Automated Mobile Security, Part 4

The following is the fourth, and final, post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices. Part one of the series can be found here; part two of the series can be found here and part three of the series can be found here. REAL TIME ENFORCEMENT USING IF-MAP This example demo uses several of the ESUKOM developed IF-MAP compatible products. All open source products are available on www.esukom.de. The NCP VPN Server is still beta and not available on the web page, but can be made available for test environments by contacting tcg@ncp-e.com. The following image shows a basic description of the network the demo uses: The network is separated into an unsecure network that can be accessed via WiFi and an internal network, which requires a VPN connection to gain access. There is no direct access from the unsecure network to the internal network even though two components reside in both networks. An Android device connects to the WiFi access point and receives a lease from an IF-MAP capable ISC DHCP Server. The IF-MAP Client will publish the lease information into the MAP database. The DHCP server has the information about which MAC address is connected to which IP address. The IF-MAP graph will look like this after the information has been published: Now, to gain access to the internal network, the device has to establish a VPN connection. The VPN Server will publish information about the username used for the VPN connection, the device that...

Automated Mobile Security, Part 3

The following is the third post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices. Part one of the series can be found here; part two of the series can be found here. WHAT IS ESUKOM ? The ESUKOM research project aims at leveraging IF-MAP to provide security in mobile device environments. The project will bring IF-MAP support to several key open source products like Snort (intrusion detection), IPtables (firewall), Nagios, FreeRADIUS and ISC DHCP server, to the products of two commercial vendors: NCP engineering (VPN software) and Mikado Soft (NAC solution) and provide an IF-MAP Android client. With this diversity of IF-MAP enabled components, we try to provide example configurations for eight key features, which are the ultimate goal of this research project. More information about this project can be found at http://www.esukom.de Now that ESUKOM has been explained, stay tuned for the next post that will explain Realtime Enforcement Using IF-MAP. Also, for more information on the ESUKOM research project and NCP engineering’s role within it, see our three-part Q&A on the topic...

Automated Mobile Security, Part 2

The following is the second post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices. Part one of the series can be found here. WHAT IS IF-MAP ? IF-MAP stands for InterFace for Metadata Access Points. You can think of IF-MAP as a central database for your IT-systems where they can store information or retrieve information from to get a real-time representation of the status of your network. There are three basic functionalities an IF-MAP enabled component can do: ► Publish: Clients can store information for other clients to see ► Search: Clients can search for published data using search patterns ► Subscribe: Clients can receive notification when other clients publish new data To store information in the MAP there are two different data types available: Identifiers and Metadata. Identifiers act as “root hub” for information stored in the IF-MAP. There are only 5 identifiers available: Identity, IP address, MAC address, Access Request and Device.  The other type of data is metadata, which has to be linked to at least one identifier but can also connect two identifiers. Each client has to authenticate itself securely to the MAP Server either with username and password or certificate based authentication. All data is transmitted safely with SSL encryption. Now that IF-MAP has been explained, stay tuned for the next post that dives into ESUKOM in more detail. Also, for more information on the ESUKOM research project and NCP engineering’s role within it, see our three-part Q&A on the topic...

Automated Mobile Security, Part 1

The following the first in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security:  Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices. The increasing use of mobile devices like smartphones and tablet PCs introduce new threats to enterprise IT networks. While most of the well known security programs such as desktop firewalls,  antivirus and harddrive encryption work pretty well for laptops, they are still not available for these kinds of mobile devices. The only way to keep your network secure is by providing additional security on the central IT infrastructure. The problem is, most of today’s security systems work isolated from each other and if they offer interoperability they do so only to a limited extent, which is insufficient to counter the new threats network security faces every day. A new specification developed by the Trusted Computing Group (TCG) strives to solve this interoperability problem with the development of IF-MAP. IF-MAP provides the possibility to interconnect different IT-security systems and provide an accurate representation of the health status of your IT network. It even can automate security responses to network  threats and enforce security without the need for human interaction. The support for IF-MAP is steadily increasing, as more and more vendors and open source products are supporting the IF-MAP technology. Stay tuned for the next post that explains IF-MAP in more...