Addressing PSN Code of Connection Requirements using ForeScout CounterACT Solution Brief

Transcription

Addressing PSN Code of Connection Requirements using ForeScout CounterACT Solution Brief
Addressing PSN Code of Connection
Requirements using ForeScout
CounterACT
Highlights
Real-time Visibility
Gain automated, real-time visibility of all
devices as they connect to your network,
including mobile, remote, unmanaged
and unauthorised devices.
Asset Intelligence
Generate a real-time inventory of
everything on your network —
devices, hardware, operating systems,
applications, application versions, patch
levels, processes, open ports, peripheral
devices, users and more.
Policy-based Access Control
Limit access to PSN services — allow
only managed devices and authorised
users to connect to the PSN network.
Restrict unmanaged (BYOD) devices to
non-PSN network zones and services.
Continuous Monitoring
Assess the security and compliance
posture of all endpoints in real-time
while they are connected to the PSN
network. Detect endpoint configuration
and compliance violations and tailor
the response based on severity of the
violation.
Automated Remediation
Automate the remediation of noncompliant endpoints by updating
patches, security updates, endpoint
security and management agents,
and installing, activating or disabling
applications or peripherals.
Solution Brief
The Public Services Network (PSN) is an initiative to unify the network infrastructure across the
UK public sector into an interconnected “network of networks”. It creates a single logical network,
based on industry standards, and a more efficient Information and Communication Technology
(ICT) marketplace for the public sector.
The PSN allows public sector organisations to access and use shared services across the central
government as well as the wider public sector. The goal is to reduce the cost of ICT services across
the UK government and enable more citizen-centric services to be handled at the council level.
To achieve greater sharing of ICT services, the PSN has to be an assured network over which
government departments can safely share information. Consequently, the UK Cabinet Office
requires more accountability and a greater focus on compliance to be placed on connected
organisations.
.................................................................................................
A Zero Tolerance Approach to
PSN Compliance
PSN Code of Connection
Requirements
Organisations that wish to connect to the PSN
and use its shared services need to comply
with the PSN Code of Connection (CoCo).
Before your organisation can be connected
to the PSN, you must be accredited and
achieve PSN CoCo compliance. No remedial
action plans or weak compliance positions
are accepted by the PSNA. You will either
be assessed as compliant or your request to
connect will be rejected. To ensure you remain
connected, you need to complete and return
your CoCo annually in advance of expiry.
The PSN CoCo is an Information Assurance
(IA) mechanism to support the connection
of a network to another accredited network,
without increasing or substantially changing
the risks to the already accredited network.
When a network connects to the PSN, the risks
are not just to the PSN itself, but also to all of
the other organisations connected to the PSN.
Thus, the CoCo is intended to create a trust
model across the PSN and between connected
public sector departments. The information
assurance conditions defined in the CoCo
are a framework of controls that must be
applied by any organisation wishing to use
PSN services. These conditions are intended to
provide a baseline connection standard for all
organisations.
The secure sharing of PSN information
and services relies on all public sector
organisations implementing their IA controls
effectively. Consequently, the PSN Authority
(PSNA) that oversees the operational and
compliance aspects of PSN has adopted a zero
tolerance approach to PSN compliance. Noncompliance results in disconnection and the
associated disruption to services.
1
The PSN CoCo covers all users and devices
that have access to the PSN or PSN-connected
systems and services. This includes remote
access and mobile devices. The use of
unmanaged endpoints, including the
use of personal devices (BYOD), to access
the PSN or PSN services is not permitted.
Organisations have to demonstrate that
such devices cannot gain access to the PSN
or PSN-connected systems and services.
The use of unmanaged devices on non-PSN
network zones is allowed as long as they are
prevented from accessing the PSN network
through appropriate access controls and/or
network zoning.
The PSN CoCo requires that your organisation
be able to demonstrate technical control
over any device that has access to PSN
services/networks. Hardware and software
must be locked-down so that functionality is
limited to what is required for the provision
or consumption of PSN services. You must
be able to detect any deviations from your
standard configurations, and you must be able
to prevent execution of unauthorised software.
Addressing PSN Code of Connection
Requirements using ForeScout
CounterACT
Highlights (continued)
Non-disruptive Deployment
Seamlessly deploy within an existing
heterogeneous network without the
need to re-architect the network,
deploy in-line, upgrade the network
infrastructure or install additional
endpoint agents.
Accelerated Results
Achieve meaningful results on Day 1
with rapid and easy deployment and a
built-in knowledge base to configure
and implement security policies quickly
and accurately.
Non-intrusive Experience
Ensure a positive end-user experience
through an easy-to-use, agentless
approach which minimises user
disruption and maximises productivity.
Cost Savings
Deploy a cost-effective PSN security
solution with low TCO and minimal
administrative overhead. Eliminate
manual processes associated with
assessing, reviewing, remediating and
reporting on PSN CoCo compliance.
Solution Brief
In addition to complete visibility of all devices,
you must also demonstrate the ability to assess
endpoint compliance and remediate endpoint
deficiencies. Where possible, you are required
to update to the latest versions of software.
Patches and security updates must be
applied with minimal delay, and they should
be audited to ensure compliance with the
organisation’s policy. You must demonstrate
technical controls for disabling removable
media or restricting connection to authorised
peripheral devices.
Your CoCo submission, and your
implementation of its controls, remains a
cornerstone of the IA trust model. It proves
to other organisations with which you share
information that you have implemented
the appropriate information assurance
controls. Since this end-to-end trust model
places increased focus on the compliance
of connected networks, devices and users,
public sector organisations like yours are
left grappling with several new challenges
including:
•• How do you gain visibility of all devices
connected to the network, including
unmanaged and BYOD endpoints?
•• How can you effectively profile
and classify devices based on type,
connection attributes, ownership and
status (managed vs. unmanaged),
without the use of agents?
•• How do you implement access control
policies to automatically separate and
restrict unmanaged endpoints from
accessing the PSN or PSN originated
data?
•• How to achieve continuous monitoring
of endpoint compliance posture and
continuous mitigation of endpoint
security deficiencies?
Using ForeScout CounterACT™
to Comply with PSN Code of
Connection
ForeScout CounterACT addresses several
key requirements of the PSN CoCo and
can contribute significantly to achieving
compliance with the PSN IA conditions.
CounterACT provides real-time visibility and
control for all endpoints on your network
including laptops, desktops, smartphones,
tablets and other mobile devices connected to
your network.
CounterACT uses a combination of discovery
techniques to accurately classify endpoints
through passive and active interrogation.
CounterACT’s agentless solution enables it to
work with all types of endpoints — managed
and unmanaged, known and unknown (see
Figure 1). CounterACT eliminates blind spots
— if it’s on your network, CounterACT sees it.
•  Employee
•  Partner
•  Guest
Who is the
user?
Restrict to
non-PSN
Network
•  Corporate/council
(managed)
Is the device
managed?
•  BYOD/personal
(unmanaged)
What type of
device?
•  Windows
•  Mac
•  iOS
•  Android
•  Printer/non-user
Is the device
compliant?
•  Configuration
•  Software
•  Security agents
Does device
require
remediation?
•  OS updates
•  Software versions
•  Applications &
active content
•  Removable media
Public
Service
Network
CounterACT
Remediate
Figure 1: ForeScout CounterACT helps achieve PSN compliance by providing complete visibility and control
over managed and unmanaged devices.
© 2013 ForeScout Technologies, Page 2
© 2014 ForeScout Technologies, Page 2
2
Addressing PSN Code of Connection
Requirements using ForeScout
CounterACT
CounterACT can assess the security posture
of all endpoints on your network, including
unmanaged devices that aren’t visible to your
existing endpoint management systems.
Posture assessments can be performed
without the need to install a persistent agent
on devices. This aids in rapid deployment,
ease of operation and low total cost of
ownership of the CounterACT system.
ForeScout CounterACT ensures that only
the right people with the right devices
gain access to the right network resources.
CounterACT can allow, limit or block network
access based on device type, status (managed
or unmanaged), security posture and other
Solution Brief
device attributes. Unmanaged endpoints
can be restricted to specific non-PSN
network zones and enclaves using virtual
firewall technology, VLANs and ACLs.
Non-compliant managed endpoints can be
placed in a remediation zone and allowed
PSN network access only after all compliance
deficiencies are addressed (see Figure 1).
CounterACT can perform a wide range of
compliance checks including monitoring
for required software and software versions/
patches, device configuration and endpoint
vulnerabilities , unauthorised software and
peripherals, just to name a few. CounterACT
can perform automated or administratorinitiated endpoint remediation actions such
as updating antivirus, prompting a patch
management system to update the device’s
operating system, disabling unauthorised
software and peripherals, and re-installing,
enabling, reconfiguring or updating endpoint
security agents.
ForeScout CounterACT is offered as
either a virtual or physical appliance that
deploys seamlessly within your existing
heterogeneous network, requiring no
infrastructure changes or upgrades. The
CounterACT appliance installs out-of-band,
avoiding latency or potential for network
failure, and can be centrally administered
to dynamically manage tens or hundreds of
thousands of endpoints from one console.
PSN Code of Connection Annex B Reference
At its core, the Code of Connection is about creating an end-to-end trust model across the PSN. The CoCo incorporates several control objectives
including aspects of governance, technical interoperability requirements, service management expectations and information assurance
requirements. The table below shows how ForeScout CounterACT addresses several key IA requirements, known as ”Customer IA Conditions” in
the PSN CoCo Template Annex B version 2.7.
Condition No.
Requirement
Relevant CounterACT Functionality
Configuration (CON)
CON.1
Hardware and software shall be locked-down in accordance with the
organisations lock down policy and is part of an overall risk managed
approach so that functionality is limited to what is required for the provision or
consumption of the PSN service.
CounterACT can monitor the hardware and software configuration of all
endpoints to ensure they stay compliant with the organisations policy. It can
detect and remediate configuration drift.
CON.2
The execution of unauthorised software shall be prevented.
CounterACT can perform a wide range of compliance checks including
monitoring and disabling unauthorised software.
CON.3
Organisations shall have in place a configuration control process which prevents
unauthorised changes to the standard build of network devices and hosts.
CounterACT can assess endpoint security and compliance posture, and remediate
endpoint configuration and compliance violations with actions such as:
Deviations from standard configurations, and unauthorised changes should be
detected, either through monitoring, file integrity checking, regular reviews or
IT Health Checks.
Where possible, the latest versions of software, service packs and updates
should be used at the earliest opportunity. These should include the latest
security updates. Older versions of software may be out of support, and security
updates may not be available.
CON.5
Customers allowing active content shall be able to demonstrate that this
is done as part of an overall risk managed approach. Therefore risks from
allowing Active Content shall be understood and appropriate controls shall be
implemented.
•• preventing configuration drift from standard configuration
•• triggering latest patch and security updates to be installed
•• updating software versions
•• updating anti-virus and other security software definitions
CounterACT can restrict devices running active content. It can also ensure that
devices required to run active content are patched with the latest security
updates in order to eliminate known active content vulnerabilities.
Access to active content should be restricted if it is not required.
Compliance Checking (CHE)
CHE.1
Organisations shall implement an annual programme of IT Health Checks to
validate equipment not provided as part of a PSN service that interacts with PSN
services.
It is extremely important to ensure that the operating systems, software and
hardware are configured securely when they are installed and that they are
patched regularly.
3
CounterACT can continuously monitor and remediate endpoint compliance
deficiencies with actions including:
•• preventing configuration drift from standard configuration
•• installing latest patches, security updates and software versions
•• updating anti-virus and other security software definitions
Addressing PSN Code of Connection
Requirements using ForeScout
CounterACT
Condition No.
Solution Brief
Requirement
Relevant CounterACT Functionality
Patch Management (PAT)
PAT.2
Patches shall be applied with minimal delay and audited to ensure compliance
with the organisation’s policy.
CounterACT can directly update or prompt a patch management system to
update an endpoint’s operating system and software.
Access Control (ACC)
ACC.2
The customer shall implement an organisational access control policy that is
deemed sufficient to manage the risk that the organisation is exposed to. This
policy shall cover remote/mobile solutions where appropriate.
CounterACT can allow, limit or block network access based on device type, status
(managed or unmanaged), security posture and user credentials. It integrates with
existing directory systems or other authentication systems.
Removable Media (MED)
MED.1
As part of an overall risk management approach, customers shall have a policy
for removable media that addresses the risks of using removable media.
CounterACT can perform a wide range of compliance checks including
monitoring and disabling unauthorised peripherals such as USB devices.
Technical controls can include disabling devices e.g. through Group policy to
disable USB, or through products that only allow the connection of authorised
devices.
Mobile/Home Working (MOB)
MOB.2
The organisation must be able to show appropriate control and management
of the technical environment of any device that has access to PSN services/
networks.
CounterACT can discover all devices on the network including unmanaged and
rogue devices. Unmanaged endpoints can be restricted to non-PSN network
zones. Managed endpoints are posture checked and then allowed on the PSN
network.
MOB.3
Any mobile/remote device that has access to PSN services/networks shall be
considered by the organisational lockdown and configuration management
policies.
CounterACT can assess the security posture of remote and mobile devices and
remediate endpoint compliance violations with actions such as:
As with any endpoint, mobile devices should run Anti Malware software and
be securely configured. They should also run a personal firewall and all relevant
security patches should be applied.
•• preventing configuration drift from standard configuration
•• triggering latest patch and security updates to be installed
•• updating anti-virus and other security software definitions
•• ensuring mandatory software is installed and running
MOB.5
Remote/mobile devices shall employ encryption to protect data at rest and in
transit. The cryptography used shall have a suitable level of assurance.
CounterACT can continuously monitor endpoints to ensure that encryption
software is installed, enabled and configured correctly.
Wireless Networks (WIR)
WIR.1
Where the customer connects or consumes PSN services from wireless
networks/devices the customer shall do so in accordance with an organisational
wireless policy that identifies and mitigates the risks of using wireless networks/
devices and offers mitigation to those risks i.e. via secure configuration in line
with public sector guidance.
CounterACT can see all devices on the network, including unmanaged and
unauthorised devices. It can block or quarantine unauthorised wireless devices
and rogue wireless access points from the network.
Network vulnerability scanning tools should be used to identify access points,
and any unauthorised devices should be disabled immediately.
Take the ForeScout Challenge
Let us know which ForeScout solution is right for you, and we’ll arrange a free on-site evaluation.
About ForeScout
ForeScout delivers pervasive network security by allowing organisations to continuously monitor and mitigate security exposures and cyber
attacks. The company’s CounterACT appliance dynamically identifies and assesses network users, endpoints and applications to provide visibility,
intelligence and policy-based mitigation of security issues. ForeScout’s open ControlFabric™ technology allows a broad range of IT security
products and management systems to share information and automate remediation actions. Because ForeScout’s solutions are easy to deploy,
unobtrusive, flexible and scalable, they have been chosen by more than 1,500 enterprises and government agencies. Headquartered in Campbell,
California, ForeScout offers its solutions through its network of authorised partners worldwide.
Learn more at www.forescout.com.
...............................................................................................................................................
ForeScout Technologies, Inc.
900 E. Hamilton Ave.,
Suite 300
Campbell, CA 95008
U.S.A.
Contact Us (USA)
T 1-866-377-8771 (US)
T 1-408-213-3191 (Intl.)
F 1-408-371-2284 (Intl.)
www.forescout.com
Contact Us (UK)
T +44(0) 2071 580 827
E networksecurity@forescout.com
©2014 ForeScout Technologies, Inc. Products protected by US Patent #6,363,489, March 2002. All rights reserved. ForeScout Technologies, the ForeScout logo, CounterACT and ControlFabric are
trademarks of ForeScout Technologies, Inc. All other trademarks are the property of their respective owners.
Doc: 2014.0124
4