Brksec 3433
Brksec 3433
environment
Leverage the Firepower API, Cisco Cloud
Email Security and more
Christopher van der Made – CSE Security
@ChriscoDevnet
BRKSEC-3433
“SaaS, DIA and Zero Trust forces us to
think differently: security for data in
transit does not work for most SaaS,
therefore, enforce security on the far
ends of the spectrum: on the Endpoint
and the App.”
Christopher van der Made, 2018
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
DC & Cloud Security Diagonal Learning map
BRKSEC-2602 / Friday – 11h30
Cloud Managed Security Architecture and
Design
BRKSEC-2605 / Thursday – 8h30
Securing Clouds: Untraditional
Defenses
BRKSEC-3093 - 14h45
ARM yourself using NGFWv in AZUR BRKSEC-2034 / Thursday -14h45
Cloud Management of Firepower
BRKSEC-2998 / Wednesday – 11h00 and ASA with Cisco Defense
Cloud Managed Security & SD-WAN from Orchestrator
Cisco Meraki
BRKSEC-2186 / Thursday - 11h15
A multi-cloud segmentation journey
TECSEC-2768 / Monday – 8h30 through big data with Tetration.
Securing applications and workloads
on the journey to the cloud
BRKSEC-3433 / Thursday – 8h30
Protecting your Office 365 environment: leverage the
BRKSEC-2048 / Wednesday – 8h30 Firepower API, Cisco Cloud Email Security and more.
Demystifying ACI Security
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Who am I?
• Christopher van der Made.
• CSE Security, joined through
graduate Program in 2015.
• Studied Neuro-, Computer-
and Information-Science @
University of Amsterdam.
• Love being outdoors, building
stuff and cutting down trees
(responsibly!).
• Love coding and active
contributor to DevNet.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
• Learn more about the challenges
of Cloud SaaS.
• Learn how to optimize traffic
going to O365 and maximize
availability of SaaS.
Goals of this session: • Learn how CES with AMP,
Cloudlock, Adaptive MFA (Duo)
and Stealthwatch Cloud can
increase the confidentiality and
integrity of your data in O365 and
Azure.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Introduction to Microsoft
Office 365
“Please raise your
hand if, you are
using O365 in your
organization or at
one of your
customers”
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
“Please raise your
hand if, you would
like to share
challenges you
have faced with
O365…”
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Common applications hosted by O365
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Microsoft O365 Networking Best Practices
Source: https://docs.microsoft.com/en-us/microsoft-365/enterprise/networking-provide-bandwidth-cloud-services
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Microsoft O365 Networking Best Practices
“To configure and update the configurations of edge devices, you can use a script or a
REST call to consume a structured list of endpoints from the Office 365 Endpoints
web service. For more information, see Office 365 IP Address and URL Web service.”
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Microsoft O365 Web Service API
• Service Areas:
• Exchange Online and Exchange Online Protection
• SharePoint Online and OneDrive for Business
• Skype for Business Online and Microsoft Teams
• Common, O365 Pro Plus, Office Online, Azure AD and others.
• Categories:
• Optimize: bypass or whitelist on edge devices (75% of all O365 traffic)
• Allow: bypass or whitelist on edge devices (less sensitive though to latency etc.)
• Default: can be treated as “normal” traffic (not always hosted by MSFT)
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
How to secure O365?
The CIA model and O365
Information
Security
Confidentiality
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Solution Short CIA Summary benefit to O365
Model
Firepower Threat FTD/ A Bypass O365 traffic with Python script or with built-in App Detector.
Defense FMC
Umbrella UMB A Bypasses O365 traffic by default. Can do O365 tenant restrictions.
Web Security WSA A Bypasses O365 traffic with allow rule. Can do O365 tenant restrictions.
Appliance
Cloud Email Security CES CI Inspection on all email traffic, O365 API based integration for AMP
(with AMP) Retrospective Remediation. Spam reduction.
Advanced Malware AMP CIA AMP for Email with AMP for Endpoints provides holistic malware
Protection protection. Threat Grid for dynamic file analysis.
Cloudlock CL CI UEBA on O365 authentications, DLP on files and OAuth App Firewall on
connected (shadow IT) apps.
Duo Security DUO CIA Adaptive MFA and SSO on all O365 (and other) apps. Authenticate
users regardless of their location.
Stealthwatch Cloud SWC CI Can natively monitor Azure (+ AWS and GCP) flow logs, model entities
automatically and detect anomalies based on behavioral analysis.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Cisco Threat
Response
Internet
SWC
APIs
Internet Traffic
Cloudlock
Retrospective AMP
> Umbrella
Remediation
Whitelisted Internet Traffic
APIs
SMTP Traffic
Unified Block Page > AMP(4E) 1. Detect
> Threat Grid 2. Investigate
> FTD 3. Remediate
> CES / ESA
> more!
SAML DUO Access Gateway
MFA
Umbrella CES
Proxy
Internet Traffic
Non-Cloud
MFA
Umbrella and OpenDNS
WSA FTD AMP(4E)
Threat Grid
FTD and Snort
AnyConnect Umbrella AMP4E
CES / ESA
Client WSA
AMP4E VPN Traffic
Cloudlock
Stealthwatch
Internal Network Cognitive 27
Roaming User (+ Branch)
What value does Talos bring to O365?
Main Source Daily Type Benefit to O365?
Amount
ESA/CES 600B Email Sender Domain Reputation, Phishing, BEC
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Gateways/Proxies
Is the traffic to Office 365 going directly
to the internet, or is a Gateway or Proxy
inspecting the traffic in transit?
All Microsoft Support Persons, Always
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Firepower Threat
Defense
Firepower Threat Defense Traffic Flow
• Firewalling + NGIPS
Internet • Application Control
• AMP and Threat Grid
• URL Filtering
• Security Intelligence
Allowed Traffic
• Virtual Patching
Trusted
Traffic
(e.g. O365) Unified Block Page
Blocked Traffic Based on
Reputation or Inspection
FTD
Internal Network
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Application Visibility and Control
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Office 365 App Detector
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Give rule high priority!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
AVC Trust Rules operation in FTD
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Automate: VDB Download and Install Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
But WAIT,
Firepower also has
a REST API!
“Please raise your
hand if, you have
experience with
coding!”
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
What is REST API?
Action Response
JSON, XML, TEXT
https://<address-of-FMC>/api/api-explorer
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
FMC API Explorer Pro Tip
https://<address-of-FMC>/api/api-explorer
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
How to Build an Office 365 “whitelist” with the
Firepower REST API
• Microsoft publishes a list with URL, IPv4 and IPv6 addresses that are used
for the infrastructure of the Microsoft cloud applications (e.g. Office 365).
• This list can be used in a “Whitelist” on Edge Devices (e.g. NGFW).
• Microsoft updates the Office 365 IP address and FQDN entries at the end
of each month and occasionally out of cycle for operational or support
requirements.
• Microsoft recommends you check the version daily, or at the most, hourly.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
O365 Whitelist in Firepower Threat Defense
1. Create an URL and an IP object in FMC (or let the script do that!):
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Give rule high priority!
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
How to Automate the Update Process
Sleep for
First Time New scheduled
Script version interval
Runs? available? and
repeat…
Prompt
Scheduled
user which Retrieve
Script Script
apps and List of IPs
Service Ends.
region are and URLs.
Enabled?
used…
Update
Auto
Parse list FMC
Auto Policy Policy
and create objects +
Deploy Deploy in
JSON Webex
Enabled? FMC.
objects. Teams
*warning*
alert.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
JSON format O365 Web Service
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
JSON format O365 Web Service
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Show me some
code!
Check for updates
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Update IP group object in FMC
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Umbrella
Umbrella DNS Traffic Flow
Internet
Intelligent Proxy
Whitelisted
DIA Traffic
(e.g. O365)
DIA / DCA
Internal Domains
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Umbrella DNS Advantages for O365
*Source: https://learn-umbrella.cisco.com/solution-briefs-2/umbrella-o365-performance-use-case-3
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Umbrella Secure Internet Gateway (SIG)
Internet
Umbrella
+ Cloudlock OAUTH
IPSec
Tunnels
• DNS-based security
SD-WAN • Cloud delivered Firewall
edge • Secure Web Gateway
• CASB (Proxy + API)
• O365 bypass with Web
Roaming Users Service API!
AnyConnect Cisco Routers / SDWAN
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Umbrella SWG O365 Bypass
Internet
• Currently needs to be
enabled by Umbrella
Support, future GUI option SWG Bypass
will be added soon. based on FQDN
4b
Sync with Web
• Uses the Microsoft API to NAT Service API
bypass all O365 FQDN’s! DNS BYPASS 443 ALLOWED SWG BYPASS
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Request bypass via:
[email protected]
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Umbrella SWG O365 Tenant Restriction via Azure
AD (coming soon!)
4. Azure AD evaluates if
user credentials match
the tenant restriction.
3. Connection to Azure
AD is not bypassed, and
SWG places HTTP
header indicating the
allowed tenant.
2. User gets redirected to
SWG Azure AD for authentication:
login.microsoftonline.com
5. Azure AD will issue
service token if credentials
match the header.
6. User is successfully
authenticated and can
access O365 resources.
Source: https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/tenant-restrictions
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Cisco SD-WAN + Umbrella Advantages for O365
• While Umbrella can provide the best DC based on EDNS, SD-WAN can provide the
best WAN link to use.
• All WAN links will be continuously monitored with probes.
• O365 traffic will be dynamically routed to the best-performing path without requiring
human intervention.
• Cloud onRamp for SaaS provides real-time and historical visibility into application
performance through a Quality-of-Experience metric.
• Can automatically set-up IPSec tunnels to Umbrella’s CDFW and SWG.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Web Security
Appliance
Web Security Appliance Traffic Flow
• Web Reputation
• Application Control
Internet
• AV and AMP
• Data Loss Prevention
• Cognitive Intelligence
•
Allowed Traffic
Cloudlock Integration
Bypassed
Traffic
(e.g. O365) Unified Block Page
Blocked Traffic Based on
Reputation or Inspection
WSA
Internal Network
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Custom and External URL Categories:
Edit Category
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Custom and External URL Categories: Add
Category
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Allow and Pass Through rules for O365
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Also possible in Proxy Bypass for WCCP traffic!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
WSA O365 Tenant Restriction via Azure AD
4. Azure AD evaluates if
user credentials match
the tenant restriction. Configure via WSA CLI:
3. Connection to Azure > advancedproxyconfig
AD is not bypassed, and
WSA places HTTP > customheaders
header indicating the > new
allowed tenant.
2. User gets redirected to > Restrict-Access-Context: <Azure AD ID>
WSA Azure AD for authentication:
login.microsoftonline.com
5. Azure AD will issue
service token if credentials
match the header.
6. User is successfully
authenticated and can
access O365 resources.
Sources: https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/tenant-restrictions
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Cloud Email Security
with AMP
Mapping Features to Protection
Connection Filters Spam Filter Anti-Malware Defense Marketing Filter Rules 0-day Malware
Spoof Detection URL Analysis Advanced Malware Protection (AMP) Anti-Phishing and URL Analysis
Outbound Threat Filters Outbound Data Protection Marketing URL Analysis Advanced Malware Protection (AMP)
Anti-Malware Defense
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Microsoft O365 E3 licenses Cisco CES Premium licenses
Sender Base Reputation
Graymail Detection
Envelope Encryption
MX 10 cust45.office365.com
MX 20 cust46.office365.com
Customer Sender
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Office 365 with Cisco Email Security
MX 10 esa1.cisco-ces.com
MX 20 esa2.cisco-ces.com
CES
Customer Sender
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Azure Identity Connector for CES
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Azure Identity Connector for CES
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Office 365 with Cisco Email Security
MX 10 esa1.cisco-ces.com
MX 20 esa2.cisco-ces.com
CES
CES
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Office 365 with Cisco Email Security
CES
Customer
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Office 365 with Cisco Email Security
CES
What happens if
O365 Tenant gets
compromised?!
Customer
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Office 365 with Cisco Email Security Pro Tip
CES
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Mail Policies with AMP
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Advanced Malware Protection Flow EU Location: Dublin
US Location: VA, TX and CA
1. Email with
attachment arrives
AMP CLOUD
3. AMP Verdict: Unknown
CES
Poke:
Verdict
6. Email dropped or 4. Email to Update
further processed Quarantine
THREAT GRID
CLOUD
EU Location: Frankfurt
US Location: VA, TX and CA
Customer
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Retrospective Verdict Change
Verdict Update for a threat that
has a disposition change at
later point in time
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
AMP Unity Retrospective Event Flow
4. No Quarantine Policy, 1. Email with
Email Delivered attachment arrives
2. File Reputation Query (SHA256)
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
AMP Unity Integration Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
CES + Cisco Threat Response Integration
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Installation: create Azure app with read-only
Graph API permissions
Sender
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Example Cisco Threat Analyzer report E3+ATP
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Cloudlock
Challenges organizations have with SaaS…
User / Entity Behavior Data Content and Sharing OAuth Connected Apps
Tracking Tracking and Shadow IT
• Who is doing what in • Do I have toxic and/or • How can I monitor app
my cloud applications? regulated data in the usage and risk?
cloud?
• How do I detect account • Do I have any 3rd party
compromises? • Do I have data that is connected apps?
being shared
• Are malicious insiders inappropriately? • How do I revoke risky
extracting information? apps?
• How do I detect policy
violations?
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Solving: User / Entity
Behavior Tracking
• Checking all user activity across
SaaS apps for:
• Login location
• Login public IP
• Distance between login’s
• Any specific event (e.g. file shared with
anonymous link)
• Specific user groups
• Etc.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Solving: Data Content
and Sharing Tracking
EXAMPLE
ADMIN
Unmanaged OAUTH
Devices
ACCESS
Authorized
Unmanaged
Network
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Sign in to Cloudlock using OAuth
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Set-up Cloudlock and O365
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Set-up Cloudlock and O365
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Set-up Cloudlock and O365
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
The result!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Office 365 Firewall Pro Tip
• If your Office 365 tenant has Firewall rules that prevent third-party applications-
please whitelist the following ranges so Cloudlock may have access:
• 52.73.52.135 - 52.73.52.135
• 52.71.142.118 - 52.71.142.118
• 52.40.204.69 - 52.40.204.69
• 52.35.119.173 - 52.35.119.173
• 52.27.150.153 - 52.27.150.153
Source: https://docs.umbrella.com/cloudlock-documentation/docs/quick-start-guide-office-365
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Example DLP Policy + Webex Teams
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Drop credit cards numbers in Webex Space…
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
Slap on the wrist from Cloudlock!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Detailed reporting in Cloudlock
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
Adaptive MFA: Duo
Security
“Please raise your
hand if, you are
sure you have
never been
Phished at some
point in time!”
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Spotting Phishing sites is becoming very difficult…
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
But how do we
stop this?
#1: Verify User
Trust!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
#2: Verify Device
Trust!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
#3: Control EVERY
Application!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
DUO Access Gateway (DAG) App Launcher
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
DUO + O365 Authentication Flow (On-prem AD)
2. Primary
authentication
AD
1. O365 redirects
to DAG or user 6. Session
logs in directly to authenticated and user
DAG SSO redirected into O365
5. DAG receives
3. DAG establishes
authentication
connection to DUO
response from DUO
Cloud
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
DUO + O365 Authentication Flow (Azure AD)
2. Primary authentication
Azure AD (OpenID Connect)
1. O365 redirects
to DAG or user 6. Session
logs in directly to authenticated and user
DAG SSO redirected into O365
5. DAG receives
3. DAG establishes
authentication
connection to DUO
response from DUO
Cloud
4. Secondary
authentication via
DUO (push, call etc.)
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
DUO + O365 Authentication Flow (Azure AD
Conditional Access)
7. Client sends Duo
approval back to Azure.
5. Secondary
authentication via
DUO (push, call etc.)
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
Steps to secure O365 with DUO with DAG
1. Download and deploy the DAG (e.g. on Azure or Cisco Hosted (beta))
2. Enable O365 Single Sign On with DAG as IdP
3. Create the O365 Application in DUO
4. Add the O365 Application to the DAG
5. Verify SSO
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
DEMO: Create the O365 Application in
DUO + Deploy DAG
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
DEMO: Verify SSO O365
Duo Certificate
required for host
FQDN for AMP
2. Primary authentication:
connector matching!
Azure AD (OpenID Connect)
1. User browses to
O365 (or DAG) to login 5. User is prompted
with the Duo Access
Denied page
4. Endpoint
3. DAG establishes
Compromised: Duo
connection to DUO
responds with
Cloud
Access Denied
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Add AMP4E
Integration to Duo
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Set Duo Adaptive MFA Policies with AMP4E
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Result: Duo Authentication Logs shows AMP4E
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
DEMO: Duo integration with AMP4E
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Stealthwatch Cloud
PUBLIC CLOUD
Stealthwatch
PRIVATE CLOUD ON-PREMISES NETWORK
Cloud
SWC Sensor
Sensor Pod
+ Firepower
in K8
Containers -or-
Events
ONA
Virtualization SWC Sensor
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Entity -> Observations -> Baseline -> Alert
Start
Database server
identified 36 Day Baseline Alert Triggers for
Monitor and model
behavior
Database Exfiltration
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
NSG Flow Logging (“Azure Netflow”)
• Flow logs include the following • Traffic Flow - The direction of the traffic flow. Valid values
are I for inbound and O for outbound.
properties: • Traffic Decision - Whether traffic was allowed or denied. Valid
values are A for allowed and D for denied.
• mac - The MAC address of the NIC for the VM
Flow State - Version 2 Only - Captures the state of the flow.
where the flow was collected •
Possible states are B: Begin, when a flow is created. Statistics
aren't provided. C: Continuing for an ongoing flow. Statistics
• flowTuples - A string that contains multiple are provided at 5-minute intervals. E: End, when a flow is
properties for the flow tuple in comma-separated terminated. Statistics are provided.
format • Packets - Source to destination - Version 2 Only The total
• Time Stamp - This value is the time stamp of when the flow number of TCP or UDP packets sent from source to
occurred in UNIX EPOCH format destination since last update.
• Source IP - The source IP • Bytes sent - Source to destination - Version 2 Only The total
number of TCP or UDP packet bytes sent from source to
• Destination IP - The destination IP destination since last update. Packet bytes include the packet
• Source Port - The source port header and payload.
• Destination Port - The destination Port • Packets - Destination to source - Version 2 Only The total
number of TCP or UDP packets sent from destination to
• Protocol - The protocol of the flow. Valid values are T for TCP source since last update.
and U for UDP
• Bytes sent - Destination to source - Version 2 Only The total
number of TCP and UDP packet bytes sent from destination to
source since last update. Packet bytes include packet header
and payload.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
NEW: Adding Azure Watchlists
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
NEW: Additional Azure Alerts
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
NEW: Confirmed Threats and Encrypted Traffic
Analytics
Confirmed Threat Service Encrypted Traffic Analytics
powered by Cognitive Intelligence in Stealthwatch Cloud
• Available now for all SWC customers! • Available now for all SWC customers!
• Correlation with all SWC monitored traffic • Requires ETA telemetry from Cisco devices
for domain and IP matches
• New Alerts & Observations:
• Protocol Forgery
• Vulnerable Transport Security Protocol
• Indicator Matches: Hostname or URL
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
NEW: Cisco Secure Sign-On
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
EXAMPLE: Port 3389 open on a Windows Server
2016 in Azure…
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
… within 1 hour 253 login attempts!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
DEMO: O365 Stealthwatch Cloud Alerts
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Agenda
Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Closing
Cisco Threat
Response
Internet
SWC
APIs
Internet Traffic
Cloudlock
Retrospective AMP
> Umbrella
Remediation
Whitelisted Internet Traffic
APIs
SMTP Traffic
Unified Block Page > AMP(4E) 1. Detect
> Threat Grid 2. Investigate
> FTD 3. Remediate
> CES / ESA
> …?
SAML DUO Access Gateway
MFA
Umbrella CES
Proxy
Internet Traffic
Non-Cloud
MFA
Umbrella and OpenDNS
WSA FTD AMP(4E)
Threat Grid
FTD and Snort
AnyConnect Umbrella AMP4E
CES / ESA
Client WSA
AMP4E VPN Traffic
Cloudlock
Stealthwatch
Internal Network Cognitive
Roaming User (+ Branch)
Christopher, can you
give me an EXAMPLE of
an organization that
uses all of this?
Please check out: BRKCOC-2384!
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Please check out: BRKCOC-2384!
AS 12076
AS 109 AS 24115
CAS
MBX
ESAs
HSMs ESAs
inbound
ESA: IronPort
outbound
Cisco.com MX
Email Security Appliance
DMARC
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Key Takeaways
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
Links to continue reading
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
Agenda
Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
Continue your education
Demos in the
Walk-in labs
Cisco campus
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
DC & Cloud Security Diagonal Learning map
BRKSEC-2602 / Friday – 11h30
Cloud Managed Security Architecture and
Design
BRKSEC-2605 / Thursday – 8h30
Securing Clouds: Untraditional
Defenses
BRKSEC-3093 - 14h45
ARM yourself using NGFWv in AZUR BRKSEC-2034 / Thursday -14h45
Cloud Management of Firepower
BRKSEC-2998 / Wednesday – 11h00 and ASA with Cisco Defense
Cloud Managed Security & SD-WAN from Orchestrator
Cisco Meraki
BRKSEC-2186 / Thursday - 11h15
A multi-cloud segmentation journey
TECSEC-2768 / Monday – 8h30 through big data with Tetration.
Securing applications and workloads
on the journey to the cloud
BRKSEC-3433 / Thursday – 8h30
Protecting your Office 365 environment: leverage the
BRKSEC-2048 / Wednesday – 8h30 Firepower API, Cisco Cloud Email Security and more.
Demystifying ACI Security
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
Security Breakout
Thursday 30 January 2020
start time length in hours
BRKSEC-3432 Advanced ISE Architect, Design and Scale ISE for your production networks 08:30 AM 2
BRKSEC-3035 Firepower Platforms Deep Dive 08:30 AM 2
BRKSEC-2605 Securing Clouds: Untraditional Defenses 08:30 AM 1
BRKSEC-2433 Threat Hunting and Incident Response with Cisco Threat Response 08:30 AM 2
BRKSEC-3433 Protecting your Office 365 environment: leverage the Firepower API, Cisco Cloud Email Security and more. 08:30 AM 2
BRKSEC-3690 Advanced Security Group Tags: The Detailed Walk Through 11:15 AM 2
BRKSEC-3455 Dissecting Firepower NGFW: Architecture and Troubleshooting 11:15 AM 2
BRKSEC-3054 IOS FlexVPN Remote Access, IoT and Site-to-Site advanced Crypto VPN Designs 11:15 AM 2
BRKSEC-3771 Advanced Web Security Appliance Deployment & Troubleshooting with a side of Advanced Threat Technologies 11:15 AM 2
BRKSEC-2186 A multi-cloud segmentation journey through big data with Tetration 11:15 AM 2
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 184
“SaaS, DIA and Zero Trust forces us to
think differently: security for data in
transit does not work for most SaaS,
therefore, enforce security on the far
ends of the spectrum: on the Endpoint
and the App.”
Christopher van der Made, 2018
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
Thank you
Backup Slides
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
Firepower Threat
Defense
Application Visibility and Control
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 191
Change GUI!!! Give rule high priority!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 192
Automate: VDB Download and Install Pro Tip
Change GUI!!!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
Firepower API Use Cases
Vulnerability
Change policy
analysis
1. Create an URL and an IP object in FMC (or let the script do that!):
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
Give rule high priority!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
How to Automate the Update Process
• Retrieve IPs and URLs from O365 REST-based web service (JSON).
• This can be the Worldwide list (default), or change this to DoD, Germany etc.
• This can be all O365 apps (default), or change this to Exchange only etc.
• Retrieves only the Optimize and Allow addresses.
• Parse this list into 2 flat lists (URL and IP (mixed IPv4 and IPv6)).
• Loop through list and create right JSON format for FMC API PUT requests.
• Create/Update the IP and URL objects in FMC -> Webex Teams Alert.
• Policy deploy to FTD sensors (caution with automation!).
• Check for updates using the O365 Version API Endpoint (max every hour).
• ⟲ In case of update, repeat process, else, sleep for an hour.
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
Get the latest version
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 198
User prompted for FMC and O365 details…
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 199
User prompted for FMC and O365 details…
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 200
Parse URLs out of JSON into list
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 201
Parse IPs out of JSON into list
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 202
Update URL group object in FMC
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 203
Umbrella
Tip for VA and Roaming Clients + O365 Pro Tip
• When using Autodiscover with VA’s and/or the Roaming Clients, please ensure that your
Autodiscover domain is added to the internal domains list
(autodiscover.outlook.com.glbdns.microsoft.com).
Source: https://support.umbrella.com/hc/en-us/articles/230563567-Using-Office-Autodiscover-or-
Office-365
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 205
Unified Block Page
WSA Block Page Settings Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
WSA Block Page Settings Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
Umbrella Block Page Settings Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 209
FTD Block Page Settings Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
FTD Block Page Settings Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 211
Example Block Page Pro Tip
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 212
Agenda
• Closing
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 213
Adaptive MFA
What does DUO aim to do?
1 2 3
Verify Verify Controls for
User Trust Device Trust Every App
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 215
DUO’s Platform
Devices
Personal Corporate
(Unmanaged) Devices (Managed) Devices Applications
Identity & Infrastructure
All Employees Cloud
Contractors Datacenter
& Partners
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
Cloudlock addresses these key questions!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
1. User and Entity Behavior Analytics
True threat
Document created
Email sent
141x than average
data asset deletion 31% login
activities
File modified
227x than average
file downloads
11% admin
actions
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 221
2. Cloud Data Loss Prevention (DLP)
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 223
Example Policy 1: Event Analysis (UEBA)
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 224
Solving: Data Content
and Sharing Tracking
• Checking uploaded and shared
documents for:
• Inappropriate content
• SSN/ID numbers
• Credit Card numbers
• Distance between login’s
• Medical ID numbers
• Documents sharing exposure
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
Example Policy 2: EU Personal Identifiers
• The EU PII Policy matches personal identifiers from the twenty-seven countries of
the European Union.
• The policy monitors common identifiers associated with GDPR to better assist
customers with compliance in their own organizations.
• E.g.: Person Name, Drivers License, IBAN, License Plates, National ID, Etc.
• For full list: https://docs.cloudlock.info/docs/eu-personal-identifiers
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 231
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 232
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 233
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Stealthwatch Cloud
ETA / Enhanced Netflow Required
Crypto-compliance reporting
• Ensure quality encryption is being used
throughout the organization
• Query on various parameters like protocol,
algorithm, message authentication code
How do you get ETA telemetry from
(MAC), andthe
more
Public Cloud?
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 237
Conclusion
Please check out: BRKCOC-2384!
Cisco on Cisco: Office 365
• ESA: fully migrated to O365 Exchange Online with Email Security Appliances (in
future will migrate to CES).
• Cloudlock: used for Onedrive and Sharepoint, testing with Salesforce.
• Meraki MDM: migration at the moment.
• Umbrella DNS: used globally (rollout was 30 seconds), AnyConnect roaming client
rolled out in phases.
• Duo: rolled out within 3 months, much faster than previous solution.
• AMP4E: running on managed Mac and Windows endpoints.
• Firepower: used globally, with O365 bypass.
• And more!
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 239
Why O365?
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 240
Secure Digital Experience
Collaboration
eco-system
Team Space
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 241
Joint Development: O365 + WxT Capabilities
Webex
Webex
+
Meeting
Teams
Easy Transition from productivity Tools Embedded for enhanced Real time editing across all devices
to team Collaboration meeting experience
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 242
Mail Flow &
AS 12076
Filtering
AS 109 AS 24115
CAS
Cisco Premise
O365 Hybrid
CAS/TRNS
MBX
ESAs
ESAs
inbound
Mailboxes Cisco.com MX
outbound
DMARC
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 243
AS 12076
SSO with MFA
O365 Hybrid
Internet Premise
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 244
CASB-Out of Band
Protection
Private
Cloud
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 245
Barcode Zero Trust Networking
DMs:
Meraki,
Jamf, identity.cisco.com
SCCM, DAVE
etc
Cisco Premise
Off Premise
TrustedDevice
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 246
TrustedService CSIRT
With Federated Device Posture Playbook
Monitoring
Federated
Trust
Application
Security
Controls
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 247
Application Control
With CloudLock
BRKSEC-3433 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 248