in van de DC.

Standard Parts Installatie Solid Edge ST3

CompTIA opleidingen. voor beginnende systeembeheerders

Droom of werkelijkheid? Integratie VMware NSX en F5 zorgt voor effectieve uitrol van applicaties.

Configuratie van VPN met L2TP/IPsec

Agenda Next Level in Control. 15:00 16:00 Next Plenair - Control Productivity - Control Security - Control Flexibility

Personalia. Persoonlijkheid. Geboortedatum 14 mei 1985

Welkom. De fysieke beveiliging van uw industriële netwerk. Sjoerd Hakstege van Eekhout Network & Security Specialist Phoenix Contact B.V.

De convergentie naar gemak. Hans Bos,

VPN Remote Dial In User. DrayTek Smart VPN Client

VMWORLD 2011 US WRAP

Apparaten en Azure AD: wie, wat en waar? Sander Berkouwer SCCT

Klanten en Leveranciers moeten samen groeien voor en succesvol toekomst

Next Generation Firewall. Jordy Bax Technology Lead

Connectivity/Magic of Mobility

Handleiding Inloggen Cloudteq Basic

MSSL Dienstbeschrijving

we keep your systems running

Certified Ethical Hacker v9 (CEH v9)

Windows 7 juist nu! Frank Spuls v-fspuls@microsoft.com 11 november 2009

MVoice PP Dealer Handleiding 1.0

Exchange beveiliging; tips die je morgen direct kunt gebruiken!

Hoe te verbinden met NDI Remote Office (NDIRO): Apple OS X How to connect to NDI Remote Office (NDIRO): Apple OS X

DRIVEN BY AMBITION SUCCESVOL EXACT IMPLEMENTEREN IN DE PRIVATE CLOUD

Thin-Clients architectuur bij een farmaceutisch bedrijf.

Een alledaags gegeven

QUICK START. IP cam viewer.

Filr. Sebastiaan Veld Anthony Priestman. 10 april Overview en business case

Windows XP & Windows Vista

DATA LEKKAGE en MELDPLICHT SHADOW IT INTRUSION

Certified Ethical Hacker v9 (CEH v9)

VPN Remote Dial In User. DrayTek Smart VPN Client

Augmented Reality voor de industrie

Bescherming van (software) IP bij uitbesteding van productie

Enabling Enterprise Mobility. Chantal Smelik

Personalia. Persoonlijkheid. Profielschets Roy. Roy. Naam. Geboortedatum 1 november 1993

AlarmShield Interactive Security System Quickstart Guide. Model No. OPG2204

Kennissessie Remote Beheer Met Conel Routers. 23 mei Private GSM Private M2M

De PROFIBUS, PROFINET & IO-Link dag. Ede, 18 november

Is Big Data analytics the next step for SOC's and large companies?

PubliLink Explore: Acces, Services, Security & Reporting

Bart Van Ingelghem Infrastructure Consulting Services - Hybrid Cloud Hyperconverged vs. Traditioneel: voordelen en aandachtspunten

Hoe overleven in een wereld van cyberspionage, hackers en internetoplichters? Jan Verhulst

The Control Room of the Future

End to End Virtualisation

we secure YOUR network Versleuteling voice en data verkeer voor optimale beveiliging verbindingen

SSL VPN. In deze handleiding zullen wij onderstaande SSL mogelijkheden aan u uitleggen. - SSL VPN account/groep creëren.

Netwerkbeveiliging. Sven Sanders

ETS 4.1 Beveiliging & ETS app concept

Transcriptie:

Wat zijn de veiligheidsrisico s van SSL- VPN verbindingen voor thuiswerk? Kennisdag Informatieveiligheid bij Gemeentebesturen en OCMW s

Who am I? Wouter Vloeberghs (ing.) Implementation Consultant ICT bij Ferranti Computer Systems wv@ferranti.be CCSP Cisco Certified Security Professional Working towards CCIE Security

Agenda Introduction to teleworking Introduction to VPN SSL VPN Introduction Security Concerns for SSL VPN Possible Attacks Market Players Recommended Reading

Introduction to teleworking

Why teleworking? Teleworking is becoming more and more popular For employee > Traffic avoidance > Flexibility > Private Life / Work balance > Better concentration higher efficiency For employer > Cost-efficiency (less office space, travel costs) > Less sickness leave > Higher productivity > Motivated employees

Introduction to VPN

Virtual Private Network (VPN) Overview IP security (IPsec) and Secure Socket Layer (SSL) Mechanism for secure communication over IP Authenticity (unforged/trusted party) Integrity (unaltered/tampered) Confidentiality (unread) Remote Access (RA) VPN components Client (sw) Termination device (high number of endpoints) VPN Tunnel VPN Security Appliance VPN Client or Browser

Remote Access VPN over the Internet Remote Access Client IPsec VPN -Layer 3 Microsoft Windows, Mac OS X (L2TP/IPsec) SSL Clientless Layer 7 Enterprise Central Site Router, Firewall and VPN Security Appliance: VPN Tunnel Termination Firewall Telecommuter ADSL Internet VPN Router Mobile Cable Extranet Consumer-to-Business VPN Security Appliance Integrated solution for enhanced remote access Standards-based interoperability

What Are We Talking About? Secure VPN B A N K Tunneling Encryption Authentication* Integrity IPsec L2TP/IPsec TLS (HTTPS/SSL) DTLS DES 3DES AES RC4 RSA digital certificates Pre-Shared key *IKE 1 st Phase, Not User Auth. HMAC-MD5 HMAC-SHA-1

Why SSL VPN? Internal & External Users Financial Partner or Field Agent Logistics Partner Kiosk Managed & Unmanaged Devices Home PC Private Resources Web Apps Client-Server Apps Project Manager Employee Remote Technician Employee Corporate Managed Laptop Unmanaged Partner PC Legacy Apps Third-Party Apps Homegrown Apps File Access

Remote Access Options Dialup? too costly, limited user experience Reverse Proxy? Only Web apps Terminal Services? Not from everywhere Traditional VPN based on IPSec most popular SSL VPN > Limited functionality from firewalled or NAT ed networks / Not very user friendly > Client becomes difficult to roll out / Managed devices only > Requires administrative installation > Potential security exposure by extending network In office experience from anywhere Granular policy control Next-Gen IPv6 - IPSec VPN User friendly: no more FW/NAT problems; seamless access from everywhere Built into client OSs Granular policy control

SSL VPN Introduction Clientless Thin-Client Client-Based Basic web access E-mail access CIFS (Common Internet File System) access Customized user screen Port redirection for only TCP applications Shared Applications Full-SSL tunnel

Deployment Example IPsec and SSL VPN Support Diverse User Populations Supply Partner Extranet Central Site Account Manager Mobile User IP/Internet VPN Software Engineer Telecommuter Clientless (L7) a browser Doctor at Home Unmanaged Desktop Full Network Access (L3) Partner Few apps/servers, tight access control, no control over desktop software environment Doctor Occasional access, few apps, no desktop software control Engineer Many servers/apps, needs native app formats, VoIP, frequent access, long connect times Account Manager Diverse apps, home-grown apps, always works from enterprise-managed desktop

Security Concerns

Security Concerns for SSL VPN Supply Partner Extranet Machine Employee at Home Unmanaged Machine Remote User Customer Managed Machine Before SSL VPN Session Who owns the endpoint? Endpoint security posture: AV, personal firewall? Is malware running? During SSL VPN Session Is session data protected? Are typed passwords protected? Has malware launched? After SSL VPN Session Browser cached intranet Web pages? Browser stored passwords? Downloaded files left behind?

Client Authentication / Authorization

Client Authentication / Authorization Authenticated against: RADIUS TACACS Active Directory (AD) / Kerberos NT Domain RSA SecurID LDAP One-Time Password server (OTP)

Split Tunneling Without Split Tunneling With Split Tunneling http://www.v-ict-or.be Central Site http://www.v-ict-or.be Central Site VPN Appliance VPN Client VPN Appliance VPN Client Maximum Security Maximum Internet Access Performance

Endpoint Security Best Practices by Access Method Full Tunneling Consider as a remote node on network Grant conditional access based on identity and security posture Use Network ACLs filtering to limit access Clientless SSL VPN Grant access for specific applications only Grant conditional access based on identity and security posture Use Web ACL filtering to limit access Protect against leakage of confidential data

Possible Attacks Hardware Keyloggers Directly installed into the keyboard or motherboard Cable-Extension Software Keyloggers Kernel driver Software-Hook Spyware, Malware

Possible Attacks

Security is not only about technology

Secure communication Security Policy Authentication Authorisation Training People Data VPN (SSL/IPSec) Content filtering Data security ID Management Data security Firewall IPS VPN Anti-virus/spam/malware/phishing Infrastructure Network security

Market

Market Players

Recommended Reading

Recommended Reading Telework.gov http://www.telework.gov/policies_and_procedures/te lework_security/index.aspx SP800-46 Guide to Enterprise Telework and Remote Access Security http://csrc.nist.gov/publications/nistpubs/800-46- rev1/sp800-46r1.pdf