Avatar

RATS in the Data Center, a recent blog post by Cisco’s Tom Hogue, highlighted the current threat landscape for data centers. Tom was referring to Remote Access Toolkits, not the disease-carrying vermin that likely started the plagues that ravaged Europe in the Middle Ages. However, the destructive effect of modern-day RATS can be devastating.. They provide a novice hacker the tools to craft a successful attack, lowering the skill and proficiency needed while increasing the volume and likelihood of attacks. And RATS attacks will likely target the data center because that is where the most valuable information is stored – whether it’s credit card numbers, social security and other personally identifiable information (PII), financial records, intellectual property, or trade secrets.

Many organizations secure the perimeter of their network. But once network access is granted, there are minimal controls in place for authorized users. They are completely trusted on the network. The underlying problem in today’s threat environment is these users may not be in control of their device due to malware infection. Or they may not be who they say they are due to stolen credentials/passwords. A new model is needed to continually protect the critical assets of the business and to minimize complexity while supporting new data center services and business models.

Cisco developed the Secure Data Center for the Enterprise Solution portfolio of validated design guides to create a comprehensive and modular approach to securing data centers. The newest Cisco Validated Design (CVD) to be added to this portfolio is Threat Management with NextGen IPS – First Look Design Guide.  This new CVD builds on the capabilities introduced in the Single Site Clustering with TrustSec CVD by integrating the FirePOWER NextGen IPS to provide a true threat management system. The FirePOWER appliance provides threat protection capabilities beyond what a traditional IPS offers, resulting in a comprehensive solution for today’s malicious environment using highly capable threat management workflows. These workflows provide a different approach: the point of view of a cyber-attacker.

A First Look from a Different Viewpoint

That’s what makes this CVD intriguing—and, we hope, very useful. By looking at the “Attack Chain” where the capabilities to execute a successful attack are developed, this information can arm cyber-defenders with the tools and knowledge to effectively protect their networks and the business-critical information contained in their data centers.

 

Attack Chain
Attack Chain

 

The Threat Management with NextGen IPS First Look Design Guide also introduces a new security model, the attack continuum, which identifies each of the critical processes integral to a complete security system. This model addresses the cyber threat problem by looking at the actions to take before, during, and after an attack, across a broad range of attack vectors such as endpoints, mobile devices, data center assets, virtual machines, and in the cloud. Where most security solutions tend to address threat protection at a single point in time, it is important to look at it as a continuous cycle with key actions to take at each point in time.

Attack Continuum

Before an Attack: Organizations need complete visibility of their environment, including but not limited to the systems, services, users, endpoints, operating systems, applications, and network behavior models. From this visibility, ongoing monitoring and actionable alerts must be in place so informed decisions may be made in a timely manner.

During an Attack: Awareness is critical to identify the attack at the earliest possible point in time, ideally before the critical systems are compromised and valuable data is accessed. A security system should aggregate and correlate data using historical patterns and global attack intelligence to provide context to distinguish between active attacks, exfiltration, and reconnaissance using continual analysis and decision making.

After an Attack: Retrospective security is a big data challenge. With an infrastructure that can continuously gather and analyze data to create security intelligence, security teams can, through automation, identify indicators of compromise, detect malware that is sophisticated enough to alter its behavior to avoid detection, and then remediate it.

The attack continuum model provides a view of how to address threats, and helps build a framework of capabilities so organizations can start implementing robust security controls to protect their data centers. This new Cisco Validated Design, Threat Management with NextGen IPS, provides fresh tools and technologies needed to develop a comprehensive response to today’s threats affecting not only the data center, but also the entire enterprise.



Authors

Christina Hausman

Product Marketing Manager

Security

Avatar

So after reading my last blog, you’ve finally come to the realization that you now need to start getting serious about creating video for your organization as the return on investment is certainly a compelling one. But where do you start?  Do you immediately run out and begin building a studio and streaming infrastructure?  Probably not.  Even though the ROI on video is overwhelmingly positive, Continue reading “If You Build It, Will They Come?”



Authors

Adam Hessler

Director

Cisco TV Infrastructure

Avatar

The landscape in higher education continues to change. In September, the U.S. Census Bureau released statistics showing that college enrollment declined for the first time in six years in the fall of 2012. (U.S. Census Bureau, 9/2013), and nearly half of Moody’s rated public and private universities were anticipating total enrollment declines in 2014 (Moody’s 2014 Industry Outlook, Nov. 25. 2013). Given some of these changes, colleges and universities across the nation are looking to technology to drive new and innovative initiatives to attract and retain students and faculty, to differentiate themselves from their peers, and to improve the educational experience.

Continue reading “#HigherEdThursdays – Reinventing the Educational Experience Through Collaboration”



Authors

Brenda Germundson

Global Public Sector Marketing Lead

Global Industries Marketing

Avatar

Innovations in mobility have made it possible for us all to connect from pretty much anywhere in the world, turning wherever we are in to our office. And mobile connections show no signs of slowing. By the end of 2014, the number of mobile-connected devices will exceed the number of people on Earth!

As with any technology, mobility is constantly changing, having to meet the demands of an increasingly mobile workforce that desires to conduct “business as usual” from anywhere.  And while companies have realized the importance of investing in mobility solutions, critical questions remain that must be answered for them to determine what needs to happen next to remain competitive and maximize their mobility efforts:

Cisco_IDG_Tweetchat FOM 6 25 14

  • How has mobility changed your business?
  • What do you need to impact your future business initiatives?
  • How is mobility influencing behavior among workers and customers?
  • What’s got you excited for the future of mobility in your organization?

Join me on Twitter this Friday, June 27 at 10 a. m. PST/1 p.m. EST for an exciting and insightful hour about the #FutureOfMobility in the #InnovateThink  Tweet Chat. Join me @RachaelMcB and @CiscoIoE alongside @ron_miller to learn more about how mobility has transformed the business landscape and why companies must continue to keep pace with the possibilities it creates. Simply use the hashtags #InnovateThink and #FutureOfMobility on Twitter to join the conversation.



Authors

Rachael McBrearty

Chief Creative and Group Leader

Cisco Consulting Services

Avatar

Last week I spent some time at the “Software Defined Networking 2014” conference in London.  It’s a relatively small conference I would say however given the growing interest in SDN and rapid progress of the technology it’s always good to hear alternative viewpoints and experiences.  And I certainly found the previous conference here in December 2013 interesting – in particular one vendor in my view using SDN as the “hammer to crack a nut“.

Cisco wasn’t present at this conference last week, so what are others saying about SDN?  Here is a quick summary of my takeaways (in some cases questions raised in my mind), which I will expand on below.  And let me be controversial in my summary!

(1) Negligible discussion on live SDN deployments.

(2) NFV – at least for service providers – is potentially a quicker win than SDN

(3) SDN “Washing” is alive and well 🙂

(4) Is OpenFlow more of an academic pursuit?

(5) Open Daylight excitement

(6) Negligible Discussion on “Making It Happen”

As I say, to some my statements may be controversial – let me explain!

Continue reading “Observations from London SDN Conference… “Wait, it’s coming…” … But Can You Afford T …”



Authors

Stephen Speirs

SP Product Management

Cisco Customer Experience (CX)

Avatar

Solid State Drives (SSD) 101

In part one of this series we covered the internals of HDDs and some basic techniques manufacturers use to increase performance. In part two we are going into a deep dive of Solid State Drives (SSD), how they work, and some caveats.

Solid State Drives (SSD)

The solid-state drives (SSDs) have a simple unit where one or more bits are stored: the “NAND Flash Cell”. So, this should be easy! Right! Lets see.

The SSDs are constructed like a Lego where the smaller piece is the “Flash Cell”. We aggregate multiple “Flash Cells” into a “4KB Page”. The amount of “Flash Cells” in a “Page” depends on the amount of bits the “Flash Cell” can manage. Now, here is the first caveat, a “Page” is the minimum writable unit in SSD. Even if you need to write a single bit, you would have to write an entire “4KB Page”.

We take “Pages” and group them into “512KB Blocks”. Here comes the second caveat, “Blocks” are the minimum erasable unit in SSD.

This causes a phenomenon known as the “write amplification” effect in SSD. If you need to erase a single bit, you need to modify and entire “Page” (the minimum writable unit), but you can only erase a “Block”. The drive needs to read the “128 Pages” that made the “Block”. Next it erases the “Block”, then write back the 127 unmodified “Pages” plus the 1 modified “Page”. Continue reading “Decoding UCS Invicta – Part 2”



Authors

William Caban-Babilonia

Senior Cloud Architect

Cisco Champion

Avatar

Solid State Drives (SSD) 101

In part one of this series we covered the internals of HDDs and some basic techniques manufacturers use to increase performance. In part two we are going into a deep dive of Solid State Drives (SSD), how they work, and some caveats.

The solid-state drives (SSDs) have a simple unit where one or more bits are stored: the “NAND Flash Cell”. So, this should be easy! Right! Lets see.

Click here to learn more.



Authors

William Caban-Babilonia

Senior Cloud Architect

Cisco Champion

Avatar

On a typical day, we hold in our hands a portal to our civilization’s entire trove of information and entertainment — and a window into our finances, our health, and the lives of our friends. Not to mention, the ability to make a purchase anywhere and anytime the whim strikes us.

To say that our personal devices have become an integral part of our lives is a vast understatement. But get ready for an even bigger wave of change. Mobile is poised to become ever more ubiquitous. But the focus will be less on the device itself, and more on its role as a critical enabler in the connected world of the Internet of Everything (IoE).

Continue reading “The Nexus of the Internet of Everything? It’s in the Palm of Your Hand.”



Authors

Rachael McBrearty

Chief Creative and Group Leader

Cisco Consulting Services

Avatar

Spurred by the Health Insurance Portability and Accountability Act (HIPAA), which outlined a set of standards and guidelines for the protection and transmission of individual health information, as well as the subsequent amendment to address standards for the security of electronic protected health information, customers often ask me the following questions:

  • Is your product HIPAA certified?
  • Is your product HIPAA compliant?
  • Will your product meet HIPAA standards?
  • If I implement your products, will I be HIPAA compliant?

While this blog post is in no way to be construed as legal advice, I wanted to provide an overview pertinent to answering the above questions.

The Reality

In short, the answer to the above questions is NO! Here is why. There are no products on the market that are HIPAA certified or HIPAA compliant! I know this sounds challenging and some vendors have claimed that implementing their products will make the customer HIPAA compliant, but that is not the case.

HIPAA cannot be addressed with a single product or set of products. HIPAA is a series of policies and procedures that “covered entities” must implement to safeguard information. Products manufactured by Cisco and other technology companies can be used to implement those defined policies and procedures but the simple inclusion of a technology in the network does not automatically make an entity compliant. Products have to be configured to adhere to the standards set forth by HIPAA.

For a better grasp on the implications of HIPAA, let’s take a look at some of the details outlined in the Act.

Covered Entities

First, let’s examine a 2“covered entity” as defined by HIPAA.

HIPAA standards apply only to:

  • Health care providers who transmit any health information electronically in connection with certain transactions
  • Health plans
  • Health care clearinghouses

What is a Health Care Provider?

Any person or organization who furnishes, bills, or is paid for health care in the normal course of business

Protected Information

1The statute requires the privacy standards to cover individually identifiable health information. The Privacy Rule covers all individually identifiable information except for: (1) Education records covered by the Family and Educational Rights and Privacy Act (FERPA); (2) records described in 20 U.S.C. 1232g(a)(4)(B)(iv); and (3) employment records. (see the Privacy Rule at 65 FR 82496. See also 67 FR 53191 through 53193).

3The Privacy Rule protects all “individually identifiable health information” held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral. The Privacy Rule calls this information “protected health information” (PHI).

“Individually identifiable health information” is information, including demographic data, that relates to:

  • the individual’s past, present or future physical or mental health or condition,
  • the provision of health care to the individual, or
  • the past, present, or future payment for the provision of health care to the individual,

and that identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual. Individually identifiable health information includes many common identifiers (e.g., name, address, birth date, Social Security Number).

The Privacy Rule excludes from protected health information employment records that a covered entity maintains in its capacity as an employer and education and certain other records subject to, or defined in, the Family Educational Rights and Privacy Act, 20 U.S.C. §1232g.

Technical Safeguards

HIPAA defines security controls around the storage, access, control, and transmission electronically of the above noted protected information.

1Technical Safeguards (§ 164.312)

We proposed five technical security services requirements with supporting implementation features: access control, audit controls, authorization control, data authentication, and entity authentication. We also proposed specific technical security mechanisms for data transmitted over a communications network, communications/network controls with supporting implementation features; integrity controls; message authentication; access controls; encryption; alarm; audit trails; entity authentication; and event reporting.

In this final rule, we consolidate these provisions into § 164.312. That section now includes standards regarding access controls, audit controls, integrity (previously titled data authentication), person or entity authentication, and transmission security.

4Technical Safeguards Summary

  • Access Control—A covered entity must implement technical policies and procedures that allow only authorized persons to access electronic protected health information (e-PHI).
  • Audit Controls—A covered entity must implement hardware, software, and/or procedural mechanisms to record and examine access and other activity in information systems that contain or use e-PHI.
  • Integrity Controls—A covered entity must implement policies and procedures to ensure that e-PHI is not improperly altered or destroyed. Electronic measures must be put in place to confirm that e-PHI has not been improperly altered or destroyed.
  • Transmission Security—A covered entity must implement technical security measures that guard against unauthorized access to e-PHI that is being transmitted over an electronic network.

Cisco believes that today’s dynamic threat landscape, new business models, and complex regulatory requirements require a new threat-centric approach to security. This new security model reduces complexity, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum. This makes it easier for customers to act more quickly before, during, and after an attack, which is particular important to risk management and reduction.

In regards to Cisco Web Security products and transmission security conformance, Cisco Web Security products provide the necessary encryption services along with audit, entity authentication, and event reporting to help address the technical safeguards.

Cisco Web Security products do not determine that the receiving website is of the appropriate type or has implemented the appropriate controls for handling HIPAA protected data but ensures that the information was transmitted securely upon request by the transmitter (think data loss prevention, not covered in this paper). It is the responsibility of the customers’ security and administrative staffs to determine which sites are deemed acceptable for receiving or transmitting this data. Cisco Web Security products can provide transmission security, transmission entity authentication, event reporting, and integrity of the transmission via the HTTPS protocol.

Conclusion

The Department of Health and Human Services HIPAA Act of 1996 amended in 2003 has many complex provisions and should be reviewed on a regular basis by any covered entity’s security and administrative staffs for conformance. The intent of the Act is the protection of private health information via both administrative and technical safeguards. Cisco provides a range of security products that can be used by customers to meet many of the requirements outlined in the HIPAA standards but only if properly configured, maintained, and monitored. As stated earlier, deployment of a single product or set of products will not, in and of themselves, ensure HIPAA compliance.

References

  1. http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityrulepdf.pdf
  2. http://www.hhs.gov/ocr/privacy/hipaa/understanding/training/coveredentities.pdf 45 CFR §§ 160.102, 164.500
  3. http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html
  4. http://www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html


Authors

Tom Foucha

Technical Marketing Engineers and Security Solution Architects

Cisco’s Security Business Group