The Business Forum

"It is impossible for ideas to compete in the marketplace if no forum for
  their presentation is provided or available."           Thomas Mann, 1896


Technology Best Practices for Endpoint Security

Contributed by Cisco Systems, Inc.

 

 

Introduction

As technologies such as high-speed networks, switching, and end-to-end encryption are more widely adopted, providing desired security at the network level becomes a major challenge. One important place to enforce security is at the endpoint, where data resides and the potential for damage is greatest. Today, businesses are confronted with the availability of several point products, each attempting to solve a part of the endpoint security problem. These include distributed personal firewalls for protection against network-borne threats, antivirus scanners for detection of file-based threats, and audit or integrity products for detection of malicious configuration activity. These technologies do not address new attacks that are carried over existing protocols to attack applications, or new content-based attacks that attack systems before vendors are able to release and distribute signatures and other responses. This document outlines the technology best practices for endpoint security solutions, to help organizations make informed decisions when choosing endpoint security products.

Best Practices

Any organization that intends to protect itself through the use of endpoint security technology should consider several factors when evaluating products that address the organization’s defined security requirements. Chosen solutions must meet corporate security, manageability, and flexibility requirements; otherwise, the solution will be incomplete or will introduce a significant management burden that overshadows the security benefits.

Best practices should include the following:

1. Real-time prevention decisions

To ensure the highest levels of security and minimize the ability to bypass the security policy on a host, application
calls must be intercepted at the kernel level where their adherence to policy is determined. Solutions that are implemented by replacing shared libraries or analyzing system audit logs can be bypassed relatively easily. An effective endpoint security strategy includes preventing violations in real time, rather than noting attacks or system changes after they have occurred.

2. Defense-in-depth protection from attacks

To completely enforce a company’s security policy, endpoint security must intercept all major points of communication between applications and the underlying system. Network control must limit client/server communications at the port and protocol levels, as well as hosts for permitted communications; file system controls must allow or deny read or write access to folders and files on an individual and group basis; registry controls must prevent the overwriting of important registry keys that control how the system and other applications operate; and COM controls must restrict interprocess communications to allowable access.

Attacks have multiple phases, exploiting network and application-level weaknesses, replicating and distributing themselves, and making unauthorized changes to the system. A complete endpoint security strategy must protect systems from all of these phases, so that if a new class of attack is released, it will be thwarted at one or more of the stages.

3. Real-time correlation at the agent and enterprise levels

Correlation is vital for an endpoint security technology. Correlation deployed at the agent provides a level of accuracy on prevention decisions that does not exist with signature matching approaches. Correlating sequences of events within the context of an application’s behavior eliminates the potential for false positives, and correlation at the enterprise level enables security to be adaptive. By correlating the events on distributed agents, endpoint security policies can be dynamically updated to prevent propagation of malicious code, preventing widespread damage to numerous resources.

4. Behavioral approach

The endpoint security approach must enforce appropriate system and application behaviors to ensure that the security implemented is proactive, not reactive. Solutions that rely on signatures provide security only to the release of the most recent signature update.

5. Flexibility to meet unique corporate needs

Every corporation is unique in the details of how it configures and manages its systems and corporate applications. Endpoint security solutions must be flexible to accommodate this uniqueness, by permitting the customization of existing policies and the creation of new policies that accommodate both unique applications and unique implementations. The solution must support automated policy creation to ease the management burden of manually creating policies.

6. Ease of deployment

The endpoint security strategy should minimize the personnel overhead associated with agent deployments. Solutions must provide ready-to-use functions to allow rapid deployment of the desired security policies, and must allow for new and custom policies to be rolled out as needed without additional intervention at the host level. Solutions must support Web-based deployment, and allow for easy integration with standard corporate software distribution mechanisms.

7. Centralized event management

All events generated by the agents must roll up into a centralized repository from which alerts and reports may be generated. Solutions that are considered must support standard alerting interfaces such as Simple Network Management Protocol (SNMP), paging, e-mail, and flat files, and must allow custom interfaces to the alerting system to easily integrate with corporate systems.

8. Platform coverage, with support for desktops and servers

Solutions that are considered must provide coverage for the critical operating systems that the corporation wants to protect. In light of recent attacks like NIMDA, which target multiple hosts, the same management and enforcement paradigm must apply to both desktop and server-based systems.

9. Administration

To ease policy management, policies must be centrally definable, and automatically distributed to agents on a configurable interval. Policies must also be exportable for replication and archive purposes. Companies with more than one administrator require a “manage from anywhere” capability to ease management of their environments. Endpoint security solutions should be manageable from anywhere using a standard Web browser to avoid the installation of custom software at each administrator’s desktop, to avoid the installation of insecure and difficult-to-maintain software that enables remote administration, and to lower the learning curve for IT staff.

Large corporations that have thousands of systems requiring protection should consider solutions where a single manager can support thousands of agents, and allow for the replication of policy across organizational or regional boundaries.

Summary

Companies should ensure that their endpoint security solutions meet the security, manageability, and flexibility requirements outlined in this document to avoid limited or unmanageable solutions.


Visit the Authors Web Site

Website URL:

 http://www.cisco.com

Your Name:
Company Name:
Your E-mail:

Inquiry Only - No Cost Or Obligation


3D Animation : red star  Click Here for The Business Forum Library of White Papers   3D Animation : red star
 


Search Our Site

Search the ENTIRE Business Forum site. Search includes the Business
Forum Library, The Business Forum Journal and the Calendar Pages.


Disclaimer

The Business Forum, its Officers, partners, and all other
parties with which it deals, or is associated with, accept
absolutely no responsibility whatsoever, nor any liability,
for what is published on this web site.    Please refer to:

legal description


Home    Calendar    The Business Forum Journal     Features    Concept    History
Library     Formats    Guest Testimonials    Client Testimonials    Experts    Search
News Wire
     Join     Why Sponsor   Tell-A-Friend      Contact The Business Forum



The Business Forum

Beverly Hills, California United States of America

Email:  [email protected]

Graphics by DawsonDesign

Webmaster:  bruceclay.com
 


© Copyright The Business Forum Institute 1982 - 2011  All rights reserved.