Demo Steps
This is a step by step guide to building Zero Trust Micro-segmentation (to prevent lateral movement) solution using the integration with CrowdStrike Falcon (EDR) platform.
Xshield platform imports host and network telemetry data from CrowdStrike Falcon platform for building the visibility that is normally available with a Xshield agent based solution.
Once the visibility is completed, then the same rules of policy management to perform micro-segmentation applies.
Demo Workflow
The workflow for this demo will follow the same steps performed for progressive server segmentation.
As part of server segmentation, we will begin by building basic security (blocking malicious and risky communications, restricting management and infrastructure ports) followed by whitelisting enviroment-specific traffic flows.
The flow of the demo will consist of the following phases:
- CrowdStrike Integration Activation
- Discovery
- Visualize and Baseline
- Reduce Attack Surface
- Reduce Blast Radii
CrowdStrike Integration
CrowdStrike Platform
Login to the CrowdStrike platform, show CrowdStrike credentials(APIKey and FDR) genderation, show application workloads and the host group(s) to which these workloads are added.
CrowdStrike Integration Activation
To activate the CrowdStrike Integration in Xshield, the user must import the already generated API credentials and FDR credentials into the activation page.
-
Activate the CrowdStrike integration by Navigating to Settings -> Integrations -> EDR --> CrowdStrike Click on ACTIVATE. This will open a Configuration pop-up with provided API credentials and FDR credentials.
API Credentials - This is used by the Xshield Platform to make API calls to the CrowdStrike Falcon platform to import the already defined HostGroups and Hosts periodically.
FDR Credentials - This is used by the Xshield Platform to retrieve network telemetry data periodically.
-
Click on Test button to validate the credentials.
-
Once the Test says successful, click on Save button to save the integration. This will save and activate the CrowdStrike integration.
Discovery
Host Group Discovery
On successful CrowdStrike Integration activation, we need to wait upto 10 minutes before the imported HostGroups start showing up in Xshield platform.
The Xshield Security platform will populate the imported HostGroups in a separate page by Navigating to EDR Groups -> CrowdStrike.
On this page, the user can select the set of Host Groups (1 or many) to be imported for Micro-segmentation operations.
HostGroup(s) Activation
Activate respective host groups so that hosts import operation is scheduled for these host groups.
From the host groups listed, select the required host group(s) (clicking on the checkbox before the name) and ** select Active** under Change Status action button. Click on Confirm button on the popup that follows.
We need to wait upto 10 minutes before the imported hosts start showing up in Xshield platform.
Asset Discovery
XShield security platform will automatically import CrowdStrike hosts from the activated host groups as Xshield Assets.
Xshield security platform collects asset name, operating system, IP address, network telemetry data from the servers in the ecosystem to build visibility into the communications across the network.
Go to the Assets page to view the asset details as part of the discovery process with the filter managedby=Crowdstrike.
Classify Assets
Tagging of assets is done by writing Tag rules which can be built using arbitrary criterias as defined by the system.
Create Tag rules to auto assign Environment and Location tags based on the asset hostnames for easier segmentation and policy enforcement.
- Go to Tags > Tag Rules > Create Tag Rule
- Enter Name = US West Prod > click Add Rule Criteria > Assets > Asset Name > Advanced
- Enter the criteria as Contains = uswprod > Apply
- Click Add Tag Value > Environment = Prod, Location = US West, Business Value = High > Create
- Follow similar steps to create the second tag rule called 'US West Test' with criteria as Contains = uswtest and Tag Value as Environment = Test, Location = US West, Business Value = Medium
Segmentation Strategy
Based on the above classification, we can now start building segments. Agree upon the segments with the customer.
Define CrowdStrike Segments
Create a CrowdStrike Segment for all servers in US West Location and individual segments per Environment i.e Test and Production
Go to Segment > Switch to CrowdStrike tab >Create Segment and enter the name, criteria and breach impact metrics target as 50 for each of the following segments
- USWest > Location=US West, Type=Server
- USWest | Prod > Location=US West, Type=Server, Environment = Prod
- USWest | Test > Location=US West, Type=Server, Environment = Test
Enrichment
Now that we have defined CrowdStrike Segments, we will next start defining Named Networks, policies for management communications and Infrastructure communications.
Network Discovery
Usually customers have an IP Plan of the network where the IP addresses of management and infrastructure services are usually known. Either use the IP Plan or the Xshield recommendation to define core named networks for Management and Infrastructure services
The named networks created in this step help map IP addresses to known traffic patterns between sources such as active directories, DNS servers, jumpservers, bastion hosts etc
Create Named Networks:
Go to Named Networks > Create Named Network and create the following named networks with respective IP ranges.
- AD Servers: 172.20.0.4/32
- Dev-Ops-Bastion: 172.20.0.3/32
- DNS Servers: 8.8.4.4/32
- IT-Jumpservers: 172.20.0.2/32
Apply these named networks to respective segments using the recommendation available at the segment level
- Go to each CrowdStrike segment and click on the 3 dots at the end > Path recommendations > Named Network Assignment
- Select the recommended Named Networks > Assign
Management Policy Templates
Based on the discovered network flows in the previous section, we will define policies for Management communications such as privileged access between Servers and Bastion hosts, IT jumpservers, IT tools etc.
Management communications are usually from a few management servers or tools such as bastion hosts, jumpservers etc to many managed assets. This represents inbound communication from the asset's perspective.
Leverage Path Template recommendation to create Management templates
- Go to Network Data > Paths
- Filter by Environment=Prod, Location=US West
- Click on Recommendation
- Select the relevant management ports (22 and 443 for Prod, 22 and 80 for Test) and Add To Template
- Name the Template with Management Access or Privileged Access and Save
We will define specific policies applicable to US West Location, Prod and Test Environments.
Do the same for TCP 443 and add to the US West | Prod | Privileged Access template created previously
We will follow the same process to create templates for US West Test environment for TCP 22 from IT-Jumpservers named network and TCP 80 from Dev-Ops-Bastion named network
Infrastructure Policy Templates
Infrastructure communications are usually from a large number of managed assets to a few Infrastructure services/ servers. This represents outbound communication from the asset's perspective.
Let us define policies for such communications between assets and infrastructure services such as DNS, AD, Domain controllers etc. Also define policies between servers and security services such as SIEM, vulnarability scanners and EDRs
Leverage Path Template recommendation to create Infrastructure Templates
- Go to Network Data > Paths
- Filter by Location=US West, Direction=Outbound
- Click on Recommendation
- Select the relevant infrastructure ports and Add To Template
- Name the Template as US West | Infrastructure and Save
Apply Management and Infrastructure Policy Templates to Segments
Now that we have defined the core named networks and templates for management and Infrastructure services, attach these named networks and templates to respective segments
- Assign the US West | Infrastructure template to USWest Segment
- Assign the US West | Prod | Privileged Access template to USWest | Prod segment
- Assign the US West | Test | Privileged Access template to USWest | Test segment
Visualize and Baseline
Once Named networks and templates are linked to their respective CrowdStrike segments as per the steps above, The Xshield security platform will now identify all discovered ports and paths, marking them as allowed or denied based on policies defined for legitimate and illegitimate communication patterns.
Visualize CrowdStrike Segments
Visualize CrowdStrike segments in panoptic map in context of infrastructure and management networks
Run Baseline Reports
For all of the core segments run baseline reports with current breach metrics to establish the baseline
Generate Reports for Core Segments:
- Go to Segments, switch to CrowdStriketab, select all segments, and click 'Create Report'.
- A report request will be sent, and the report will be available in a few minutes.
Download and Review Breach Metrics
- Navigate to CrowdStrike Segments and click 'Reports'.
- Click the Download icon next to the report.
- Note the current value of breach score.