financial services it
Transcription
financial services it
FINANCIAL SERVICES IT Security Reference Blueprint for Financial Services IT security and network teams at financial institutions around the world must address demands to rapidly adopt new technology, protect intellectual property, secure a myriad of mass market and custom applications and comply with regulations. While d oing the above, they must also enable secure access to personal and commercial financial data and corporate data from a variety of access points – retail branches, campuses sites, mobile devices, ATM networks, and third-party business partner networks in light of an increasing volume and sophistication of threats. The S ecurity Reference B lueprint for Financial Services enables institutions to address all of these concerns, augment the security of existing infrastructure, e nable new applications, provide greater access to data, and prevent advanced threats without disrupting vital business operations. Palo Alto Networks | White Paper Table of Contents I. Executive Summary 3 II. Security Concerns for the Banking Industry 3 Complex Environments 3 Security Sprawl 3 The Response 3 III. Reference Blueprint Goals and Security Principles 4 IV. Core Security Principles 4 V. Policy-Based Application Visibility and Enforcement 4 Network Segmentation and Zero Trust 6 Protection Across the Network 7 a. Private, Public and Hybrid Clouds 7 b. Endpoints 8 Advanced or Zero-Day Attack Prevention 9 Timely Reporting, Threat Intelligence and Correlation 9 Security Reference Blueprint for Financial Services IT 9 DMZ 10 Corporate Data Center Zone 10 Endpoints 11 Centralized Monitoring and Management 11 Migration to Palo Alto Networks Next-Generation Security Platform 11 VI. Conclusion Palo Alto Networks | White Paper 12 2 I. EXECUTIVE SUMMARY The Security Reference Blueprint for Financial Services IT enables institutions to augment the security of existing infrastructure, enable new applications, provide greater access to data, and prevent advanced threats without disrupting vital operations. This approach allows the institution to more effectively focus on today’s evolving security threats, protect customer data from compromise, better address the expanding scope of compliance, improve uptime and availability, and meet technological and competitive challenges, such as networked mobile devices or the shift to cloud-based computing. All of this can be done while complementing existing security capabilities as part of a layered defense approach. II. SECURITY CONCERNS FOR THE FINANCIAL SERVICES As the primary custodians of both personal and corporate financial assets, the financial services industry remains one of the largest targets for attack. Financial services is among the top three industries for security incidents, and the top for confirmed data loss.1 Moreover, financial services accounted for 35 percent of breaches across all industries. Cyber attackers seek to drain accounts of their funds, by obtaining personally identifiable information (PII) for identity theft or credit card fraud, or to destabilize global financial markets in order to further political or other agendas. At the same time, changing end-user dynamics, such as mobility, and network dynamics, such as SaaS, IaaS and PaaS cloud-based extensions to internal networks, have the potential to increase business, operational, market and reputational risks, if not appropriately secured. The combination of these realities with the growth in demand from customers, employees, business partners and investors for anytime, anywhere access to financial information; and the considerable regulatory, business and technological changes in financial services environments today, have increased the need for secure networks that can seamlessly evolve. Complex Environments In addition to malware attacks, financial institutions face challenges that include: • Managing a complex mix of applications, such as internally developed software, commercial applications (which are often highly customized) or the result of mergers and acquisitions. • Maintaining a multi-vendor approach for technology to address resiliency and vendor management concerns. • Coordinating among geographically dispersed stakeholders who span organizational boundaries and have differing responsibilities and perspectives. • Supporting IT infrastructure for multiple lines of business that have varying requirements. For example, low-latency trading applications have distinct needs from other banking applications. • Adhering to a complex mix of regional, national, state and industry regulations, resulting in increased costs for compliance, as well as causing dramatic operational and business model changes. Some of these call for a layered defense approach and other recommendations that may not necessarily improve cybersecurity, but are required as a cost of doing business. • Shifting working capital (for example, the Volcker Rule of the Dodd-Frank Act in the U.S.) affecting investments in operations and businesses. Consequently, many institutions have been in a cost optimization mode for a number of years. Security Sprawl The complexity of these challenges is exacerbated by the fact that many institutions have acquired multiple instances of security products that are blind to one another, cannot function cohesively, and thus reduce effectiveness. Some of this security infrastructure sprawl was intentional in support of a layered defense approach along with the belief that “defense in depth” equates to “vendor in depth” (i.e., if one system missed the attack or malware, the other would catch it). Whatever the intention, the sophistication of the attacker soon outpaced the capabilities of the current tools, leading financial institutions to buy yet again the nextbest, available technology to defend themselves. The Response Unfortunately, large financial institutions can neither easily unwind nor consolidate their legacy security packages without potentially causing significant operational and business risk. To prevent today’s threats, a new and effective approach to security, which incorporates key security principles focused on the current threat environment, can complement or replace, where possible, existing security infrastructures. An effective security approach that incorporates several key security principles can address the types of 1. The 2016 Verizon Data Breach Investigations Report. Palo Alto Networks | White Paper 3 exposure and damage cited above, as well as reduce inefficiencies caused by unauthorized applications or misuse of network resources. This paper discusses a security reference blueprint using the Palo Alto Networks® Next-Generation Security Platform to enable financial institutions to implement these principles to detect and prevent threats to their networks, and improve network efficiency, while reducing complexity and unnecessary overhead. It also provides a way not only to secure these environments but also to gather intelligence about the incursion so that the damage from future attacks can be mitigated or eliminated. III. REFERENCE BLUEPRINT GOALS AND SECURITY PRINCIPLES This Reference Blueprint for Financial Services IT describes a transparent, non-disruptive security framework that uses the capabilities of the Palo Alto Networks Next-Generation Security Platform to buttress and enhance the security of existing financial technology infrastructure. Using the Reference Blueprint enables IT security and networking professionals to: • Reduce the overall, exposed attack surface. • Eliminate the ability of a risky, unknown application to access or embed itself within the network. • Prevent data breaches and the loss of sensitive, confidential customer financial information and other sensitive records. • Focus on key network infrastructure assets that require extra scrutiny to preserve security and prevent data leakage. For example, any resources open to third parties, such as business process outsourcing, direct customer access, and external business partners, warrant tighter controls. • Protect vital operational networks from unwanted downtime or service interruption caused by a security breach. • Comply with relevant global and regional government regulatory bodies (e.g., Federal Reserve, OCC, SEC, FCA, EBA, MAS) and industry standards (e.g., PCI DSS, FINRA). • Utilize desired elements of the Palo Alto Networks Next-Generation Security Platform to complement existing investments in security products. Palo Alto Networks has extensive technology partnerships with many leading companies (e.g., Proofpoint, Tanium, VMware) to ensure that mutual customers experience seamless integration. The Reference Blueprint allows financial institutions to not only detect and prevent today’s network threats but also extend protection to endpoints. In addition, it will provide an opportunity to gather and correlate data about the intrusion from multiple, integrated data collection points to help the solution evolve and keep pace with the adversary. The Reference Blueprint incorporates core security principles that will effectively and efficiently protect the institution, whether the traffic travels on its network or off, the threat is from the inside or the outside, that threat is known or unknown, or the exposure is intentional or accidental. These core security principles include: • Visibility and effective control and enablement of applications and activity to reduce the threat footprint and minimize needless bandwidth consumption. • Segmentation to prevent the movement of malware and cybercriminals throughout the entire network to protect and defend systems at all portions of the network. • Protection and defense of systems includes endpoints that are temporarily off-network (e.g., mobile devices, laptops). • Advanced malware detection to identify and prevent zero-day, as well as known, attacks. • Timely reporting to enable IT, cybersecurity and intelligence professionals to coordinate actions. • Immediate and automatic sharing and distribution of threat intelligence between systems. The subsequent sections address each of these principles in detail. IV. CORE SECURITY PRINCIPLES Policy-Based Application Visibility and Enforcement To effectively protect a financial network, security and network teams must have visibility into applications, connected devices, and individual users and their impact on security. Internal teams can make contextual, policybased decisions regarding which applications to allow or block for specific user communities or groups. This provides much more flexibility when catering to the needs of specially designated network users, or groups of users, while drastically reducing the threats on the network. Palo Alto Networks | White Paper 4 By using a next-generation security appliance to characterize applications, financial institutions can immediately reduce their threat posture. The institution can choose to block applications that carry the highest risk (such as P2P applications), which immediately reduces the network’s threat footprint, exposure to potentially malicious software, and the likelihood of a data breach. Palo Alto Networks can provide a free Security Lifecycle Review that consists of a one-week analysis of your environment with a complete report at the conclusion. For more information: https://go.paloaltonetworks.com/slrdm To protect the network using this level of visibility, the security platform can provide: • Application identification that provides visibility and control over applications which attempt to evade detection by masquerading as legitimate traffic, hopping ports, or sneaking into the network using encryption (SSL and SSH). • User identification that allows you to safely enable applications and content based on the employee and group identity information stored in enterprise directories. • Content identification that combines a real-time threat prevention engine with a comprehensive URL database and elements of application identification to limit unauthorized data and file transfers and detect and block a wide range of exploits, malware and dangerous web surfing, as well as targeted and unknown threats. As part of the application policy creation process, financial institutions can approve applications by user group in context – ensuring access to the applications that they need. It is important to note that using a port-based firewall or applying port-based policies on a firewall cannot distinguish the status of an application as risky, simply unauthorized, or safe and of business value. To move to an application-based threat prevention model: • Start implementing application-based security policies for a few non-critical applications with smaller user bases in order to demonstrate success. • Develop a strategy to implement application-based security policies in-line with the institution’s business objectives. For example, some may decide to start with the highest-risk and business-critical applications; others may prefer a location-based rollout of application-based rules. • Identify locally developed business applications and build custom App-IDs to enable recognition by the next-generation security appliance. Financial institutions may have homegrown applications for their bank tellers, financial advisors, etc. Multiple instances of these may exist if the organization came together via a merger or acquisition. • Alternatively lock down applications according to the approved strategy, and enforce consistent security policy rules for users and groups with similar access and application requirements. Application-based security policies can help control access in the following ways: • Identify frequently used applications, so you can more easily highlight unknown or potentially risky applications. You can first monitor traffic across your next-generation security appliance to learn and understand what’s legitimate or not and put a traffic classification strategy in place. • Identify risky applications, for instance: ◦◦ ◦◦ ◦◦ ◦◦ Cloud-based file sharing sites (e.g., Dropbox) Data transfer and exfiltration Suspicious DNS (e.g., new, uncategorized domain names) P2P • Look for other dynamics within your environment such as: ◦◦ Port scanners and/or vulnerability scanners ◦◦ Third-party networks that are not approved • Build groups for traffic types to always block: ◦◦ Such applications as Tor, BitTorrent and Dropbox ◦◦ IP ranges based on geographic location (e.g., does your data center need to talk to addresses on the China internet?) Palo Alto Networks | White Paper 5 • Identify, monitor and analyze all encrypted traffic (SSL/TLS) especially from external websites. While many applications and websites use encryption for privacy, malware authors are increasingly delivering encrypted malware payloads. All encrypted network traffic should be examined for the presence of malware or inappropriate usage. By implementing granular application identification, not just port-based filtering, the administrator is in a position to gain greater visibility and control and reduce risk significantly. As shown in Figure 1, the Application Command Center (ACC) within the security platform depicts the top applications and sources on the network, which you can use to understand the needs of your particular organization while making decisions on how best to reduce risk with application whitelisting. Figure 1: : ACC indicates the top applications in use on the network, activity by user, threats, and other blocked activity to help you gain visibility and develop and evolve policies for your network. Network Segmentation and Zero Trust In some of the latest targeted attacks, attackers have used spear phishing and social engineering techniques to gain access through an unwitting victim on the target network. Many attackers are not only able to penetrate their target network but often successfully establish a beachhead and remain undetected for a significant period of time while continuing damaging, evasive action. The Zero Trust approach to enterprise network architecture, first coined by Forrester2, makes it very difficult for such an adversary to succeed. This same approach makes it difficult for everyday malware to move across the network. Based upon verification of all users, devices and applications traversing your network, establishing Zero Trust boundaries3 effectively compartmentalizes your user groups, devices and/or data types (such as PCI and banking-regulated data). There are three major benefits of segmenting your network into discrete zones: • Limit the scope of vulnerability: Separate vulnerable parts of the network, or older legacy servers that cannot be patched, from others. • Segmentation limits the amount of data that may be exposed and compromised in the event of a breach. • Limit the scope of compliance: Fewer systems are subject to compliance audits. 2. www.forrester.com 3. M any organizations use virtual local area networks (VLANs) to segment their network, but VLANs simply isolate network traffic – they are unable to enforce the control of privileged information. In addition, by itself, a VLAN cannot inspect traffic for threats. Palo Alto Networks | Financial Services IT White Paper 6 Network segmentation can focus on isolating and protecting systems based primarily on the sensitivity level of the data contained within the zone and the level of risk if that data is exposed. The next-generation security appliance can be configured to block all traffic into the zone and use whitelisting to allow only known, trusted traffic. Whitelisted applications are then continuously monitored for security vulnerabilities and malicious activity. This tactic stops unknown, malicious software from entering the zone. The appliance can be configured to control which users have access to data or applications within the zone. It also reduces the effort required to demonstrate compliance (e.g., during an audit) by limiting compliance reviews to only the type of data stored in that zone. There are two separate, but complementary, segmentation strategies: • Control “north-south” traffic entering a network perimeter zone or private, public or hybrid cloud. • Control “east-west” traffic entering and exiting virtual machines (VMs). These Zero Trust boundaries, zones or virtual segments of the network enable you to defend each zone from any malicious traffic either entering or exiting that zone. To prevent malware movement and defeat lateral movement of advanced attackers through a target financial services network and thwart the attack, it is necessary to apply the controls at all of these key entry and exit points. Segmentation zone examples can include: • Applications and databases containing personal financial information (customer information file, loan processing, credit card, etc.) belonging to one line of business (e.g., consumer banking) • Administrative data and applications (HR, payroll, legal, etc.) • Networked or mobile financial devices • Specialized geographic zones that are considered high-risk areas (e.g., due to a pending acquisition or geo-political conditions) • Access to external business partners, such as market data providers, stock exchanges, payment networks, external ATM networks, etc. Some specific examples include Thomson Reuters, Bloomberg, NYSE, LSE, Deutsche Boerse, and SWIFT. • Customer-accessible applications and resources either via the internet or direct WAN connections Each zone in the network should be protected by its own next-generation security appliance, which brings several benefits. Beyond validating the whitelisted applications and their intended users, the security platform performs several other important security functions on traffic entering and exiting a zone: • Threat prevention, which blocks malicious files, with signatures for known threats. • On-premises or cloud-based malware execution and analysis environment, which detects and subsequently blocks zero-day threats. • URL filtering, which blocks access to malicious websites and URLs and shares newly discovered malicious domains and IP addresses internally or with the community cloud as they’re discovered. Although Zero Trust can be viewed as the ultimate goal, it may be still perceived as a significant challenge as many financial institutions have essentially flat and open networks. However, even by taking a few steps toward a Zero Trust approach with network segmentation, institutions can protect critical financial functions and sensitive information from exfiltration by unauthorized applications or users, reduce the exposure of vulnerable systems, and prevent the movement of malware throughout the network. Protection Across the Network In addition to application visibility and network segmentation, to ensure effective security across the cyberattack lifecycle, there are a few other considerations for your network. Private, Public and Hybrid Clouds A significant trend in the financial services industry is the move from a traditional data center architecture to a private, public or hybrid cloud infrastructure. Implementing virtualization for existing applications within the data center reduces costs, enhances business flexibility, and improves security. Moreover, it provides a Palo Alto Networks | Financial Services IT White Paper VMware and Palo Alto Networks have integrated security for software-defined networks to provide: • Automated, transparent insertion of next-generation network security services in software-defined data centers • Complete next-generation security capabilities for all traffic within the data center • Dynamic security policies that understand the context of the virtual machines in the data center https://www.paloaltonetworks.com/partners/vmware.html 7 foundation that simplifies future migration to a cloud computing environment. Although the financial services industry has been relatively slow to adopt the public cloud due to security concerns, many institutions are finally taking steps to explore, if not embrace it. In line with their multi-vendor philosophy, financial institutions will likely adopt at least two public cloud providers for diversity and flexibility. While network segmentation addresses the protection of both “north-south” traffic entering and exiting the data centers and “east-west” (VM segmentation) traffic between applications within those data centers on their own segments, it is worth noting a few more considerations for these environments: • R eliability: Consider active/active high availability for your “north-south” boundary appliances to synchronize their configuration and session information continuously, ensuring that, in the event of a hardware failure, no traffic is lost and performance is not degraded. Did you know? Palo Alto Networks Next-Generation Security Platform provides visibility and control over SaaS applications in your network. Then, among your sanctioned SaaS applications, Palo Alto Networks Aperture™ SaaS security service provides protection of your data in those SaaS environments, with complete visibility across user, folder and file activity to prevent exposure. • Orchestration and management: Use centralized management to ensure policies can keep pace with the rate of change to your virtualized workloads. In VMware® NSX™ deployments, automate virtualized next-generation security appliance provisioning through predefined APIs. • Policy consistency: Centrally define and consistently apply policies to all devices to reduce complexity and use centralized management to serve as a single point of control for all security appliances both physical and virtual; otherwise gaps in threat protection are possible. Additionally, extending next-generation security capabilities to your SaaS environments is important to protect data from accidental disclosure and the network from threats originating in SaaS. Ensure only approved SaaS applications are allowed on your network, and then extend your security policies to that of your SaaS applications. Endpoints To effectively protect all endpoints on the network, IT teams should enforce the Zero Trust model down to the laptops, PCs, and servers. Particular attention should be paid to the endpoints where threats from external sources can impact critical business processes. For example, endpoints dedicated for use by business process outsourcing or third-party software developers may warrant greater protection than employee desktops. Even employee endpoints are not all created equal. Desktops for bank tellers or financial advisors are more valuable targets than those of Procurement team members. This is particularly true where the organization may be running legacy endpoint systems or those with unpatched or unpatchable systems, such as Windows XP, which are no longer supported by their vendors. All endpoints should be covered by your endpoint security strategy, including virtual and physical desktops, laptops, servers and ATMs, regardless of patch, signature or software-update levels.4 There are two main threats to the endpoint: executable malware (.exe) and exploits that target specific application vulnerabilities (.doc/ docx, .ppt/.pptx., .pdf, etc.). It is critical to protect against both, but exploit prevention is particularly important, even within whitelisted applications, as zero-day threats can appear at any time. To effectively protect the endpoint: • Employ lightweight agents to monitor for both exploit techniques and malicious executables. The Palo Alto Networks Next-Generation Security Platform is a natively integrated platform that brings network, cloud and endpoint security into a common architecture, with complete visibility and control. This platform approach ensures your organization can detect and prevent attacks, streamlines day-to-day operations, boosts security efficacy, and prevents threats at each stage of the attack lifecycle. https:// www.paloaltonetworks.com/products/ platforms.html Security subscriptions on the platform are seamlessly integrated to add protection from both known and unknown threats, classification and filtering of URLs, and the ability to build logical policies based on the specific security posture of a user’s device. https://www.paloaltonetworks.com/ products/platforms/subscriptions.html Palo Alto Networks WildFire cloudbased or on-premises malware analysis environment, provides dynamic analysis of suspicious content in a virtual environment to discover unknown threats. It then automatically creates and enforces content-based malware protections. It also detects malicious links in email, proactively blocking access to malicious websites. 4. L aptops can be especially at risk if users are hit with malware on a public network, such as a Wi-Fi hot spot at a hotel or airport. If a returning user then connects an infected laptop to the corporate network, the risk of infecting other systems undetected increases significantly. Palo Alto Networks | Financial Services IT White Paper 8 • Apply policy-based restrictions: Organizations can easily set up policies restricting specific execution scenarios. For example, you may want to prevent the execution of files in the Outlook® temporary directory or the execution of a particular file type directly from a USB drive. • Reconsider your antivirus strategy. Antivirus solutions have proven to be ineffective as compromises continue to grow. Security and IT teams should also enforce the Zero Trust model for mobile and specialized devices. There are three major categories of mobile and specialized devices to consider: Windows® or Mac® laptops, smartphones and tablets (e.g., iPad®, iPhone®, Android™), and specialized devices (ATMs, POS, etc.) Depending on the type of device, these capabilities should be incorporated into the security program for mobile devices, where possible: • Secure connectivity via a VPN tunnel over the internet to the corporate network should be used to protect communications. • All managed devices should be checked for security status regularly to ensure they have updated security protections. • All mobile malware on the device that could impact the institution’s network should be identified and addressed. • When a device is verified to be up-to-date and clean of malware, granular policies should be established to determine which users and devices can access sensitive applications and data from a mobile device. The policy criteria can be based on application, user, content, device and device state: ◦◦ ◦◦ ◦◦ ◦◦ ◦◦ Identify device types, such as iOS, Android, Windows and Mac devices. Identify device ownership, such as personal (BYOD) or company-issued. Identify undesirable, insecure device states, such as rooted or jailbroken. Apply file blocking based on content and content type. Control data movement between apps on the mobile device. • On an ongoing basis, the same scanning should be applied as that on the network: ongoing vulnerability (IPS) and malware protection for mobile threats and URL filtering for malicious websites. Advanced or Zero-Day Attack Prevention Advanced attacks and zero-day malware must be handled swiftly, and automation must be used to ensure threat prevention immediately upon attack or zero-day discovery. This is critical to prevent subsequent evasion and attack attempts. When any unknown file attempts to enter a trusted perimeter or network zone, that file should be detonated within an advanced malware execution environment for static and dynamic analysis. Automatic signature generation of any newly discovered threats are then published to all subscribed next-generation security appliances. Moreover, newly discovered command-and-control domains and other malicious website information are automatically pushed to update URL filtering databases. Timely Reporting, Threat Intelligence and Correlation Cohesion between IT, cybersecurity and intelligence professionals is important for reducing the threats to any network. Coordinate across endpoint, data center, networking and security teams to understand the potential threats to your financial institution’s network to improve security, ensure immediate access to priority events, and enable the automatic sharing and distribution of intelligence. With a next-generation security platform approach, this coordination and collaboration is easier because of the interoperability across all of the security capabilities discussed above. Individual next-generation security appliance and management appliance views can be customized per administrator or department while still sharing a view into alerts and other activities of interest across the financial institution’s network. Refer to Section V for an overview of specific capabilities that improve this reporting and threat intelligence correlation. V. THE SECURITY REFERENCE BLUEPRINT FOR FINANCIAL SERVICES IT The key security principles outlined in this paper can be fully realized with the capabilities of the Palo Alto Networks Next-Generation Security Platform to protect your organization from endpoint to network core. This section provides a high-level reference blueprint for Financial Services IT that incorporates the security principles using the security platform. While your architecture decisions, including appropriate network segmentation, will be determined by your own unique network requirements, in this example, the financial institution’s network is segmented into multiple security zones: a two-part DMZ, a corporate data center zone, private/hybrid cloud, internal corporate access points (campus, remote offices), and external zones for third parties (partners, vendors, customers). Within the data center, further segmentation by line of business (e.g., consumer banking, institutional banking, corporate services) is also depicted. Palo Alto Networks | Financial Services IT White Paper 9 Software as a Service (SaaS) Consumers Online Teleworkers Public Cloud Third-Party Services TR TR GP GlobalProtect AP Retail Branches V SeM ries Virtual Next-Generation Security Appliance Next-Generation Security Appliance Wi-Fi Campus/HQ TR Wi-Fi Teller Next-Generation Security Appliance Next-Generation Security Appliance Aperture WF WildFire Private WAN INTERNET Private LAN/WAN DMZ Next-Generation Security Appliance GP Web Server VPN Gateway Proxy Data Center Next-Generation Security Appliance TR A M RA O N PA V SeM ries Virtual Next-Generation Security Appliance Private Cloud Network Security Mgmt. Consumer Banking Institutional Banking WF WildFire Appliance Development Corporate Active Directory (LDAP) Traps Figure 2: Financial Services Reference Blueprint * All Palo Alto Networks security appliances can be either physical or virtual All traffic into and out of all zones (DMZ, data center, etc.) can be scanned by Palo Alto Networks nextgeneration appliances – virtual or physical – to guard against malicious payloads or inappropriate data leakage with the enforcement of policies leveraging the aforementioned application, user and content identification. • URL filtering: Enables access to all whitelisted sites with bandwidth control for designated categories and more. • Known threat prevention: Detects and blocks common or known malware on the network. Commandand-control signatures flag both inbound and outbound requests to malicious domains, protecting your data from being stolen, while DNS sinkhole technology allows an administrator to redirect any outbound request to a malicious domain or IP address to an internal IP address. This feature prevents those requests from ever leaving the network and compiles a report of compromised machines on which incident response teams can act. • Advanced or zero-day attack prevention: Advanced threat detection and prevention using a malware execu- tion environment for automatic signature generation for all deployed security appliances. All unidentified files should be sent to the Palo Alto Networks WildFire™ environment for the static and dynamic analysis of potential threats. This capability can be deployed as an on-premises appliance or as a cloud-based subscription service. Data on previously unknown, zero-day threats that are identified are automatically distributed to all subscribed WildFire customers. DMZ The DMZ is externally facing as shown in Figure 2. The outer portion of the DMZ provides the primary line of defense, including protection against DDoS attacks with the Palo Alto Networks Next-Generation Security Appliance. Behind it, at the inner portion of the DMZ, is either a virtual or physical appliance that limits traffic toward the internal network and implements first-level URL and content filtering for outbound traffic. Note that, while the diagram illustrates a single security appliance for the network perimeter, it can also easily be configured with a separate security appliance for each external entry point, such as online customers using Palo Alto Networks | Financial Services IT White Paper 10 a mobile app via the internet or branch tellers using a private WAN. This may be warranted to reduce the fault domain and suit business-specific change control windows. A separate security appliance controls traffic into and out of the data center zone. Using the Zero Trust model, the security platform is programmed to reject all traffic that is not whitelisted. This ensures that only authenticated applications, users or content can enter the network. Corporate Data Center Zone Palo Alto Networks Traps advanced endpoint protection is designed to identify exploits as they attempt to execute and block the execution of malicious code. Traditional antivirus software depends on malware signatures, which may not always be up-to-date in the case of zero-day malware or exploits. Rather than run as a separate process scanning for malware, the Traps agent automatically injects itself into each process as it is started and monitors all application activity, looking for patterns of behavior that are unusual or that have been seen with previously documented exploits. When it identifies such behavior, the agent will automatically trigger and block the advanced attack that would otherwise evade detection. Remote and external users, such as branch tellers and ATMs, access the data center zone via a WAN or the internet, while internal users and mobile devices (e.g., laptops, tablets and smartphones) in the corporate HQ zone access it via a private WAN or LAN. Desktop computers and servers in the Campus/HQ zone are protected by another security appliance, ensuring those systems are not vulnerable to attack. Furthermore, different departments may also be segmented from one another to provide additional compartmentalization. The use of private and public clouds is growing rapidly, so the cloud zones are also protected by their own next-generation security appliance (physical or virtual) instances. For orchestration, Palo Alto Networks offers an XML management API that enables external cloud orchestration software to connect over an encrypted SSL link to manage and configure the next-generation security appliances. The exhaustive and fully documented REST-based API allows configuration parameters to be seen, set and modified as needed. Turnkey service templating can be defined for cloud orchestration software, so that the security features within the next-generation security appliance become part of the data center workflow. Palo Alto Networks Panorama can also centralize management to ensure policies keep pace with the rate of change to your virtualized workloads. In VMware NSX deployments, automated appliance provisioning is accomplished through predefined APIs. The Palo Alto Networks VM-Series virtualized appliances support the same security features available with the physical appliances, allowing for the safe enablement of applications flowing into and across your private, public and hybrid cloud computing environments. The VM-Series supports VMware® ESXi™, NSX™ and vCloud® Air™, Amazon® Web Services (including AWS® GovCloud), Microsoft® Azure™, KVM/OpenStack™ (open source), and Citrix® Netscaler® SDX™. For a complete list of private and public cloud security considerations, refer to Security Considerations for Private vs. Public Clouds. Endpoints Due to the challenges with patch management, current software levels on endpoints are difficult to maintain. Traps, with its multi-method prevention techniques for malware and exploits, can serve as a compensating control and is also a suitable replacement for antivirus. Internal endpoints (e.g., Windows® XP with SP3, Windows Vista®, Windows 7, Windows 8.1, Windows 10) and Windows Server® platforms (e.g., Windows Server 2003, Windows Server 2008, Windows Server 2012) can be protected with Palo Alto Networks Traps™ advanced endpoint protection to ensure that any exploits on vulnerable systems, regardless of patch status, are immediately thwarted. The agent will automatically prevent attacks with blocking techniques, such as thread injection. When unknown .exe files are discovered, the Traps agent will automatically query the WildFire threat intelligence cloud with a hash and submit any unknown .exe files to assess their standing within the community. Mobile devices (including both PCs and handheld devices) can be protected by Palo Alto Networks GlobalProtect™ network security client for endpoints. All unidentified files should be sent to the WildFire environment for the static and dynamic analysis of potential mobile threats. Enable GlobalProtect with twofactor authentication for even more protection for mobile devices. Centralized Monitoring and Management Panorama™ network security management enables you to control your distributed network of our nextgeneration security appliances from one central location. View all your next-generation security appliance Palo Alto Networks | Financial Services IT White Paper 11 Palo Alto Networks GlobalProtect consists of 3 components: GlobalProtect Gateway Prevents mobile threats and policy enforcement based on applications, users, content, device and device state. Extends a VPN tunnel to mo- bile devices with the GlobalProtect application. Integrates with advanced malware analysis environment to prevent new malware. GlobalProtect Application Manages device, provides device state information, like encryption status, and establishes secure connectivity. Connects to the GlobalProtect Gateway to access applications and data in accordance to policy. Exchanges device configuration and device state with the GlobalProtect Mobile Security Manager. traffic, manage all aspects of device configuration, push global policies, and generate reports on traffic patterns or security incidents — all from a single console. Panorama reduces network complexity with logical, functional device groups, simplifies network management with easy, global policy control, and reduces the time threats linger on your network with actionable data highlighting critical information for response prioritization. Leading automated threat correlation enables users to detect advanced threats that would otherwise go unnoticed by connecting the dots between indicators of compromise (IoCs) across your entire network. GlobalProtect Mobile Security Manager Threat Intelligence and Correlation Provides device management to configure the device. Uses advanced malware signatures to identify devices with infected applications. Shares information about the device and device state with GlobalProtect Gateway for enforcing security policies. Hosts an enterprise app store for managing business apps. Isolates business data by controlling lateral data movement between business and personal apps. The combination of these products and their integrated reporting capabilities allows security administrators to coordinate insights to improve security, ensure immediate access to priority events, and enable the automatic sharing and distribution of intelligence. This coordination and collaboration is easier with interoperability across all of the security capabilities discussed above. Individual next-generation security appliance and management appliance views can be customized per administrator or department while still sharing a view into alerts and other activities of interest across the institution’s network. Within your own financial services network, Palo Alto Networks provides prioritized, actionable security intelligence on attacks that merit immediate attention in the AutoFocus™ contextual threat intelligence service. AutoFocus builds on billions of threat artifacts from over 10,000 WildFire subscribers and applies unique large-scale statistical analysis, human intelligence from the Palo Alto Networks threat intelligence team, and tagged indicators from your organization and a global community of cybersecurity experts who are also using the service. AutoFocus provides full context on attacks, such as the perpetrator(s), how they are attempting to compromise the network, and if any indicators of compromise are already present on the network. Moreover, AutoFocus can filter security intelligence explicitly for the financial services industry. Often, the same industry faces attacks by the same adversary, which rationalizes the need to share intelligence within the community. Palo Alto Networks Threat Intelligence Cloud community enables swift sharing of threat signatures so that all parties can benefit from threats discovered across all organizations and within your industry, while AutoFocus enables organizations within the same industry to understand what others have already seen within their networks. Through MineMeld, an open-source tool, organizations can integrate public, private and commercial intelligence feeds. Moreover, AutoFocus can also feed indicators into MineMeld, which can then automatically create new prevention controls for Palo Alto Networks security appliances. Ultimately, this enables organizations to take action on the indicators of compromise (IOCs) by generating new prevention-based enforcement for their security services. Migration to Palo Alto Networks Next-Generation Security Platform When you are ready to realize the threat prevention benefits of the Palo Alto Networks Next-Generation Security Platform, the Palo Alto Networks Migration Tool5 makes it easy to migrate from IP/port-based firewall rules in legacy firewalls4 to application-based rules in Palo Alto Networks next-generation appliances while minimizing the risks of the change. As previously shown in Figure 1, the Palo Alto Networks Application Command Center depicts the top applications and sources that you can use in establishing visibility to understand the needs of your particular organization while making decisions on how best to reduce risk. 5. The Palo Alto Networks Migration Tool is compatible with Juniper, Cisco, Check Point, Fortinet and McAfee configuration files. Palo Alto Networks | Financial Services IT White Paper 12 A phased approach via documented change control is highly recommended. Successful deployments typically first perform a like-for-like migration of firewall rules to the Palo Alto Networks appliance. Then, after about 15 days, the deployment team uses the migration tool to begin the iterative process of defining applicationbased policies to replace the legacy port-based rules. After the last migration phase, the port-based rules are removed and the application-based policies remain. In future phases, the deployment team can work with the institution’s business departments to take full advantage of the application policies’ technology by restricting access to individual applications based on the desired criteria (for example, Active Directory security groups or location-based user IP address ranges). VI. CONCLUSION Financial institutions that implement effective security controls with a network segmentation focus can protect critical operational environments and data against compromise. In an environment characterized by legacy platforms, multiple solutions, and diverse content sources, the great challenge is to implement new security controls that reduce the attack surface and improve protections without causing disruptions and outages. Properly deployed as outlined above, the reference blueprint described here can improve legacy network efficiency and defeat advanced malware attacks by positively controlling applications, users and content everywhere across the network, all while enabling even the most demanding business users. Notably, financial institutions can start their journey with the Palo Alto Networks Next-Generation Security Platform at the network perimeter or at the endpoint to complement existing security investments. Adoption of additional elements of the platform will further improve your cybersecurity posture. For more information, please visit the Palo Alto Networks website at www.paloaltonetworks.com. 4401 Great America Parkway Santa Clara, CA 95054 Main:+1.408.753.4000 Sales:+1.866.320.4788 Support:+1.866.898.9087 www.paloaltonetworks.com © 2016 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at http://www.paloaltonetworks. com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. fsi-banking-reference-wp-090216