I know some of us worry that the advent of the "cloud" will spell the end of Network Security Monitoring and related network-centric visibility and instrumentation measures. I have a proposal for any network forensics vendors reading this blog: get in the cloud!
For example, imagine you are a proxy-in-the-cloud (PITC) provider, like ScanSafe, now owned by Cisco. You provide a Web portal to your customers so they can see what bad sites employees were not allowed to visit. But what about all the subtle traffic that evaded your filters, block lists, heuristics, and other defensive mechanisms? What about the insider stealing intellectual property, indistinguishable from a "normal employee?" How does your abuse-centric Web portal address the sorts of threats that really matter?
To me, one answer is to deploy a network forensics solution like NetWitness or Solera in front of your PITC infrastructure. The PITC vendor must have a way to identify legitimate clients, or else you've created the world's greatest open Web proxy. Use the identity information to tag the traffic collected by the network forensics product.
When a customer needs to analyze an intrusion, or conduct an investigation, he can connect to the hosted network forensics platform.
I also like this approach because it helps address the consumerization of IT. You can create a policy (weak I know, but it's an option) that Company users must point any device that processes Company data to the PITC infrastructure for Web access. By doing so you can collect the network forensic data you need.
Of course, encryption is always an issue, but if really necessary I'm sure you can work with the PITC vendor on a MITM approach.
I'm sure I'll get a few comments from critics saying "NSM is dead," "network traffic is worthless," etc. It's just a sign you don't know how to use that sort of data effectively, and probably never will. After evangelizing for 10 years, I've given up trying to convince critics like that.
I also don't intend for this post to be a signal that I hate logs or host-based evidence. It's just another piece in the puzzle.
So, network forensics vendors, who will be the first to publish a press release saying you've partnered with a PITC provider?
Rabu, 14 Juli 2010
Network Forensics Vendors: Get in the Cloud!
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar