Network Forensics Vendors: Get in the Cloud!
I know some of us worry that the advent of the "cloud" will spell the end of Network Security Monitoring and related network-centric visibility and instrumentation measures. I have a proposal for any network forensics vendors reading this blog: get in the cloud!
For example, imagine you are a proxy-in-the-cloud (PITC) provider, like ScanSafe, now owned by Cisco. You provide a Web portal to your customers so they can see what bad sites employees were not allowed to visit. But what about all the subtle traffic that evaded your filters, block lists, heuristics, and other defensive mechanisms? What about the insider stealing intellectual property, indistinguishable from a "normal employee?" How does your abuse-centric Web portal address the sorts of threats that really matter?
To me, one answer is to deploy a network forensics solution like NetWitness or Solera in front of your PITC infrastructure. The PITC vendor must have a way to identify legitimate clients, or else you've created the world's greatest open Web proxy. Use the identity information to tag the traffic collected by the network forensics product.
When a customer needs to analyze an intrusion, or conduct an investigation, he can connect to the hosted network forensics platform.
I also like this approach because it helps address the consumerization of IT. You can create a policy (weak I know, but it's an option) that Company users must point any device that processes Company data to the PITC infrastructure for Web access. By doing so you can collect the network forensic data you need.
Of course, encryption is always an issue, but if really necessary I'm sure you can work with the PITC vendor on a MITM approach.
I'm sure I'll get a few comments from critics saying "NSM is dead," "network traffic is worthless," etc. It's just a sign you don't know how to use that sort of data effectively, and probably never will. After evangelizing for 10 years, I've given up trying to convince critics like that.
I also don't intend for this post to be a signal that I hate logs or host-based evidence. It's just another piece in the puzzle.
So, network forensics vendors, who will be the first to publish a press release saying you've partnered with a PITC provider?
For example, imagine you are a proxy-in-the-cloud (PITC) provider, like ScanSafe, now owned by Cisco. You provide a Web portal to your customers so they can see what bad sites employees were not allowed to visit. But what about all the subtle traffic that evaded your filters, block lists, heuristics, and other defensive mechanisms? What about the insider stealing intellectual property, indistinguishable from a "normal employee?" How does your abuse-centric Web portal address the sorts of threats that really matter?
To me, one answer is to deploy a network forensics solution like NetWitness or Solera in front of your PITC infrastructure. The PITC vendor must have a way to identify legitimate clients, or else you've created the world's greatest open Web proxy. Use the identity information to tag the traffic collected by the network forensics product.
When a customer needs to analyze an intrusion, or conduct an investigation, he can connect to the hosted network forensics platform.
I also like this approach because it helps address the consumerization of IT. You can create a policy (weak I know, but it's an option) that Company users must point any device that processes Company data to the PITC infrastructure for Web access. By doing so you can collect the network forensic data you need.
Of course, encryption is always an issue, but if really necessary I'm sure you can work with the PITC vendor on a MITM approach.
I'm sure I'll get a few comments from critics saying "NSM is dead," "network traffic is worthless," etc. It's just a sign you don't know how to use that sort of data effectively, and probably never will. After evangelizing for 10 years, I've given up trying to convince critics like that.
I also don't intend for this post to be a signal that I hate logs or host-based evidence. It's just another piece in the puzzle.
So, network forensics vendors, who will be the first to publish a press release saying you've partnered with a PITC provider?
Comments
Terremark Leverages NetWitness NextGen™ Security Solution to Protect Enterprise Cloud Customers
Next time you are in the office we'll tell you more about what we have been doing in the cloud... lots going on there to talk about actually... :)
Eddie Schwartz
CSO
NetWitness
As the cloud comes to dominate computing, professional investigators, such as police officers or tax auditors, need reliable methods to record the activity in a dynamic, online venue, such as a Facebook Wall or an online chat room.
This blog article and video demonstrate a new method for capturing and authenticating legal evidence:
http://legal-beagle.typepad.com/wrights_legal_beagle/2011/04/credible.html
What do you think? --Ben