Sie sind auf Seite 1von 13

Cisco SAFE Overview: Validated Next-Generation Security Architecture

SAFE 01222008

2009 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Todays Complex Security Threats


Require Systemwide Collaboration
Top-Ten Cyber Security Menaces

Sophisticated website attacks Increasing botnet sophistication and effectiveness Growing cyber espionage Emerging mobile phone threats Insider attacks Advanced identity theft Increasingly malicious spyware Web application security exploits Sophisticated social engineering Supply-chain attacks infecting consumer devices
Source: SANS Institute
SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

The Greatest Security Threats


New technologies unprotected
Web 2.0, virtualization, cloud computing, etc.

Lack of consistency and collaboration across products Accidental architecture


Fear-based security decisions Product- or feature-of-the-moment purchases

Siloed products and designs Poor security policy, control, management, and visibility
SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco SAFE
Security Reference Architecture Free Technical Design and Implementation Guide

Security Control Framework


Basis for all Security Designs Focus on Visibility and Control Combines Solutions and Services

Benefits
Combines security and network Fully tested and validated Speeds implementation Modular design
SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco SAFE Objectives


Cisco SAFE addresses threats to critical business goals and objectives Business Goals and Objectives Protecting revenue sources Meeting customer requirements Safeguarding corporate identity and brands Compliance with regulations and standards
SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Potential Threats Disruption of business, resulting in loss of revenue Loss of customer privacy, security, and service levels Negative effect on marketing campaigns and brand reputation Fines, loss of business, and legal action
5

Cisco Security Control Framework


Cisco SAFE designs and strategies are based on Ciscos Security Control Framework for consistent policy deployment and enforcement across the network
Business Relevance Security Policies Security Principles Security Actions

Business Goals and Objectives

Threat and Risk Assessment

Identify Visibility Monitor Correlate

Security Policies
Harden Isolate Control Enforce

Threats to Goals and Objectives

Security Operations

SEVT Dec 2008

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

SAFE Security Architecture Strategy


Security Devices Security Solutions
PCI DLP Threat Control VPNs Email and Web Security Admission Control Firewalls Monitoring Intrusion Prevention

Network Devices
Routers Servers Switches

Policy and Device Management Identify Harden


Monitor Correlate Enforce Isolate

Visibility

Control

Data Center

Campus

WAN Edge

Branch

Internet Edge

Ecommerce

Cisco Virtual Office

Virtual User

Partner Sites

Secured Mobility, Unified Communications, Network Virtualization Network Foundation Protection


SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Services

Design Principles and Benefits


Defense in depth Systemwide intelligence and collaboration Service availability and resiliency Modularity Facilitation of operations Regulatory compliance

SEVT Dec 2008

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

SAFE Security Architecture Modules


Management WAN Edge Branch

Extranet Campus

WAN Partner

Core Internet Edge Data Center Teleworker Internet

E-Commerce

SensorBase

SEVT Dec 2008

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Cisco SAFE Next-Generation Lifecycle Services


Strategy and assessment Deployment and migration Remote management Security intelligence Security optimization

SEVT Dec 2008

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

10

Cisco SAFE Benefits


Step-by-step design and implementation guidance Fully tested and validated Solutions-based approach Layered security using best practices Threat visibility and coordinated response Assurance of business-critical service availability Modularity to support strategic improvement Compliance with regulatory requirements
SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential

11

SAFE Resources
Cisco SAFE: http://www.cisco.com/go/safe Cisco Design Zone: http://www.cisco.com/go/cvd Cisco Security Lifecycle Services: http://www.cisco.com/go/services/security Ciscos Security Products: http://www.cisco.com/go/security

SEVT Dec 2008

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

12

SEVT Dec 2008

2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

13

Das könnte Ihnen auch gefallen