Cisco Cyber Threat Defense v2.0
Cisco Cyber Threat Defense v2.0
Cisco Cyber Threat Defense v2.0
0
First Look Design Guide
Last Updated: April 21, 2015
CONTENTS
Introduction 3
Goal of this Document 3
Intended Audience 3
Executive Summary 4
Solution Overview 4
Solution Design 4
Thinking Beyond the Perimeter 5
A Security Model that Leverages Network Integrated Security 7
Solution Components 8
NetFlow 8
Lancope StealthWatch System 10
Next Generation Intrusion Prevention System 12
Cisco Advanced Malware Protection 13
Content Security Controls 15
TrustSec and the Identity Services Engine 17
Operating under the Presumption of Breach 17
Dissection of the Attack Lifecycle 17
Building Resiliency into the Network 19
Continuous Monitoring of Critical Assets 27
Design Considerations 29
NetFlow and the Lancope StealthWatch System 29
Next Generation Intrusion Prevention System 33
Advanced Malware Protection 37
Content Security Controls 37
TrustSec and the Identity Services Engine 38
Conclusion 38
References 39
General Security Information 39
Intended Audience
This document is intended for, but not limited to, security architects, system architects, network design
engineers, system engineers, field consultants, advanced services specialists, and customers who want
to understand how to deploy a robust, distributed security architecture to address todays advanced
threats; with the continued flexibility to operate virtualized and physical workloads; and who function
in traditional modes or have migrated towards cloud operational models. This document also leverages
additional complementary solutions that are documented in separate design and deployment guides.
This document assumes that the reader is familiar with the basic concepts of IP protocols, quality of
service (QoS), high availability (HA), and security technologies. This document also assumes that the
reader is aware of general system requirements and has knowledge of enterprise network and data
center architectures.
Corporate Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Solution Overview
Executive Summary
The initial version of the Cisco Cyber Threat Defense solution was introduced in 2013, with a Cisco
Validated Design (CVD) to bring together NetFlow telemetry from the Cisco network infrastructure,
the Cisco Identity Services Engine (ISE) for user and device identity, and the StealthWatch System
through a partnership with Lancope, Inc. to provide network behavior analysis and threat detection in
the interior of the network.
This document introduces a major update and expansion of the Cisco Cyber Threat Defense
architecture, building on the network visibility from the previous solution. Version 2.0 incorporates
industry-leading Next Generation Intrusion Prevention Systems (NGIPS) and Advanced Malware
Protection (AMP) components from Ciscos acquisition of Sourcefire in late 2013, now known as
Cisco FirePOWER. The solution includes other elements of the Cisco security portfolio such as email
and web content security, and the ability to leverage the network itself as a policy enforcement point
through the use of Cisco TrustSec and Endpoint Protection Services in ISE version 1.3.
Solution Overview
Solution Design
Figure 1 shows the high-level architecture of the Cisco Cyber Threat Defense solution, which builds on
best practices from other CVDs without going into too much detail about deployment of the network
edge. The goal of the Cyber Threat Defense solution is to introduce a design and architecture that can
help facilitate the discovery, containment, and remediation of threats once they have penetrated into the
network interior. Data center considerations are included in the Cyber Threat Defense solution for the
Secure Data Center CVD.
Devices
Distribution/Core
Branch
Converged
Access
Access Point
Access Point
FirePower
Catalyst
6500
Catalyst
6500
WSA with
CWS redirect
ISR-G2
Site-toSite VPN
WCCP
Converged
Access
Campus
Catalyst
6500
Catalyst 4500
ESA
FireSight
Management
Console
StealthWatch
Management
Console
ASA with
FirePower
Catalyst 4500
Catalyst
6500
Edge
StealthWatch
FC & FR
StealthWatch
FlowSensor
Remote
Access
Identity
Services
Engine
User Onboarding
Device Posturing
Policy Aggregation
Management
348049
Figure 1
Solution Overview
Cisco Cyber Threat Defense version 2.0 makes use of several solutions to accomplish its objectives:
Solution Overview
Therefore, protecting against an APT involves defending against a determined, human attacker who
uses logic and technology to infiltrate the targeted entity and achieve an objective. Defending against
such an attacker requires awareness that the attacker will at some point be able to breach the perimeter
and gain an operational footprint on the network. The main objective of the Cisco Cyber Threat
Defense solution is to instrument the interior of the network to assist the security operator in
discovering the presence of attackers that have gained an operational footprint on the network interior.
Indicators of Compromise
The nature of the APT and the modern threat has significantly varied the time between the initiation of
the attack and the final execution phases. As a result, a new approach to attack discovery is needed.
Previously, most legacy threat systems generated thousands of alerts based on the approach to detect all
attack-like activity. A new approach is to leverage indicators of compromise (IOC).
Indicator: A sign that an incident may have occurred or may be currently occurring. [NIST SP
800-61]
By taking the position that the determined adversary or motivated attacker is going to bypass the
security perimeter and gain an operational footprint on the network, the IOC approach is to get the
correct amount of tooling in place to not only discover the presence of the attacker but also their mode
of operation. Elements of such an approach, which would make up a broader, yet more exact, analysis
of what was being seen, could include the following questions:
What are the attack specifics, such as how it is/was executed? What may have changed on the target
endpoint, and so on?
Is this a new issue or was it delivered via an outside source, such as bring-your-own-device
(BYOD)?
Can the system identify immediately how many hosts or network devices may be vulnerable to this
threat?
If this attack is blocked, how can the system determine whether it is a false positive or true positive?
To achieve an advanced indication of compromise capability, events must be correlated from the
following:
Malware activities
Intrusion detections
Network connections
Device trajectories
Solution Overview
Device network flows, including but not limited to lateral movements, parent-child relationship, or
context
The goal is for all of the above to be correlated with network, endpoint, application, and user context.
The resultant data set provides the unique ability to provide IOCs throughout the entire network that are
accurate enough to be confidently and immediately actionable.
Attack Continuum
Network
After
Scope
Contain
Remediate
During
Detect
Block
Defend
Endpoint
Mobile
Point-In-Time
Virtual
Cloud
348062
Before
Discover
Enforce
Harden
Continuous
This model addresses the threat problem by looking at the actions you must take before, during, and
after an attack, as well as across the broad range of attack vectors such as endpoints, mobile devices,
data center assets, virtual machines, and even in the cloud. Where most security solutions tend to
address the threat at a point in time, it is important to look at it as a continuous cycle.
Before an Attack
Context-aware security is required to defend against context-aware attackers. Organizations are
fighting against attackers that have more information about their infrastructures than the defenders
trying to protect them. To achieve information superiority over attackers and defend before an attack
occurs, organizations need total visibility of their environment including, but not limited to, physical
Solution Components
and virtual hosts, operating systems, applications, services, protocols, users, content, and network
behavior. Defenders need to understand the risks to their infrastructure, based on target value,
legitimacy of an attack, and history. If defenders do not understand what they are trying to protect, they
will be unprepared to configure security technologies for defense. Visibility needs to span the entirety
of the network, including endpoints, email and web gateways, virtual environments, mobile devices,
and the data center. From this visibility, actionable alerts must be generated so that defenders can make
informed decisions.
During an Attack
Relentless attacks and blended threats do not occur in a single point of time. They are an ongoing
activity and demand continuous security. Traditional security technologies can evaluate an attack only
at a point in time, based on a single data point of the attack itself. This approach is no match against
advanced attacks.
Instead, what is needed is a security infrastructure based on the concept of awareness; one that can
aggregate and correlate data from across the extended network with historical patterns and global
attack intelligence to provide context and discriminate between active attacks, exfiltration, and
reconnaissance versus simply background activity. This evolves security from an exercise at a point in
time to one of continual analysis and decision-making. If a file that was thought to be safe passes
through but later demonstrates malicious behavior, organizations can take action. With this real-time
insight security, professionals can employ intelligent automation to enforce security policies without
manual intervention.
After an Attack
To address the full attack continuum, organizations need retrospective security. Retrospective security
is a big data challenge, and a capability that few are able to deliver. With an infrastructure that can
continuously gather and analyze data to create security intelligence, security teams can automatically
identify IOCs, detect malware that is sophisticated enough to alter its behavior to avoid detection, and
then remediate.
Compromises that would have gone undetected for weeks or months can be rapidly identified, scoped,
contained, and remediated. This threat-centric security model lets organizations address the full attack
continuum across all attack vectors and respond at any time, all the time, and in real time.
Note
The Cyber Threat Defense 2.0 Solutions primary focus is on the During and After stages of the
Attack Continuum. Additional security solutions can be found on the Cisco DesignZone website.
Solution Components
NetFlow
NetFlow is a key element of the original version of the Cisco Cyber Threat Defense solution, and
continues to play a vital role in this second-generation update.
NetFlow is embedded instrumentation within Cisco IOS software that characterizes network operations
by examining connection data. Standardized through the RFC process in the IPFix protocol, variants of
NetFlow are available in network equipment from such vendors as Arista, Citrix, Huawei, Juniper,
Palo Alto, and a variety of open source Linux operating systems distributions.
Solution Components
NetFlow is a Cisco application that measures IP network traffic attributes of a traffic flow. A flow is
identified as a unidirectional stream of packets between a given source and destination as it traverses
the Cisco device. NetFlow was initially created to measure network traffic characteristics such as
bandwidth, application performance, and utilization. NetFlow has traditionally been used for billing
and accounting, network capacity planning, and availability monitoring.
NetFlow is a reporting technology. As a NetFlow-enabled network device processes traffic, the device
gathers data about the traffic flow and reports (or exports) the data to a defined collector. Older
versions of NetFlow exported data only after the connection closed. Later, NetFlow implementations
added the capability of defining one or more expiry timers (active or inactive) or conditions
(connection complete or cache full). The nature of NetFlow reporting has tremendous security
applications including the ability to provide non-repudiation, anomaly detection, and investigative
capabilities.
NetFlow has gone through many versions since it was first introduced, as shown in Table 1. Fixed
export format versions (1,5,7,8) are not flexible or adaptable, and each new version contains new
export fields that are incompatible with the previous version. NetFlow Version 9 completely separates
the collection and export process and allows the customization of the NetFlow collection.
Table 1
NetFlow Versions
Version
1
2
3
4
5
6
7
8
9
IPFIX
Flexible NetFlow
Status
Original; similar to v5 but without sequence numbers or BGP info
Never released
Never released
Never released
Fixed format; most common version in production
Never released
Similar to v5 but does not include AS interface, TCP flag, and ToS information;
specific to Cisco Catalyst 6500 and 7600
Choice of 11 aggregation schemes; never gained wide use in the enterprise
Flexible, extensible export format to enable support of additional fields and
technologies
Similar to v9 but standardized and with variable length fields
Flexibility and scalability of flow data beyond traditional NetFlow. The ability to
identify and classify over 1000 applications via Cisco Application Visibility and
control (AVC).
The Cisco Cyber Threat Defense solution takes advantage of the customization capability of the
Flexible NetFlow Feature in Cisco IOS, allowing for customizable NetFlow Version 9 records. Using
this approach, the CVD for the Cisco Cyber Threat Defense solution has defined NetFlow records for
each solution device to maximize the security monitoring potential of each device by collecting packet
fields such as TCP flags, time-to-live (TTL) values, protocol, and application name using Next
Generation Network-Based Application Recognition (NBAR2) and Cisco AVC. Many of these fields
are not available in older versions of the NetFlow protocol. Without these fields, some of the
advantages offered by some of the finely tuned detection algorithms used as part of the Cisco Cyber
Threat Defense solution would be lost or minimized.
The latest iteration of Cisco-developed NetFlow is Flexible NetFlow. Flexible NetFlow extends
NetFlow version 9 capabilities to help customer determine how to optimize resource usage, plan
network capacity, and identify the optimal application layer for quality of service (QoS). Flexible
NetFlow plays a vital role in network security by detecting denial-of-service (DoS) attacks and
Solution Components
network-propagated worms.
Tip
Best Practice: Use the Cisco IOS Flexible NetFlow feature wherever possible.
Figure 3 illustrates NetFlow operation on a Cisco device.
Figure 3
NetFlow Operation
Source
NetFlow Generator
Destination
1
Source IP Address
NetFlow Cache
Destinatiopn IP Address
Source Port
Flow Information
Packets
Bytes/packet
Layer 3 Protocol
Address, ports...
11000
1528
...
Destinatoin Port
Input Interface
3
StealthWatch
FlowCollector
348050
NetFlow
Key Fields
1.
As data traverses a NetFlow-capable device (NetFlow Generator), the device connection table is
mined and NetFlow key data fields are extracted.
2.
The key fields are used to identify and correlate new flow data with existing flows and build new
entries in the NetFlow cache, a database of flows maintained on the device. In addition to the key
fields, the Cisco device collects additional configured collection fields, such as TCP flags, byte
counters, and start and end times, and stores this information in the NetFlow cache entry for this
flow.
3.
When the flow terminates or a timeout event occurs, a NetFlow Protocol Data Unit (PDU), known
as a flow record, is generated and exported to a flow collector.
10
Solution Components
Figure 4
StealthWatch
Web Interface
HTTPS
(TCP/443)
StealthWatch
Management
Console
ISE Web
Interface
Syslog
HTTPS
(TCP/443) (UDP/3514)
HTTPS
(TCP/443)
Cisco
ISE
NTP (UDP/123)
Radius
(UDP/1812/1813)
Syslog (UDP/514)
SNMP (UDP/161)
DNS (UDP/53)
NTP (UDP/123)
StealthWatch
FlowCollector
HTTPS
(TCP/443)
NTP (UDP/123)
SMTP (TCP/25)
DNS (UDP/53)
SNMP (UDP/162)
Syslog (UDP/514)
HTTPS
NetFlow
(TCP/443)
(UDP/2055)
NetFlow
NetFlow
(UDP/2055)
(UDP/2055)
NetFlow
(UDP/2055)
NetFlow
Generators
NetFlow
(UDP/2055)
Optional:
StealthWatch
FlowReplicator
DNS (UDP/53)
NTP (UDP/123)
StealthWatch
FlowSensor
Table 2
348051
Network
Traffic
Component
StealthWatch
Management Console
StealthWatch
FlowCollector
StealthWatch UDP
Director (also known as
FlowReplicator)
StealthWatch
FlowSensor
StealthWatch
FlowSensor VE
Description
Manages, coordinates, and configures all StealthWatch appliances to
correlate security and network intelligence across the enterprise. Retrieves
authenticated session information from the Cisco ISE to correlate flow
and identity.
Serves as a central collector for flow data generated by NetFlow-enabled
devices. The StealthWatch FlowCollector monitors, categorizes, and
analyzes network traffic to create comprehensive security intelligence at
both the network and host level.
Aggregates NetFlow, syslog, and SNMP information in a single,
high-speed appliance. This high-speed UDP packet replicator gathers
essential network optimization and security information from multiple
locations, and then forwards this information in a single data stream to
one or more StealthWatch FlowCollector appliances.
Passively monitors all host and server communications and network
traffic statistics, translating them into flow records, which are sent to
FlowCollectors.
A virtual appliance designed to run inside a virtual server. The
FlowSensor VE passively monitors intra-VM traffic, translating it into
flow records, which are sent to FlowCollectors.
11
Solution Components
Ability to identify, monitor, and inspect a wide range of client applications and activities, leveraging
Cisco Application, Visibility, and Control (AVC), while enforcing policy against such information.
Readily available access to various types of contextual data within and external to the environment
(for the ability to reference externally available factors/information for correlation) to identify
network behavior, user identity, network resources, attack trends and vectors, traffic profiles, and
much more.
Ability to support content awareness and data loss prevention in transit traffic regardless of protocol.
This includes URL filtering and the ability to inspect and classify inbound and outbound files and
attachments ranging from executable files to PDF and office files.
Ability to support intelligence gathering and use context awareness, or the ability to bring
information in from various sources to make more effective decisions with regard to
blocking/filtering and/or warning on transit traffic.
FirePOWER
Cisco ASA with FirePOWER Services is the industrys first adaptive, threat-focused Next-Generation
Firewall (NGFW) that delivers integrated threat defense for the entire attack continuum by combining
the industry-leading firewall capabilities of the Cisco ASA with industry-leading Cisco FirePOWER
threat and advanced malware protection.
The Cisco ASA continues to support stateful inspection, NAT, VPN, routing services, and many others,
yet now it integrates Cisco FirePOWER Services in the packet flow path. The FirePOWER Services
function handles URL filtering, AVC, threat protection via the NGIPS service module, and Advanced
Malware Protection (AMP). Together, the Cisco ASA and FirePOWER Services provide a fully
integrated, threat-centric NGIPS/NGFW solution, as illustrated in Figure 5.
12
Solution Components
Figure 5
NGIPS/NGFW Solution
WWW
Clustering &
High Availabilty
Intrusion
Prevention
(subscription)
FireSight
Analytics &
Automation
Advanced
Malware
Protection
URL Filtering
(subscription)
(subscription)
Built-in
Network
Profiling
Identity-Policy
Control
& VPN
Network Firewall
Routing |
Switching
Application
Visibility &
Control
348061
APP
BeforePrevents known malware, policy-violating file types, and communications from entering
your extended network.
DuringContinuously analyzes files and network traffic for threats that evade your first lines of
defense
AfterQuickly and efficiently understands, scopes, contains, and remediates an active attack
Cisco AMP provides protection across the broadest range of attack vectors, and can be deployed as:
A network-based solution, integrated into dedicated Cisco ASA firewall and Cisco FirePOWER
network security appliances
An endpoint solution for PCs, Macs, mobile devices, and virtual environments
An integrated feature in Cisco Cloud Web Security or Cisco Web and Email Security Appliances
13
Solution Components
Figure 6
Ciscos AMP Everywhere Strategy Means Protection Across the Extended Network
PC
Mobile
Mac
AMP for Endpoints
AMP Threat Grid
On-Premise
AMP Threat Grid
Dynamic Malware Analysis +
Threat Intelligence Engine
AMP for
Cloud Web Security
& Hosted Email
348066
Cisco AMP takes full advantage of the vast cloud security intelligence from the Cisco Talos Security
Intelligence and Research Group as well as from the Cisco Collective Security Intelligence Ecosystem
to deliver advanced protection. Cisco AMP also integrates with Cisco AMP Thread Grid dynamic
malware analysis and threat intelligence technology, enhancing its capabilities to aggregate and
correlate data to identify advanced and evasive cyber threats.
Cisco AMP provides continuous analysis and retrospective alerting with the following features:
File ReputationAnalyzes file payloads inline as they traverse the network, providing users with
the insights required to automatically block malicious files and apply administrator-defined policies
using the existing Cisco Web or Email Security user interface and similar policy reporting
frameworks.
File SandboxingUses a highly secure sandbox environment to analyze and understand the true
behavior of unknown files traversing the network. This allows AMP to glean more granular
behavior-based details about the file and combine that data with detailed human and machine
analysis to identify a files threat level.
File RetrospectionSolves the problem of malicious files that have passed through perimeter
defenses but are subsequently deemed a threat. All point-in-time detections are less than 100
percent. Rather than operating at a point in time, File Retrospection provides continuous analysis,
using real-time updates from AMPs cloud-based intelligence network to stay abreast of changing
threat levels. As a result, AMP helps identify and address an attack quickly, before it has a chance
to spread.
14
Solution Components
15
Solution Components
Web Security
Advanced attackers are taking advantage of new attack vectors such as mobile devices, web-enabled
and mobile applications, and web browsers to accomplish their mission. In this new environment,
anyone within your organization can be attacked at any time and any location. The following are two
reasons why:
The web is a popular attack vector for criminals; attackers are organized, and web-born tactics are
insidious. Watering hole attacks conceal malware on member-based sites, phishing scams target
individuals with personal details, and botnets take control of victims devices. It is not a small
number of sites that pose a threat: 93 percent of customer networks access websites that host
malware, according to the Cisco Annual Security Report. Web-based attacks are ever changing,
harder to detect, and more damaging than ever.
Without proper control, your own users put your business at risk. Your branch offices, individual
employees, and even guest users can consume excess bandwidth, throttling software-as-a-service
(SaaS) application use and other high-priority business functions. They may also access content
outside of your acceptable use policies such as social media, Internet videos, and personal SaaS
applications, creating a shadow IT infrastructure outside the governance of corporate IT and outside
the protection of traditional security solutions.
Security is not just about building bigger walls and adding more one-off solutions. To stop criminals
and control usage, you need a solution that fits your infrastructure, grows with your business, and
immediately adapts to changing threats. It must provide the most up-to-date malware defense and offer
tools for managing a breach when it occurs.
The following are key components of the Web Security portfolio deployed in Cisco CTD version 2.0:
Advanced malware protection of inbound flows and tracking of threats specific to sandboxing and
retrospection. This follows the same description of the other AMP components, but currently AMP
scans for outbound flows only. Where this makes sense for CTD is the discovery of possibly infected
clients after retrospection. A clean list of all clients that have interacted with malicious code and
where the content has come from provides details on patient zero as well as the source of the
infection.
Signature-based security. Anti-virus scanning for outbound flows easily allows administrators to
discover infections and the possibility of their user base being used as part of a distributed attack.
Behavioral analysis of outbound flows to C&C sites can be easily discovered with L4TM. By
scanning for all outbound TCP and UDP flows, the WSA can monitor and block these
communications to C&C servers. Combined with other aspects of Cisco CTD version 2.0, this
critical data can assist in the discovery of IOCs.
Email Security
The email threat landscape contains increasingly sophisticated advanced threats and targeted attacks.
Mass spam campaigns and unsafe email attachments are no longer the primary security concerns. By
scouring social media websites, attackers now find information on intended victims and contrive spear
phishing emails. These attacks use personal information and social engineering tactics, often tied to
global news events, to deceive users with malicious links serving up malware. There are more
opportunities for attacks than ever before. Employees once checked text-based email from a
workstation behind a company firewall, but today they interact with rich HTML messages from
multiple devices, both anytime and anywhere. Ubiquitous access creates new network entry points that
blur the lines of historically segmented security layers.
Cisco Email Security (CES) is the leader in this evolved threat landscape. Cisco has the highest capture
rate and the lowest false positive rate available for spam. Cisco also has the industrys only proven
16
zero-hour antivirus solution, providing protection from brand-new viruses in less than 60 minutes. This
is couples with Ciscos more traditional scanning engine called Defense in Depth for spam and virus.
The same solution also scans your outbound email to help comply with data loss prevention compliance
requirements. CES can automatically scan your outbound email for social security numbers, credit card
numbers, patient health information, and more. It automatically encrypts those messages so the
recipient has to authenticate to open and view, providing immediate compliance. Cisco also offers the
best performance and the lowest total cost of ownership. Cisco, with its complete security architecture,
is focused on the future: all of Ciscos security technologies work together to enhance security for your
company.
The following are key components of the Email Security portfolio deployed in Cisco CTD version 2.0:
Advanced malware protection of inbound flows and tracking of threats specific to sandboxing and
retrospection.
Signature-based security, including anti-spam and anti-virus scanning for outbound flows.
Behavioral analysis of outbound flows to C&C sites or flows as part of an outbound spam attack.
Monitoring the outbound flows against a baseline of what is normal or expected can help
administrators quickly understand where infections have occurred and can help clean up.
17
footprint on the network to execute towards their objective. The attacker holds many advantages
because they know their objective, whereas the defender must be able to discover the attackers
presence, a non-trivial task. This section first dissects the attack lifecycle before describing how the
defender can operationalize data out of the components of the Cyber Threat Defense solution to
discover the presence of an attacker and protect critical assets.
Attack Lifecycle
Exploratory
Actions
Initial
Recon
Initial
Compromise
Infiltration
(C&C)
Footprint
Expansion
Theft
Execution
Staging
348053
Disruption
Initial Reconnaissance
In this step, the attacker gathers information about the target organization. This might consist of
leveraging public information, using social media to find and target employees, determining what
technologies are in use at the target organization, and general preparation for the initial attack.
Initial Compromise
In this step, the attacker gains an operational footprint inside the victim organization. The compromise
might use either known malware or a zero-day, custom-crafted piece of malware, or it might be
accomplished using non-technical methods such as social engineering. In any case, at the completion of
this step, the attacker has successfully infiltrated the organization.
Infiltration
At the completion of the previous step, the attacker has successfully infiltrated the organization. This
step is about being able to maintain that point of presence. For example, if in the previous step the
attacker has been able to successfully retrieve a username and password, in this step the attacker opens
a remote connection to the organization. If the initial compromise has been the installation of a piece of
malware on a personal computer belonging to an employee, this step is the opening up of a
command-and-control (C&C) channel with that piece of malware.
18
Exploratory Actions
At this point the attacker begins to locate resources inside the organization that are relevant to their
objective. What the attacker does here depends on the objective and the method in which they were
able to infiltrate the organization. Often, the attacker begins scanning the network interior to find other
resources that might be vulnerable or hosting data the attacker is interested in exploiting. In this step,
the attacker might also seek to recover legitimate credentials such as usernames and passwords.
Footprint Expansion
Until this point, the attacker still has only one infiltration point into the organization; for example, a
single malware-infected machine or a single set of stolen credentials. In this step, the attacker expands
their point of presence to include multiple infiltration points and/or multiple points of presence inside
the organization. The return to the Infiltration stage in Figure 7 represents the remote connection to the
new resource.
Staging
In this step, the attacker prepares for the final execution phase. What happens here depends on the
attackers objective. If the goal is to obtain or steal data, this step might be the slow collection of data
from different resources inside of the organization. If the objective is disruption, this step might be
ensuring that they have an operational footprint on all necessary targets. The return to the Infiltration
stage in Figure 7 represents the remote connection or credentials the attacker is using as their
Infiltration point.
Execution
This is the final step of the attack, in which the attacker has decided that their mission is complete and
their goals and objectives have been met. Attacker objectives tend to fall into one of two categories:
theft of data or disruption of activities.
19
Note
Note that some design guides may not yet have been updated to use FirePOWER in place of the
legacy Cisco IPS.
Cisco TrustSec 2.0 Design and Implementation Guide
Adherence to the above creates a network that has sufficient access controls and threat management
solutions in place to limit the attack surface such that it is more difficult for an attacker to successfully
launch known exploits against an organization. The following is achieved:
ISE performs posture checking and policy enforcement for devices joining the network
It is also assumed for this guide that the network and access edge is in place and operational to
facilitate telemetry to support other use cases for the Cisco Cyber Threat Defense solution.
Detecting Command-and-Control
Operationally, an attackers C&C channel is a communication channel from a host on the network
interior (an inside trusted and authorized zone) to a host on the outside. This channel can exist in many
forms, such as a communication channel from a malware-infected host to a C&C server or a VPN
connection using stolen credentials. Figure 8 illustrates conceptually what is meant by a C&C channel:
a Layer 3 or 4 connection, between a resource located on the network interior and the attackers control
point outside of the network.
C & C Channel
348054
Figure 8
To detect and defend against C&C channels and to remediate the attackers infiltration point, it is first
necessary to examine the channel itself, understand the various ways it can manifest itself, and what
can be done to detect the channel from a network and protocol perspective. The following is a partial
list of sample items to analyze when detecting C&C channels:
Countries
Applications
Uploads/downloads ratio
Time of day
Repeated connections
20
Long-lived flows
Web requests/URLs
The technologies in place as part of the Cisco Cyber Threat Defense solution help to automate some of
the items above, provide behavioral or anomalistic detection of C&C channels, and can also provide
visibility to assist a security operator in manually discovering C&C activity in their environment. The
following sections describe Cisco Cyber Threat Defense solution technologies and how they help
detect and possibly remediate C&C activity.
Lancope StealthWatch
Leveraging NetFlow data from network and perimeter devices, visibility into all traffic flows entering
and leaving the network can be obtained. Several behavior- and anomaly-driven algorithms analyze
network traffic to identify covert channels based on suspicious traffic flows. The StealthWatch Labs
Information Center (SLIC) threat feed also provides a list of known C&C servers to the StealthWatch
System to generate alarms when there is communication detected to these servers. Note that known
C&C servers can be either an IP address or a URL.
Additionally, a record of all communication is maintained, allowing a forensic look-back to identify
covert channels and compromised devices when new information and IOCs are discovered by security
operators.
Cisco FirePOWER
Cisco FirePOWER can provide automated, inline blocking of traffic destined to low reputation web
servers through URL inspection as it passes through a NGIPS sensor. Many times, low reputation web
servers can be known botnet C&C servers.
Cisco Cloud Web Security (CWS) with Cognitive Threat Analytics (CTA)
The CTA service in Cisco CWS Premium provides analysis and anomalistic detection of C&C channels
through the monitoring of URL activity. This service helps identify C&C servers that might be
previously undiscovered or are being brought to bear in a targeted manner against a single organization.
21
Internal Reconnaissance
348055
Figure 9
Examples of activities include sending Internet Control Message Protocol (ICMP) echo-request
messages to random internal IP addresses, and broad scanning of network address blocks to identify
devices with open services or ports. While these reconnaissance techniques can be quite noisy, and the
more clever and targeted attackers are operating in a more low and slow manner, in general the
methodology is the same: using the existing point of presence, the attacker attempts to locate other
resources on the network using network protocols.
The following is a partial list of sample items that can be analyzed to identify reconnaissance activity
on the network interior:
Flow patterns
The technologies in place as part of the Cisco Cyber Threat Defense solution help to automate some of
the items above, provide behavioral or anomalistic detection of internal reconnaissance activity, and
provide visibility to assist a security operator in manually discovering internal activity in their
environment. The following sections describe Cisco Cyber Threat Defense solution technologies and
how they help prevent, detect, and possibly remediate internal reconnaissance activity.
Lancope StealthWatch
As discussed previously, by leveraging NetFlow data from network devices throughout all layers of the
networkaccess, distribution, core, and edgeLancope StealthWatch provides complete visibility
into all traffic flows in the network. This visibility allows a metadata record to be maintained of every
communication that traversed a network device. This aggregated data can be analyzed to identify hosts
with suspicious patterns of activity. Lancope StealthWatch has a specific Reconnaissance alarm
category with several different algorithms watching behavior and identifying suspicious activity. In
addition, Lancope StealthWatch supports historical look-back of retrospective activities to allow the
operator to investigate a host following the discovery of an IOC in another system.
22
Cisco NGIPS
The Cisco NGIPS can be used to detect and block specific applications used in scanning activity at the
major segmentation points where it is deployed. For example, the Cisco NGIPS can be used to block
ICMP messages between the campus network and the data center.
Cisco TrustSec
Leveraging policy, security group-driven segmentation can limit the effectiveness of internal
reconnaissance activity as well as reveal activity. By implementing policy limiting peer-to-peer
network traffic between hosts in the same security group to business-critical applications, the network
can actively prevent network-level reconnaissance activity from occurring.
348056
Figure 10
Self-propagating malware strains that scan for hosts susceptible to a specific vulnerability and then
exploit that vulnerability
An attacker with legitimate credentials that connects to a remote resource and then transfers and runs
an executable
Defending against internal malware propagation requires a combination of analyzing network traffic
and file analysis and tracking. The following is a partial list of sample items that can be analyzed to
identify internal malware propagation:
Flow patterns
Abnormal behavior
23
Non-adherence to protocol
Tunneled flows
Executable analysis
The technologies in place as part of the Cisco Cyber Threat Defense solution help to automate some of
the items above, provide behavioral or anomalistic detection of malware propagation, and provide
visibility to assist a security operator in manually discovering malware activity in their environment.
The following sections describe Cisco Cyber Threat Defense solution technologies and how they help
prevent, detect, and possibly remediate internal malware propagation.
Lancope StealthWatch
As discussed in previous sections, Lancope StealthWatch provides complete visibility into all traffic
flows in the network, providing a metadata record of every communication that traverses a network
device. This aggregated data can be analyzed to identify hosts with suspicious patterns of activity.
Lancope StealthWatch has a specific alarm category for malware spread with several different
algorithms watching behavior and identifying suspicious activity. There is also a feature known as the
worm tracker (shown in Figure 11) that tracks the spread of malware through its suspicious activity
across the network. In addition, Lancope StealthWatch supports historical look-back of retrospective
activities to allow the operator to investigate a host following the discovery of an IOC in another
system.
Figure 11
24
File Trajectory
Cisco TrustSec
Leveraging policy, security group-driven segmentation can provide network-level protection against
possible lateral movement of an attack. Policy can be implemented to limit network-level
communication between user devices without impacting user-to-server traffic.
25
Figure 13
Data Exfiltration
348059
Intermediary resource
used for staging
Defending against data loss is a significant challenge for most organizations because of the disparity of
data (the difficulty in recognizing the data of value) as well as the multiple possible attack vectors to
reach that data, possibly because of a geographically diverse attack surface such as a large retail
company with multiple point-of-sale terminals. As the final step in the attack lifecycle, it is important
to note that many times this detection comes after some data has already been exfiltrated, so not only is
it important to ensure systems are operational to detect an attack before a data loss event has occurred,
but also to have the right technology in place to retroactively analyze the theft. As a result, defending
against data loss is a multiple-step challenge and may require multiple, different pieces of technology
to discover the data loss event.
The following is a partial list of example items that can be analyzed to identify data loss:
Applications
Time of day
Countries
Time frames
The technologies in place as part of the Cisco Cyber Threat Defense solution help to automate some of
the items above, provide behavioral or anomalistic detection of data theft activity, and provide
visibility to assist a security operator in manually discovering data theft activity in their environment.
The following section describes how Lancope StealthWatch helps prevent, detect, and possibly
remediate data exfiltration.
Lancope StealthWatch
The complete visibility provided Lancope StealthWatch, as previously described, allows a metadata
record to be maintained of every communication that traverses a network device, allowing a forensic
audit trail to exist in the event of a data exfiltration event. Lancope StealthWatch also automates the
analysis of many of the above considerations and has behavior and anomaly alarm categories for both
data hoarding and data exfiltration events. The creation of host groups supports the ability to monitor
the movement of data to other parts of the network (as is discussed in the next section), supporting the
ability to proactively monitor when data is being leaked from a critical server to a suspicious location.
In addition, Lancope StealthWatch supports historical look-back of retrospective activities to allow the
operator to investigate a host following the discovery of an IOC in another system.
26
Business impact analysisSystems that are directly related to the operation of the business
Legal requirementsStatutes and contracts that highlight which information and systems to protect
(for example, compliance requirements)
Risk profileSystems that because of their nature are underprotected; for example, legacy systems
Visibility profileHighly visible systems that can prove potentially embarrassing to the
organization if attacked
The technologies that comprise the Cisco Cyber Threat Defense solution can provide active monitoring
of all critical assets. The broad visibility provided by NetFlow and Lancope StealthWatch allows an
audit trail of all end-to-end communication of network-connected devices. The deep visibility provided
by the Cisco NGIPS and FMC allows deep visibility and heightened relevance into any malicious files
that are being used by or against critical assets.
Figure 14 illustrates the use of host groups and the custom map features of Lancope StealthWatch to
actively monitor the zones of the organization relevant to Payment Card Industry (PCI) compliance
regulations. In this example, host groups for each major component of the PCI zones are defined,
relationship properties and policies between the zones defined and mapped, and custom rules
developed to alert when traffic is seen on the network that violate the policy.
27
Figure 14
Because the network infrastructure itself can also be attacked, active policy monitoring can also be put
in place to monitor the communications of the network infrastructure, as shown in Figure 15.
Figure 15
Monitoring the Network Control Plane with NetFlow and Lancope StealthWatch
28
Design Considerations
Design Considerations
NetFlow and the Lancope StealthWatch System
Lancope StealthWatch System
Add StealthWatch FlowSensors (Optional)
Where NetFlow generation is not possible from the network equipment, the Lancope StealthWatch
FlowSensor and FlowSensor VE can be used to translate the communications into flow records. This
enables networking equipment not specified in this guide to participate in deployments of the Cisco
Cyber Threat Defense solution version 2.0. Additionally, the StealthWatch FlowSensor can be used to
add packet-level application identification and performance metrics for key areas of the network.
Perform the following steps when considering adding a StealthWatch FlowSensor to a Cisco Cyber
Threat Defense solution version 2.0 deployment.
Procedure
Step 1
Note
Model
250
1000
2000
Processing
Capacity
100 Mbps
1 Gbps
60,000
Interface
2
3
5
Speed
10/100/100
10/100/1000
10/100/1000
3000
120,000
1 or 2
1GB
Physical
Layer
Copper
Copper
Copper or
Fibre
Fibre
Form Factor
1 RU-short
1 RU-short
1 RU
Power
Non-redundant
Non-redundant
Redundant
1 RU
Redundant
If the processing capacity of a single StealthWatch FlowSensor is reached, you can stack multiple
FlowSensors using an appropriate Ethernet load balancer.
The StealthWatch FlowSensor VE is a virtual appliance that can be installed inside a vSphere/ESX host
and used to generate NetFlow records for traffic between VMs in that host. The FlowSensor VE
connects promiscuously to the virtual switches. It passively captures Ethernet frames from the traffic it
observes and then creates flow records containing valuable session statistics that pertain to
conversational pairs, bit rates, and packet rates. The FlowSensor VE then sends these records to the
29
Design Considerations
StealthWatch FlowCollector. Table 4 describes the requirements for the deployment of the
StealthWatch FlowCollector VE.
Table 4
Disk Space
Requirement
1.4 GB
Flow Export
Format
NetFlow v9
Minimum CPU
Requirements
2 GHz Processor
Minimum Memory
Requirement
512 MB
Interfaces
Up to 16 vNICs
Decisions made in the previous sections influencing the volume of flows per second that will be
reaching the StealthWatch FlowCollector
Procedure
Step 1
30
Design Considerations
In an ideal implementation, every router that exports data related to a particular flow sends that data to
the same FlowCollector. However, each unique host pair (or conversation) consumes additional
resources on the FlowCollector. If the number of simultaneous connections gets too high, flow records
are purged from memory. Take care during deployment planning to ensure that each FlowCollector has
sufficient resources to keep state on all active conversations without purging records until after the
conversations have been idle for some time.
Tip
Step 2
Best Practice: All NetFlow records belonging to a flow should be sent to the same StealthWatch
FlowCollector.
Performance considerations.
Each StealthWatch FlowCollector can support a minimum guaranteed flow volume, as listed in
Table 5. However, also consider the following factors in the selection of a StealthWatch FlowCollector
for the Cisco Cyber Threat Defense solution version 2.0:
Note
Exporter countNumber of NetFlow generation devices that each StealthWatch FlowCollector can
accept.
Host countNumber of hosts (both inside and outside the network) for which the StealthWatch
FlowCollector can maintain state. Cisco recommends that the number of inside hosts not exceed 60
percent of the host count value.
Flow storageAmount of granular flow data required for a particular location on the network.
A system that approaches both the maximum number of exporters and the maximum data rate for a
particular chassis may suffer from performance problems. For example, an estimated 1020 percent
reduction in the maximum data rate may occur at the maximum number of exporters.
Table 5
Model
StealthWatch FlowCollector 1000
StealthWatch FlowCollector 2000
StealthWatch FlowCollector 4000
Exporters
Up to 500
Up to 1000
Up to 2000
Hosts
Up to 250,000
Up to 500,000
Up to 1,000,000
Storage
1.0 TB
2.0 TB
4.0 TB
Table 6 lists the support for a StealthWatch FlowCollector VE based on the amount of reserved
memory and the number of CPUs for the VM.
Table 6
Exporters
Up to 250
Up to 500
Up to 1000
Up to 1000
Hosts
Up to 125,000
Up to 250,000
Up to 500,000
Up to 500,000
Reserved Memory
4 GB
8 GB
16 GB
32 GB
Reserved CPUs
2
3
4
5
31
Design Considerations
SMC Model
SMC 1000
SMC 2000
Maximum FlowCollectors
5
25
Size
1 RU
2 RU
Storage
1.0 TB
2.0 TB
Memory
8 GB
16 GB
Table 8 lists the number of FlowCollectors and concurrent users based on reserved memory and CPUs
that the SMC VE can support.
Table 8
SMC VE Specifications
FlowCollectors
1
3
5
Note
Concurrent Users
2
5
10
Reserved Memory
4 GB
8 GB
16 GB
Reserved CPUs
2
3
4
If a high number of host groups and monitored interfaces is expected in the deployment, a
higher-performance SMC should be considered, because the amount of data being sent to the SMC can
increase in these deployments.
FlowReplicator
Model
1000
Processing Capacity
10,000 pps input
2000
32
Physical
Layer
Copper
Form Factor
1 RU-short
Copper or 1 RU
Fiber
Power
Non-redundant
Fault
Tolerant
No
Redundant
Yes
Design Considerations
Note
If the physical limits of the appliance are exceeded and too many copies are being generated for the link,
packets are dropped.
NetFlow
Consult Table 10 for Cisco platform details.
Table 10
Platform Details
Platform
Catalyst 3K-X
Hardware Details
3560-X/3750-X
with SM
Catalyst 3850/3650 3850/3650
Software Details
IOS 15.0.(2)SE7
NetFlow Details
FNF (v9)
In CTD version 1?
Yes
IOS-XE 3.3.5SE
FNF (v9)
Catalyst 4500
Sup7-E
IOS-XE 3.4.5SG
FNF (v9)
Partial (3850 in
1.1.2)
Partial (Sup7-E)
Catalyst 6500
Catalyst 2960-X
Sup8-E
Sup2T
2960-X
IOS-XE 3.3.2XO
IOS 15.0.(1)SY7a FNF (v9)
IOS 15.0.(2)EX
NetFlow Lite
(sampled V9)
Yes
No
2901, 2911
ASR 1001/1002F
ASA 5505, 5510
ASA 5515-X,
5545-X
IOS 15.(3)M4
IOS-XE 3.10.xS
ASA 9.0.4
ASA 9.3.2
FNF (v9)
FNF (v9)
NSEL (v9)
NSEL (v9)
Yes
Yes
Yes
No
FirePOWER
5.3.1
1.0.2
FNF (v9)
Yes (3140)
2.2(2e)
FNF (v9)
No
(NetFlow Lite)
ISR G2
ASR 1000
ASA 5500
ASA 5500-X with
FirePOWER
Services
NetFlow
Generation
Appliance (NGA)
UCS VIC
NGA 3240
VIC
1240/1280/1225
33
Design Considerations
Note
FirePOWER Services on the Cisco ASA are supported in transparent and routed (L3) modes for both
single and multiple Cisco ASA high-availability deployments.
Failover link
Note
Figure 16
ISP A
E Router
Outside
Switch
Cisco ASA
5585
DMZ
Switch
X speed Core
+ Distribution
Internal
Network
34
348063
Internet
Servers
Design Considerations
Clustering Deployment
For scalability, a cluster may contain up to 16 Cisco ASA 5585-X firewalls with FirePOWER Services
Modules. The Cisco ASA 5500-X supports a cluster of two units.
Cisco ASA clustering provides the following benefits:
Ability to aggregate traffic to achieve higher throughput
Scaling the number of Cisco ASA appliances into one logical firewall within the data center
architecture
True Active/Active model; when in multi-context mode, every member for all contexts of the cluster
are capable of forwarding every traffic flow
Removes asymmetry by sending packets that are received by an ASA that does not own a flow to
the actual owner over the Cluster Control Link (CCL)
Single Cisco ASA configuration is maintained across all units in the cluster using automatic
configuration sync
State sharing does not occur between the FirePOWER Services modules within the Cisco ASA cluster.
Thus, the FirePOWER configurations are not synced within the cluster.
Figure 17 shows a typical cluster deployment.
Figure 17
Layer 2
Deployment
Data Plane
Nexus 7Ks
and vPC Peers
Nexus 7K-1
Master
Slave
Slave
Slave
Slave
Slave
PC-20
Nexus 7K-2
PC-20
16
Slave
348064
Note
35
Design Considerations
Multi-Context Deployment
A common method for segmenting traffic through the Cisco ASA is to configure multiple context
mode. This allows the enforcement of distinct security policies on each separate virtual security
context. Some typical use cases for multi-context mode on the Cisco ASA include:
Large enterprises or college campuses that need to keep departments completely separate
Networks that require more than one Cisco ASA but have budget restrictions
In multi-context mode, Cisco ASA interfaces and sub-interfaces are assigned to each context. When
deploying FirePOWER services on the Cisco ASA in multi-context mode, the interfaces associated
with each context can be grouped into security zones. Different FirePOWER policies can then be
applied to each zone; for example, a policy might be applied for context A/interface outside to context
A/interface inside.
Figure 18 shows a typical multi-context deployment:
ASA can be configured in multi-context mode such that traffic going through the ASA can be
assigned different policies.
These interfaces are reported to the FirePOWER blade and can be assigned to security zones that
can be used in differentiated policies.
In this example, you could create one policy for traffic going from Context A to Context B inside,
and then a different policy for Context B outside to Context B inside.
Note
There is no management segmentation inside the FirePOWER module similar to the context idea
inside ASA configuration.
Figure 18
Outside
348065
Inside
36
Design Considerations
Note
Although the ASA Clustering deployment discussion is included in this document for additional context,
ASA Clustering was not included in the validation. ASA Clustering has been extensively validated and
documented in the Secure Data Center for the Enterprise Solution Portfolio. For more details, see the
following URL:
http://www.cisco.com/c/en/us/solutions/enterprise/design-zone-secure-data-center-portfolio/index.html
FirePOWER appliances have a variety of deployment options available, including the following:
PassivePassive mode allows the sensor to inspect packets coming from a SPAN port on a switch
or a network tap. Because the appliance is not in the packet flow (the packets are copies and not
originals), there is no impact to the network, either in latency or in failure scenarios. The downside
is that because the device is in passive mode, it is not working with the original packets and therefore
cannot drop malicious traffic before it reaches its destination.
Interface pairingInterface pairing mode is the normal IPS mode where the appliance is acting like
a wire and taking packets off one interface, inspecting them, and sending them down another
interface, and vice versa. Because the appliance is inline, it can block malicious traffic including
single packets, but the traffic must go through the appliance; therefore, some additional latency is
added and failure scenarios must be accounted for. This is one reason features such as fail open
interfaces are generally used.
Virtual switchThis mode allows the sensor to act as a virtual switch and provide inspection of
packets coming in off one or more virtual interfaces acting as a Layer 2 switch. This mode allows
the device to drop packets much like interface pairing mode.
Routed modeThis mode puts the device into the network as a Layer 3 device where each interface
has an IP address. This is typically used when the device is acting as a firewall and applying Layer
3 and Layer 4 policy in addition to IPS, AVC, and URL policies.
Many different appliances are available with a broad range of performance levels. There are also
numerous options for interface types.
The appliances can be set to Failopen or Failclosed mode depending on the desired results.
A network-based solution, integrated into dedicated Cisco ASA firewall and Cisco FirePOWER
network security appliances
An endpoint solution for PCs, Macs, mobile devices, and virtual environments
37
Design Considerations
An integrated feature in Cisco Cloud Web Security or Cisco Web and Email Security Appliances
AMP for networks is a feature that can be licensed on any FirePOWER sensor. As such the design and
deployment considerations are exactly the same as the FirePOWER service modules and FirePOWER
appliances.
AMP for endpoints is a capability that can be installed on Windows PCs, Macs, virtual environments,
and mobile devices. AMP for Endpoints not only monitors files for malicious content but can watch the
actions that result from unknown files being brought onto a system. It can then block the file from
spreading or causing damage on the system after it is determined to be malicious.
ESA Virtual (ESAV) appliances are supported on VMware ESXi hypervisors, and are also available
in several sizes:
Cisco ESAV C000v for evaluations only
Cisco ESAV C100v for up to 1000 mailboxes
Cisco ESAV C300v for up to 5000 mailboxes
Cisco ESAV C600v for large enterprises or service providers
As an alternative to physical or virtual ESA appliances deployed on premise, Cisco Cloud Email
Security (CES) provides the same level of protection, with the service hosted in Cisco data centers.
Hybrid deployments are also available.
A recommended practice is for the ESA to be the first SMTP hop on the way in and the last hop on the
way out of the enterprise network. For simplicity, ESA appliances should usually be deployed with a
single interface and IP address for both mail and management traffic.
Note
A full discussion of ESA deployment options is beyond the scope of this document. For further details,
see the Cisco Design Zone for Internet Edge at www.cisco.com/go/designzone.
38
Conclusion
medium, and large networks. The software functionality is identical on all sizes of appliance.
WSA Virtual (WSAV) appliances are supported on KVM or VMware ESXi hypervisors, and are also
available in several sizes:
Cisco ESAV C000v for up to 1000 web users
Cisco ESAV C100v for up to 3000 web users
Cisco ESAV C300v for up to 6000 web users
Cisco CWS can be deployed as an entirely cloud-based solution or integrated together with on-premise
WSA appliances. Cisco CWS Premium incorporates AMP and CTA for enhanced detection of
advanced threats.
WSA appliances can be deployed using several options, including transparent redirection and explicit
proxy configuration. A full discussion of WSA deployment options is beyond the scope of this
document. For further details, see the Cisco Design Zone for Internet Edge at
www.cisco.com/go/designzone.
Conclusion
This document discusses some of the challenges in defending networks against modern, advanced
threats and provides design guidance for the Cisco Cyber Threat Defense solution. This solution
focuses on improving situational awareness and reducing the time required to detect and respond to
threats acting inside the network, not just at the traditional network perimeter. To do this, it enables the
network infrastructure to provide increased visibility and control, and incorporates Ciscos leading
security technologies in an integrated design. The end result is a real improvement in the defenders
ability to detect, block, and remediate threats in new ways.
References
General Security Information
National Institute of Standards & Technology (NIST) IR 7298 Revision 2: Glossary of Key
Information Security Termshttp://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf
39
References
40