wrt "Network Endpoint Assessment" (was: Re: Free Rootkit with Every New Intel Machine)
Jeff.Hodges at KingsMountain.com
Jeff.Hodges at KingsMountain.com
Wed Jun 20 19:59:19 EDT 2007
of potential related interest is..
Network Endpoint Assessment (NEA): Overview and Requirements
<http://www.ietf.org/internet-drafts/draft-ietf-nea-requirements-02.txt>
note term "remediate/remediation".
relevant snippage below. see also..
http://www.ietf.org/html.charters/nea-charter.html
=JeffH
<snip/>
1. Introduction
Today, most network providers can leverage existing standards-
based technologies to restrict access to their network based
upon criteria such as the requesting system's user or host-based
identity, source IP address or physical access point. However
these approaches still leave the network resident systems
vulnerable to malware-based attack, when an authorized but
infected system is admitted and the malware is able to spread
throughout the internal network.
As a result, network operators need a proactive mechanism to
assess the state of systems joining or present on the network to
determine their status relative to network compliance policies.
For example, if a system is determined to be out of compliance
because it is lacking proper defensive mechanisms such as
firewalls, anti-virus software or the absence of critical
security patches, there needs to be a way to safely repair
(remediate) the system so that it can be subsequently trusted to
join and operate on the network. The NEA technology strives to
provide a mechanism to report the configuration of an endpoint
for evaluation against network compliance policy. Such a
mechanism could offer a useful tool for the network operators'
arsenal but should be recognized as not being a complete
endpoint compliance solution in and of itself.
NEA typically involves the use of special client software
running on the requesting system that observes and reports on
the configuration of the system to the network infrastructure.
The infrastructure has corresponding validation software that is
capable of comparing the system configuration information with
network compliance policy and providing the result to
appropriate authorization entities that make decisions about
network and application access. Some systems may be incapable
of running the NEA client software (e.g. printer) or be
unwilling to share information about its configuration. In
these cases the network infrastructure might decide to disallow
or limit access to the network.
In many cases, the admission decision is provisioned to the
enforcement mechanisms on the network and/or system requesting
access. The decision might allow for no access, limited or
quarantined access (possibly to allow for remediation), or full
access to the network. While the NEA Working Group recognizes
there is a link between an assessment and the enforcement of the
assessment decision, the mechanisms and protocols for
enforcement are not in scope for this specification.
Architectures, similar to NEA, have existed in the industry for
some time and are present in shipping products, but do not offer
interoperability. Some examples of such architectures include:
Trusted Computing Group's Trusted Network Connect [TNC],
Microsoft's Network Access Protection [NAP], Cisco's Network
Admission Control [CNAC]). These technologies assess the
software or hardware configuration of endpoint devices for the
purposes of monitoring or enforcing compliance to an
organization's policy. These architectures are not
interoperable because they are implemented using primarily non-
standards based technologies.
The NEA working group is working on defining standard protocols
so as to enable interoperability between devices from different
vendors allowing network owners to deploy truly heterogeneous
solutions. This document describes the requirements for NEA
candidate technologies and protocols.
<snip/>
4. Problem Statement
NEA technology may be used for several purposes. One use is to
facilitate endpoint compliance checking against an
organization's security policy when an endpoint connects to the
network. Organizations often require endpoints to run an IT-
specified OS configuration and have certain security
applications enabled, e.g. anti-virus software, host intrusion
detection/prevention systems, personal firewalls, and patch
management software. An endpoint that is not compliant with IT
policy may be vulnerable to a number of known threats that might
exist on the network.
Without NEA technology, ensuring compliance of endpoints to
corporate policy is a time-consuming and difficult task. Not
all endpoints are managed by a corporation's IT organization,
e.g. lab assets and guest machines. Even for assets that are
managed, they may not receive updates in a timely fashion
because they are not permanently attached to the corporate
network, e.g. laptops. With NEA technology, the network is able
to assess an endpoint as soon as it requests access to the
network or at any time after joining the network. This provides
the corporation an opportunity to check compliance of all NEA-
capable endpoints in a timely fashion and facilitate endpoint
remediation potentially while quarantined where needed.
Endpoint that are not NEA-capable or choose not to share
sufficient posture to evaluate compliance may be subject to
different access policies.
The decision of how to handle non-compliant or non-participating
endpoints can be made by the network administrator possibly
based on information from other security mechanisms on the
network (e.g. authentication). For example, remediation
instructions or warnings may be sent to the non-compliant
endpoint with a properly authorized user while allowing limited
access to the network. Also, network access technologies can
use the NEA results to restrict or deny access to an endpoint,
while allowing vulnerabilities to be addressed before an
endpoint is exposed to attack. The communication and
representation of NEA assessment results to network access
technologies on the network is out-of-scope for this document.
Re-assessment is an important part of NEA technology as it
allows for additional assessments of previously considered
compliant endpoints to be performed. This might become
necessary because network compliance policies and/or endpoint
posture can change over time. A system initially assessed as
being compliant when it joined the network may no longer be in
compliance after changes occur. For example, re-assessment
might be necessary if a user disables a security protection
(e.g. host firewall) required by policy or when the firewall
becomes non-compliant after a firewall patch is issued and
network policy is changed to require the patch.
Another use of NEA technology may be to verify or supplement
organization asset information stored in inventory databases.
NEA technology can be used to provide posture assessment for a
range of ways of connecting to the network including (but not
limited to) wired and wireless LAN access, remote access via
IPsec[IPSEC] or SSL[TLS] VPN, or gateway access. NEA
technology can also be used to check and report compliance for
endpoints when they try to access certain mission critical
applications within an enterprise by employing service
(application) triggered assessment.
<snip/>
---
end
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list