Tuesday, 23 July 2024
Protecting Against regreSSHion with Secure Workload
Saturday, 20 July 2024
Maintaining Digital Compliance with the PCI DSS 4.0
What’s new in PCI DSS 4.0, and what are its goals?
How Cisco helps customers meet their PCI Requirements.
PCI DSS 4.0 Requirement | Cisco Technology/Solution |
1. Install and Maintain network security control. | Cisco Firepower Next-Generation Firewall (NGFW), ACI, SDA, Cisco SDWan, Hypershield, Panoptica, Cisco Secure Workload |
2. Apply secure configurations to all system components. | Catalyst center, Meraki, Cisco SDWan, Cisco ACI, Cisco CX Best Practice configuration report |
3. Protect stored cardholder data | Cisco Advanced Malware Protection (AMP) for Endpoints |
4. Protect cardholder data with strong cryptography during transmission over open, public networks | Wireless Security requirements satisfied with Catalyst Center and Meraki |
5. Protect all systems and networks from malicious software | Cisco AMP for Endpoints |
6. Develop and Maintain secure systems and software | Meraki, Catalyst Center, ACI, Firepower, SDWan. Cisco Vulnerability Manager |
7. Restrict access to cardholder data by business need-to-know | Cisco ISE, Cisco Duo, Trustsec, SDA, Firepower |
8. Identify users and authenticate access to system components | Cisco Duo for Multi-Factor Authentication (MFA), Cisco ISE, Splunk |
9. Restrict physical access to cardholder data | Cisco Video Surveillance Manager, Meraki MV, Cisco IOT product suite |
10. Log and monitor all access to system components and cardholder data | Thousand Eyes, Accedian, Splunk |
11. Test security of systems and networks regularly | Cisco Secure Network Analytics (Stealthwatch), Cisco Advanced Malware Protection, Cisco Catalyst Center, Cisco Splunk |
12. Support information security with organizational policies and programs | Cisco CX Consulting and Incident Response, Cisco U |
Thursday, 11 July 2024
The Trifecta Effect of Integrating XDR, SIEM, and SOAR
Security Information and Event Management (SIEM)
Extended Detection and Response (XDR)
Security Orchestration, Automation, and Response (SOAR)
How XDR, SIEM, and SOAR Complement Each Other
- XDR and SIEM: XDR’s advanced analytics, machine learning, and threat detection capabilities are integrated with SIEM’s centralized log management and real-time monitoring. This combination enables organizations to detect and respond to both known and unknown threats more effectively, as well as comply with regulatory requirements. SIEM’s pattern recognition capabilities can help XDR identify threats through pattern recognition, while XDR’s API data access and stealth threat detection capabilities can enhance SIEM’s detection capabilities. XDR and SIEM can work together in a security architecture to provide a more robust and mature security posture. For instance, XDR can provide real-time visibility, and SIEM can provide forensic search, data archival, and customization. XDR can reduce the number of contextualized alerts sent to the SIEM for prioritized investigations, enabling security teams to respond to security incidents more efficiently.
- XDR and SOAR: XDR’s response integrations can have similar functionality to SOAR platforms, with the potential to make SOAR a native part of XDR platforms in the future. This integration allows for automated threat response, enabling security teams to automatically remediate threats in their environment without human intervention. SOAR’s orchestration and automation capabilities can also enhance XDR’s response capabilities, providing a more proactive defense posture.
- SIEM and SOAR: SIEM and SOAR can integrate best-of-breed components without vendor lock-in, allowing for more flexibility in security operations. SOAR’s incident response capabilities, such as use-case-based playbooks, can orchestrate response actions across the environment, assign tasks to personnel, and incorporate user inputs to augment automated actions. This integration can help SOAR platforms focus on incident response, while SIEM solutions can focus on data collection and analysis.
Case Study: Credential Stuffing Attack
- XDR Role: XDR monitors the endpoints and detects a high volume of failed login attempts from various IP addresses, which is unusual and indicative of a credential-stuffing attack. XDR can also identify successful logins from suspicious locations or devices, adding this information to the incident details.
- SIEM Role: The SIEM system, collecting logs from web application firewalls (WAF), authentication servers, and user databases, notices an abnormal spike in authentication requests and login failures. This complements the XDR’s endpoint visibility by providing a network-wide perspective and helps to confirm the scale of the attack.
- XDR Role: XDR correlates the failed authentication attempts with geographic anomalies (such as logins from countries where the company does not operate) and reports these findings to the SIEM.
- SIEM Role: SIEM cross-references the XDR alerts with its log data, confirming the attack pattern. It leverages its correlation rules to identify legitimate accounts that may have been compromised during the attack, which XDR might not be able to determine on its own.
- SOAR Role: Upon receiving alerts from both XDR and SIEM, the SOAR platform triggers a predefined response playbook that automatically enforces additional authentication requirements for the affected accounts, such as multi-factor authentication (MFA), and blocks IP addresses associated with the attack.
- XDR Role: XDR can automatically enforce endpoint-based security controls, like updating access policies or locking down accounts that have shown suspicious login activities.
- SIEM Role: SIEM supports the response by providing additional context for the SOAR to execute its playbooks effectively, such as lists of affected user accounts and their associated devices.
- SIEM Role: SIEM facilitates a detailed investigation by querying historical data to uncover the full scope of the attack, identifying compromised accounts, and understanding the methods used by attackers.
- SOAR Role: SOAR provides workflows and playbooks to automatically reset passwords and notify affected users, while also updating security policies based on the attack vectors used.
- XDR Role: The XDR platform assists with forensic analysis by leveraging its integrated view across endpoints, network, and cloud to pinpoint how the attacker could bypass existing security measures.
- SOAR Role: SOAR can automate the rollout of new security policies across the organization and conduct simulated phishing exercises to educate employees about security best practices.
- SIEM Role: SIEM takes charge of long-term data collection and analysis to monitor for new patterns that may indicate a repeat of the attack, ensuring continuous improvement in the organization’s security monitoring capabilities.
- XDR Role: XDR continuously monitors for any signs of a resurgence of the attack or similar tactics being used, ensuring ongoing vigilance and quick detection of any new threats.
Impact of Non-Integrated Approach
- Loss of Centralized Log Management: Without SIEM, the organization loses centralized visibility into the security data generated by various devices and systems across the network. This makes it more challenging to detect patterns and anomalies that are indicative of a credential stuffing attack, especially when they span across multiple systems and applications.
- Reduced Correlation and Contextualization: SIEM’s strength lies in its ability to correlate disparate events and provide context, such as flagging simultaneous login failures across different systems. Without SIEM, the organization may not connect related events that could indicate a coordinated attack.
- Inefficient Incident Management: SIEM platforms often serve as the hub for incident management, providing tools for tracking, investigating, and documenting security incidents. Without it, the organization may struggle with managing incidents effectively, potentially leading to slower response times and less organized remediation efforts.
- Difficulty in Compliance Reporting: Many organizations rely on SIEM for compliance reporting and audit trails. Without SIEM, they may find it more challenging to demonstrate compliance with various regulations, potentially leading to legal and financial consequences.
- Reduced Endpoint and Network Visibility: XDR provides a detailed view of activities on endpoints and across the network. Removing XDR would leave a blind spot in detecting malicious actions occurring on individual devices, which are often the entry points for credential-stuffing attacks.
- Weakened Real-time Detection: XDR platforms are designed for real-time detection and response. Without XDR, the organization might not be able to detect and respond to threats as quickly, allowing attackers more time to exploit compromised credentials.
- Limited Automated Response: XDR can automate immediate response actions, such as isolating a compromised endpoint or terminating a malicious process. Without XDR, the organization would have to rely more heavily on manual intervention, potentially allowing the attack to spread further.
- Loss of Integrated Response Capabilities: XDR often integrates with other security tools to provide a coordinated response to detected threats. Without XDR, the organization may find it more difficult to execute a synchronized response across different security layers.
The Case for an Integrated Approach
Tuesday, 9 July 2024
Cisco at NAB 2024: Committed to Delivering Next-Level Experiences That ‘Wow’
- Enabling dynamic IP production and workflows
- Transforming content delivery, devices, and network assurance
- Operationalizing the fan experience with cutting-edge, technology-centric venues
Enabling Dynamic IP Production
Transforming Content Delivery, Devices, and Network Assurance
Operationalizing the Fan Experience
Saturday, 6 July 2024
The AI Revolution and Critical Infrastructure
Different Kinds of AI
Cisco’s Role in AI Solutions
Friday, 5 July 2024
Mastering Nutanix Hyperconverged Infrastructure on Cisco’s Black Belt Academy
When Cisco announced the End-of-Life for Cisco HyperFlex Data Platform (HXDP) on September 12, 2023; it left our customers and partners equally overwhelmed. So, when Cisco proposed that the Nutanix Software, running on Cisco’s Hardware will be a direct replacement of HyperFlex; we at Cisco Black Belt Academy made sure that our partners get prompt guidance on the new solution with thorough details on its enhanced HCI capabilities topped with a direction on transitioning or migrating from HyperFlex to Cisco’s HCI Solution with Nutanix.
The ”Chronicle” of Nutanix on Cisco Black Belt Academy
The Nutanix Stage 1 & 2 tracks on Cisco Black Belt Academy are launched for both Presales and Deployment roles. These tracks cover:
1. Cisco’s Hyperconverged Strategy
Explains how the partnership of Cisco and Nutanix is forged on their combined edge on application, data and infrastructure management.
2. Introduction to the Hyper Converged Infrastructure
Makes our partners acquainted with Next Generation HCI, Benefits of HCI, Sustained innovations and HCI Vendor Landscape.
3. Solution Overview
Details Cisco Compute Hyperconverged solution with Nutanix and covers it’s cloud infrastructure, broad Data Services portfolio, Nutanix Cloud Manager, Nutanix Unified Storage and Prism, the Cloud Management interface.
4. Architecture Deep Dive
Elucidates why Nutanix Architecture is different from other HCI solutions; Shows how Cisco servers, storage, networking, and SaaS operations are combined with the Nutanix Cloud Platform; explains how the controller VM’s are working to get a high performance structure; introduces resiliency and functioning of the storage layer.
5. Configuration & Deployment
In-depth demonstrations and techniques surrounding Nutanix Deployment, covering:
- Initial Configurations/Guide to getting started
- Deploying the Nutanix Foundation installer VM to a VMware ESX 7 cluster.
- Deploying a Nutanix cluster on UCS servers managed by UCS Manager and adding those hosts to vCenter.
- Expanding a Nutanix cluster with a node that has been previously provisioned.
- Deploying Prism Central from Prism Element and registering the cluster with the newly created Prism Central.
- Updating the UCS Server Firmware with Nutanix Life Cycle Manager (LCM) without disrupting overall cluster operations.
6. Migration from HyperFlex
Learn the various options to migrate existing HyperFlex platforms to the new Nutanix Platform. Gain an understanding of how Migrations of virtual machines between clusters of VMware ESXi servers is most easily accomplished via “shared nothing” vMotion. In addition, learn about the a free software tool called Move that Nutanix offers, which acts as an intermediary agent and coordinator to move VMs between two systems.
7. Sizing Cisco HCI with Nutanix
Discusses the Cisco HCI with Nutanix sizing based on:
- Output files from RVTools and Nutanix Collector tools
- Existing HyperFlex and Nutanix Bill Of Materials (BOM)
- VM-based and Capacity-based sizing of the Cisco HCI with Nutanix using Nutanix Sizer tool.
8. Winning with Nutanix
Acquire a knowledge of Nutanix differentiators in the market, Insights on the competitive environment and edge over VMware, HPE & Lenovo whilst covering the ways to successfully navigate CI and HCI customer conversations.
9. Dcloud/Capture the Flag (CTF)
Hands on demo with access to a simple Nutanix deployment on Cisco UCS, with Cisco Intersight, Nutanix Prism Element, Nutanix AHV, Prism Central and Cisco UCS Manager. The Capture the Flag (CTF) missions provide a gamified way of understanding what the new Cisco & Nutanix Partnership brings to the table.