cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
609
Views
0
Helpful
0
Comments
pavagupt
Cisco Employee
Cisco Employee

 

Introduction

About this guide

This guide is intended to provide technical guidance to design, configure and operate the Threat Centric NAC service/feature in the Cisco Identity Services Engine (ISE). The document provides best practice configurations for a typical environment.

About Cisco Identity Services Engine (ISE)

Cisco Identity Services Engine (ISE) is a market leading, identity-based network access control and policy enforcement system. It’s a common policy engine for controlling, endpoint access and network devices’ administration for your enterprise. ISE allows an administrator to centrally control access policies for wired wireless, VPN and 5G endpoints in the network.
Cisco Identity Services Engine (ISE) is aligned with Zero Trust. Cisco Zero Trust is a comprehensive approach for securing access across your users, devices, applications, and environment. Cisco Zero Trust involves 3 solutions called Workforce, Workplace and Workloads. Workplace is about giving right privileges/access to the users and devices connecting to the network over wired, wireless, VPN and/or 5G. Workforce is about providing right level of access privileges to the users and/or devices accessing your protected applications. Workloads is to apply policies and have audit for securing your on-prem or cloud applications. Cisco ISE is aligned with Workplace-Cisco Zero Trust solution where users and devices gets right privileges/access when they connect to the network. ISE builds context about the endpoints that include users and groups (Who), device-type (What), access-time (When), access-location (Where), access-type (Wired/Wireless/VPN) (how), threats and vulnerabilities. Through the sharing of vital contextual data with technology partner integrations and the implementation of Cisco Scalable Group Policy for software-defined segmentation, Cisco ISE transforms the network from simply a conduit for data into a security enforcer that accelerates the time to detection and time to resolution of network threats.
 

Solution Overview

Cisco ISE provides intent-based policy and compliance solution on top of AAA. Cisco ISE can be integrated with Threat Centric NAC vendors below

  • Cisco Secure Endpoint (formerly AMP for Endpoints),
  • Qualys,
  • Nexpose
  • Tenable

to assess vulnerabilities and/or threats associated with the endpoint connecting to your network and give secure access according to the policy definitions. As a Security administrator, you can check for compliance of an endpoint and continuously verify the trust of an endpoint based on vulnerabilities and/or threats associated to give the proper privileges to the network whenever they connect.

 

Cisco Secure Endpoint (Formerly AMP)

            Cisco® Secure Endpoint integrates prevention, detection, threat hunting, and response capabilities in a unified solution leveraging the power of cloud-based analytics. Secure Endpoint will protect your Windows, Mac, Linux, Android, and iOS devices through a public or private cloud deployment.

            Cisco Secure Endpoint is a single-agent solution that provides comprehensive protection, detection, response, and user access coverage to defend against threats to your endpoints. The SecureX platform is built into Secure Endpoint, as well as Extended Detection and Response (XDR) capabilities. The newly introduced Cisco Secure MDR for Endpoint combines Secure Endpoint’s superior capabilities with security operations expertise to dramatically reduce the mean time to detect and respond to threats.

            When Cisco Secure Endpoint integrated with Cisco ISE, Cisco ISE and Cisco Secure Endpoint can share the information of Threats and Malware associated with the endpoint so that Cisco ISE can allow endpoints based on the threats’ Course of Action. Cisco Secure Endpoint does not use Cisco platform Exchange Grid (pxGrid) for ISE integration, instead it uses Structured Threat Information Expression (STIX). STIX is an information exchange language and used to exchange cyber threat intelligence with organizations. It allows a common framework for organizations to share cyber threat information and adapt quicker to computer-based attacks. Cisco Threat Centric NAC using Cisco Secure Endpoint in the Cloud also falls into the Rapid Threat Containment category. Cisco Security Solutions and Ecosystem and CSTA partner solutions that fall into this category use Adaptive Network Control (ANC) mitigation actions to respond to or contain threats by issuing mitigation actions either from pxGrid, ISE EPS RESTful API or STIX. Cisco Threat Centric NAC using Cisco Secure Endpoint perform threat detection and malware analysis. The ISE STIX integration provides visibility into compromised hosts and provides manual ANC mitigation or Change ofAuthorization (CoA) actions the security administrator can take with regards to an organization’s security policy

Tenable

            Tenable Security Center integrated with Nessus Scanner can scan the endpoint for vulnerabilities and returns the CVSS score of the endpoint back to Cisco Identity Services Engine (ISE). As an Administrator, you can write policies in Cisco Identity Services Engine (ISE) based on the base/temporal CVSS score returned by the Tenable Security Center so that endpoints get differentiated privileges based on the policies defined. For eg., You can write Authorization Policy to deny the access to the endpoints when the endpoints have CVSS score more than 8. You can also continuously validate the Threats and Vulnerabilities associated with the endpoint using the Tenable Security Center integration via TC-NAC service.

Qualys

            Qualys allows organizations to assess and detect cyber security, posture and vulnerability of endpoints, devices. When Cisco ISE and Qualys are integrated together, Qualys can share the information of vulnerabilies found on the endpoint so that Cisco ISE can give differentiated privileges to the endpoints connecting to the network based on the CVSS base/temporal score.

Nexpose

            Nessus Scanner integrated with Rapid 7 can help organizations to scan, assess risk, and vulnerabilities associated to the endpoints. When Cisco ISE and Rapid7 are integrated together, Rapid7 can share the information of vulnerabilies found on the endpoint so that Cisco ISE can give differentiated privileges to the endpoints connecting to the network based on the CVSS base/temporal score.

So, at high-level, Cisco ISE Threat Centric NAC service can provide differentiated privileges to endpoints based on

  • Threats/Malware shared by Cisco Secure Endpoint
  • Vulnerabilities (Base/Temporal CVSS Score) shared by Tenable, Qualys or Nexpose.

 

Policy Architecture and Components

 

pavagupt_0-1722614529560.png

             Cisco ISE Threat Centric NAC service can dynamically provide differentiated privileges to endpoints based on Threats or vulnerability information.

_____________________________________________________________________________________________________

Threat information associated to the endpoint shared by Cisco Secure Endpoint

                               Cisco Secure Endpoint detects and shares the Threat Impact Level interms of Severity and corresponding Course of Action information so that Cisco ISE allows you to write policies based on Course of Action and dynamically raise CoA if there is any change to the endpoint’s Threat severity or Course of Action. Below attributes are shared by Cisco Secure Endpoint to Cisco ISE.

  1. Threat Type
  2. Threat Severity – Unknown, Insignificant, Distracting, Painful, Damaging or Catastrophic
  3. Threat Course of Action – Internal Blocking, Monitoring or Eradication
  4. Confidence level – High, Medium or Low
  5. Threat detected Timestamp

 _____________________________________________________________________________________________________

Vulnerabilities information associated to the endpoint shared by Tenable, Qualys or Rapid7-Nexpose.

                               Tenable, Qualys or Rapid7-Nexpose can scan and detect Vulnerabilities associated to the endpoints interms of Vulnerability ID, Vulnerability Title,CVSS Base Score, CVSS Temporal Score, CVEIDS, Reported timestamp so that Cisco ISE allows you to write policies based on CVSS Base/Temporal Score and dynamically raise CoA if there is any change to the endpoint’s Vulnerability information. Below are the information shared by Tenable, Qualys or Rapid7-Nexpose

  1. Vulnerability ID – This is the ID managed by Tenable, Qualys or Rapid7-Nessus
  2. Vulnerability Title
  3. CVSS Base Score
  4. CVSS Temporal Score
  5. CVEIDs
  6. Reported Timestamp

_____________________________________________________________________________________________________

            Below table explains what information is going to be shared by these Threat Centric NAC vendors

Vendor

Information shared

ISE Dictionary

Dictionary Attribute Name

Attribute Values

Cisco Secure Endpoint

Threat Type, Threat Severity, Course of Action, Confidence and Reported Timestamp

Threat

CTA-Course_Of_Action

Eradication

Internal Blocking

Monitoring

Qualys Enterprise

Vulnerability ID, Vulnerability Title, CVSS Base Score, CVSS Temporal Score, CVEIDs, Reported TimeStamp

Threat

Qualys-CVSS_Base_Score

Qualys-CVSS_Temporal_Score

0-10

Tenable Security Center

Vulnerability ID, Vulnerability Title, CVSS Base Score, CVSS Temporal Score, CVEIDs, Reported TimeStamp

Threat

Tenable Security Center-CVSS_Base_Score


Tenable Security Center-CVSS_Temporal_Score

0-10

Rapid7-Nexpose

Vulnerability ID, Vulnerability Title, CVSS Base Score, CVEIDs, Reported TimeStamp

Threat

Rapid7 Nexpose-CVSS_Base_Score

0-10

 

            Based on how ISE works with Threat/Vulnerability Management systems, below two sections are going to be explained how it works with Cisco ISE + Cisco Secure Endpoint & Cisco ISE + Tenable SC/Qualys/Rapid7-Nessus in detail.

Cisco ISE + Cisco Secure Endpoint Integration Architecture

pavagupt_0-1722614799521.png

            When Cisco ISE is integrated with Cisco Secure Endpoint, Cisco secure endpoint module (standalone/Secure Client) installed on the endpoint can scan or automatically detect the threat associated with endpoint and shares the info to Cisco ISE (specifically PSN running with Threat Centric NAC service) so that endpoint gets updated with latest information sent by Cisco Secure Endpoint and raises CoA to give differentiated privileges based on the policies written.

 

Cisco ISE Standalone and Cisco Secure Endpoint Integration Flow

Below flow of events explains how it works at high-level with Cisco ISE standalone node.

pavagupt_1-1722614878271.png
  1. Endpoint connects to network over wired, Wireless or VPN and authenticates against ISE.
  2. Cisco ISE might give Full Access or Corporate access based on the policies.
  3. Cisco Secure Endpoint agent module (either in standalone or deployed with Cisco Secure Client)scans the endpoint or automatically detects malware or vulnerability associated with the endpoint.
  4. Cisco Secure endpoint notifies the Endpoint Cloud.
  5. Cisco Secure Endpoint Cloud updates the ISE about threat information.
  6. Cisco ISE updates the endpoint with threat information shared.
  7. Cisco ISE issues CoA to give Quarantine or different privileges based on the policies written using threat’s Course of Action

Cisco ISE Distributed Deployment and Cisco Secure Endpoint Integration Flow

pavagupt_2-1722614950229.png

            When Cisco ISE and Cisco Secure Endpoint was integrated, below flow of events explains how Cisco ISE can give differentiated privileges based on the threat info updated by Cisco Secure Endpoint.

  1. Endpoint connects to network over WiFi, Wired, VPN or 5G network and authenticates against PSN in a deployment.
  2. PSN updates the endpoint information to MnT and PAN
  3. TC-NAC adaptor instance enabled in the PSN gets the endpoint session information from MnT.
  4. When endpoint tries to download any malware file or service or application, Cisco Secure Endpoint agent module (either in standalone mode or integrated with cisco secure client) will detect the maliciousness/threat and updates the Cisco Secure Endpoint Cloud
  5. Since ISE was already integrated Cisco Secure Endpoint Cloud, Cisco ISE gets that threat information from Cisco Secure Client Cloud.
  6. PSN with TC-NAC adaptor instance updates the endpoint with threat information to PAN node.
  7. PAN node replicates the same endpoint info to rest of the nodes over replication.
  8. Once the threat information is updated on the endpoint, PSN to which endpoint got authenticated, raises CoA to match the policies based on the Threat’s Course of Action.

Policies         

Example Policies1:

pavagupt_3-1722615003343.png

Example Policies2:

pavagupt_4-1722615024955.png

               It is recommended to write threat based policies under Global/Local Exceptions. Global/Local Exception policies would help you to give differentiated privileges irrespective of how you construct policy sets. You can write policies using Threat dictionary. You could give differentiated privileges based on the Threat severity mentioned in example policies1 above. Or you could give restricted/deny/Quarantine privielges based on any threat severit mentioned in example policies2 above.

 
 

Visibility/Monitoring/Reporting

Reports

            Once the endpoint tries download any malicious/malware file, Cisco Secure Endpoint agent module automatically detects the threat incident, reports it Cisco Secure Endpoint Cloud. Cisco ISE through TC-NAC integration, gets these details. You can see these events from Operations > Reports > Reports > Threat Centric NAC > Threat Events.
pavagupt_5-1722615114282.png
 

Context Visibility> Compromised Endpoints

            Cisco ISE through Threat Centric NAC integration with Cisco Secure Endpoint, gets these details and updates the endpoint. Once updated, you will get to see these threats associated by the endpoint from context visibility > Compromised Endpoints Dashboard as shown below.pavagupt_8-1722615187401.png

            You can also click on the Endpoint MAC address from context visibility > Threats window to know threat incidents reported by Cisco Secure Endpoint as shown below.

pavagupt_9-1722615234078.png

             NOTE: Based on the threat incident, the course of action might not get updated. if Course of Action is null from Cisco Secure Endpoint, Cisco ISE can’t enforce the policies as policies are written based on Course of Action.

 

pavagupt_6-1722615717176.png

 

 

Cisco ISE + Tenable SC/Qualys/Rapid7-Nessus Integration Architecture

pavagupt_0-1722615429826.png

            When Cisco ISE is integrated with Vulnerability Management Systems such as Tenable SC, Qualys or Rapid7, Cisco ISE can submit the request to Tenable SC, Qualys or Rapid7 to scan the endpoint. Tenable SC, Qualys or Rapid7 with the help of Nessus Scanner, Qualys On-prem Scanner or Nexpose Scanner respectively can scan the endpoint. Once the scanning is completed, Cisco ISE queries Tenable SC, Qualys or Rapid7 and gets the vulnerability information retrieved as part of a scan request. Once the vulnerability information is updated, Cisco ISE issues CoA to give differentiated privileges based on the policies written.

Cisco ISE Standalone and Tenable SC/Qualys/Rapid7 Integration Flow

            Below flow of events explains how it works at high-level with Cisco ISE standalone node.

pavagupt_2-1722615552462.png

 

  1. Endpoint connects to network over WiFi, Wired, VPN or 5G network and authenticates against ISE.
  2. ISE submits the scan request to respective Threat Centric NAC vendor. Authorization profile associated with TC-NAC adaptor instance (either Tenable, Qualys or Rapid7) mapped to matched authorization policy, respective TC-NAC adaptor instance requests Tenable SC or Qualys or Rapid7 to scan the endpoint. An example authorization profile associated with Tenable SC is shown below
    pavagupt_3-1722615585319.png

     

  3. Tenable SC or Qualys or Rapid7 management centers submits the requests to respective Nessus, Qualys on-prem or Nexpose scanner.
  4. Nessus, Qualys on-prem or Nexpose scanner scans the endpoint based on the policies.
  5. Once the scanning is completed, scan result is going to be updated to respective management centers.
  6. Cisco ISE peridiocally queries Tenable SC or Qualys or Rapid7 for the completed, scanning-inprogress endponts and gets the vulnerability information where scanned result is available.
  7. Once the vulnerability information is updated on the endpoint, Cisco ISE raises CoA to match the policies written based on the CVSS Base/Temporal Score.

Cisco ISE Distributed Deployment  and Tenable SC/Qualys/Rapid7 Integration Flow

            Below flow of events explains how it works in Cisco ISE distributed deployment which can give differentiated privileges based on the vulnerability info updated by respective Vulnerability Management Systems.

pavagupt_5-1722615673775.png

  1. Endpoint connects to network over WiFi, Wired, VPN or 5G network and authenticates against PSN in a deployment.
  2. PSN updates the endpoint information to MnT and PAN
  3. TC-NAC adaptor instance enabled in the PSN gets the endpoint session information from MnT.
  4. Authorization profile associated with TC-NAC adaptor instance (either Tenable, Qualys or Rapid7) mapped to matched authorization policy, respective TC-NAC adaptor instance requests Tenable SC or Qualys or Rapid7 to scan the endpoint.
    pavagupt_7-1722615737647.png

     

  5. Tenable SC or Qualys or Rapid7 management centers submits the requests to respective Nessus, Qualys on-prem or Nexpose scanner.
  6. Nessus, Qualys on-prem or Nexpose scanner scans the endpoint based on the policies.
  7. Once the scanning is completed, scan result is going to be updated to respective management centers.
  8. Cisco ISE peridiocally queries Tenable SC or Qualys or Rapid7 for the completed, scanning-inprogress endponts and gets the vulnerability information where scanned result is available.
  9. PSN with TC-NAC adaptor instance updates the endpoint with vulnerability information to PPAN.
  10. PPAN node replicates the same endpoint info to rest of the nodes over replication.
  11. Once the vulnerability information is updated on the endpoint, PSN to which endpoint got authenticated, raises CoA to match the policies written based on the CVSS Base/Temporal Score.

Case Studies

Case1: when Cisco ISE has no vulnerability information about connecting endpoints

pavagupt_8-1722615776817.png

 

            As per Zero Trust principle, when an endpoint connecting to network, Cisco ISE can give differentiated privileges based on the vulnerabilities assessed by the vulnerability management systems. However, when new endpoint is getting connected to the network, Cisco ISE might not have vulnerability information (CVSS Base/Temporal Score). In this case, Cisco ISE can request vulnerability management systems such as Tenable SC, Qualys or Rapid7 to scan for vulnerabilities of connected endpoint. Cisco ISE submits the request to Tenable SC, Qualys or Rapid7 via respective Threat Centric NAC adaptors defined under authorization profile. Once the scanning is completed, Cisco ISE can retrieve vulnerability information from Tenable SC, Qualys or Rapid7 to issue CoA and give differentiated privielges based on the policies written.

 

Case2: when Cisco ISE has vulnerability information

pavagupt_9-1722615809167.png

            When Cisco ISE has vulnerability information retrieved earlier (CVSS Base/Temporal Score) from Tenable SC, Qualys or Rapid7 for the endpoints connecting to network, Cisco ISE can give differentiated privileges based on the policies written.

Case3: Vulnerability information in Cisco ISE is beyond configured X hours

            Cisco ISE maintains the vulnerability information retrieved from Tenable SC, Qualys or Rapid7 for the endpoints in it’s database. Cisco ISE allows you to submit the request for latest scan results to Tenable SC, Qualys or Rapid7 if the vulnerability information present in Cisco ISE is beyond X hours in authorization profile using “Trigger scan if the time since last scan is greater than” attribute. Example Authorization profile shown below, Cisco ISE submits a new scan request to Tenable SC for latest scan results if the results available in Cisco ISE is beyond 48 hours. pavagupt_11-1722615892187.png

Case4: Reassess Vulnerability Infromation

            Cisco ISE also allows you to periodically reassess the vulnerability information by submitting new requests to vulnerability management systems for every X hours. In below example, Cisco ISE submits a new scan request for every 48 hours in order to retrieve latest vulnerability information.
pavagupt_12-1722615920015.png

Policies

            Below example policies are written based on Tenable CVSS Base Score. You can also write similar policies based on Tenable CVSS Temporal Score or Qualys/Rapid7 CVSS Base/Temporal score. As per the standards, here is the vulnerability severity based on CVSS score. You can write policies to give differentiated privileges based on the CVSS score severity.  
pavagupt_13-1722615970697.png

            It is recommended to write Vulnerability based policies under Global Exceptions. Global Exception policies would help you to give differentiated privileges irrespective of how you constructed policy sets. i.e. irrespective of policy sets that endpoints matched with generally, as long as they found to be vulnerable, global exception policies are going to be matched. You can write policies using Threat dictionary. You could give differentiated privileges based on the CVSS Base or Temporal Score as shown below.

pavagupt_14-1722615989846.png

 

Visibility/Monitoring/Reporting

Reports

            When a new endpoint is connected to network, Cisco ISE submits the request to scan the endpoint to Threat Centric NAC adaptors to scan the endpoint. You can find out this from Operations > Reports > Reports > Threat Centric NAC > Vulnerability Assessment Report

pavagupt_15-1722616028574.png

          Cisco ISE periodically queries Vulnerability management centers to look for the scanned results available. This can be configured at the time of respective Threat centric NAC adaptor configuration. Below example snapshot is derived from Tenable SC integration where Cisco ISE queries for
Number of endpoints queued for checking scan results
Number of endpoints queued for scan
Number of endpoints for which the scan is in progress

pavagupt_16-1722616070799.png

Once the endpoint gets scanned by the Vulnerability Management systems such as Tenable SC, Rapid7 or Qualys, Cisco ISE gets that information from Tenable SC, Rapid7 or Qualys on query & retrieval basis. Once Cisco ISE gets that information, you can find it from  Operations > Reports > Reports > Threat Centric NAC > Vulnerability Assessment Report.

pavagupt_17-1722616132032.png

            As and when Cisco ISE gets latest Scanned vulnerability information, Cisco ISE issues CoA on those endpoints. You can find those CoA events from Operations > Reports > Reports > Threat Centric NAC > CoA-Events report

pavagupt_18-1722616198326.png

You can also find CoA events if they are recent from Operations > Threat Centric > Live Log page as shown below.

pavagupt_19-1722616217651.png

 

 

 

Context Visibility> Compromised Endpoints

            When Cisco ISE gets the latest vulnerability information from vulnerability management centers, Cisco ISE updates vulnerability information into endpoint database. Once updated, you will get to see these Vulnerabilities associated to the endpoint from context visibility > Vulnerable Endpoints Dashboard as shown below.pavagupt_20-1722616264104.png

You can also find vulnerabilities by clicking on specific Context visibility > Endpoint > Vulnerabilities tab.pavagupt_21-1722616308248.png

 

Enable Threat Centric NAC Service

 Pre-Requisites

            In order to enable Threat Centric NAC Service, you require premier license. Ensure from Administration > System > Licensing page that you have registered your ISE standalone or distributed deployment against CSSM server and enabled premier license.

pavagupt_22-1722616378919.png

 

Enable Threat Centric NAC service

            You can enable Threat Centric NAC service only on single PSN node. Visit Administration > System > Deployment page, select one of the PSN (which is nearer to vulnerability management centers such as Tenable SC, Qualys or Rapid7), enable the check box against “Enable Threat Centric NAC Service” and save the configuration. It takes couple of minutes to start the services. 
pavagupt_23-1722616409762.png

            NOTE: Keep in mind that “Enable Threat Centric NAC Service” check box gets grayed out if you don’t have premier license or premier license isn’t enabled in your Cisco ISE. Also note that if the PSN where Threat Centric NAC service has issues with reachability or service, Cisco ISE doesn’t have high availability to handle Threat centric NAC requests.

            You can check for status of services below by login to Cisco ISE (where Threat Centric NAC service is enabled) CLI and execute “show application status ISE” command.

pavagupt_24-1722616443087.png

Integrate with Threat Centric NAC vendors

            Once the services are enabled, you can now integrate Threat Centric NAC vendors from Administration > System > Threat Centric NAC > Third Party Vendors.

pavagupt_25-1722616480382.png

NOTE: This page is visible only when the relevant services mentioned above are enabled and in Running State.  

Click Add to integrate Threat Centric NAC Vendors into Cisco ISE.

pavagupt_26-1722616527243.png

From the drop down, you can choose Threat Centric NAC vendors

pavagupt_27-1722616546294.png

Refer to below respective integrations of individual vendor and validation.

Threat-Centric NAC Service: Integrate Cisco ISE with Tenable SC

Threat Centric NAC Service: Integrate Cisco ISE with Secure Endpoint

Threat Centric NAC Service: Integrate Cisco ISE with Qualys

 

 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: