Fresh from a conversation so frustrating that I could have cheerfully punched a goat today, I thought I’d jot down my thoughts on intrusion prevention systems (IPS) and how to effectively deploy it. I would have written a post on how not to deploy it, but that would have meant breaking an NDA.
IPS is a vital security tool in modern networks, especially given the limited value that you get from enterprise firewalls these days*. Unfortunately, they can also be challenging to deploy and manage, and require careful handling to be effective. Here’s how I like to do it:
- Know the difference between IPS and IDS. IPS is inline and will block traffic that meets certain criteria. IDS only detects.
- Consider whether IPS is the best tool to deploy. Depending on your use case, there may be better security tools for your environment. For example: web application firewalls (WAFs) are often a better option for protecting web services.
- Determine what you’re trying to protect. It sounds obvious, but many of my clients identify a generic requirement for IPS without thinking about what it is they want to secure. Depending on your line of business, it may be particular data streams, DMZ services, or an internal network.
- Choose your hardware platform carefully. There are a plethora of IPS solutions on the market, from add-on licences for firewalls to full-blown, high throughput appliances. Make sure that the solution you select has sufficient throughput for your environment – you don’t want your IPS platform to become a bottleneck.
- Decide where to place your IPS. Most platforms have multiple interfaces and can operate as an IPS and IDS simultaneously. For full prevention, an IPS must be deployed inline with the traffic you wish to analyse. Most platforms will allow the use of VLANs to segment a single interface into multiple virtual interfaces (make up your own mind if this is a good thing). The main point is to install your device in a physical location that allows easy access to the monitoring locations.
- If you’re using IDS, make sure that you have sufficient SPAN ports or taps available to connect to. In IPS deployments, consider whether your sensors should fail open or closed. Fail closed is more secure, but obviously has a service impact. You certainly don’t want to DoS your own service through a hardware or software failure on the sensor unless you really have to.
- Plan your signature update policy and make sure you understand how to test new signatures as they come out. Don’t just apply new signature updates without testing them, as you may end up generating false positives.
- Select a manageable subset of signatures for blocking. This should represent the most dangerous attacks that are also unlikely to be false positives. These signatures should be enabled for blocking only after thorough testing.
- Tune the hell out of your sensors and eliminate as many false positives as possible before going into production. Then tune them some more. Get important people to sign off on the tuning. If you’re using IPS, make sure that your blocking signatures have been tuned and will not block legitimate traffic. You may have to write custom signatures for your own environment. Make sure that any custom signatures you write are well documented. The very last thing you want is people being woken up in the middle of the night for false positives – they will seek revenge.
- Sort out your management, monitoring and incident response procedures. You need to know that your IPS/IDS alerts are being monitored, tuned and responded to promptly. For this, you need a robust management infrastructure. If you’re implementing IPS for compliance reasons, there will probably be additional requirements around logging and log retention. You may have to consider legal admissibility in this context too, depending on your legal jurisdiction.
- Remember that IPS deployments are not “fire and forget.” You need to be watching the IPS alert feed 24/7 and respond meaningfully to alerts. The signature base will require regular updates and tuning. Tuning really is an ongoing process, so do not be tempted to skip it!
- If management and maintenance of an IPS platform is too onerous for your organisation, consider taking on a managed service. Choose your managed security service provider (MSSP) carefully, and ensure you’re taking on someone who hires professionals.
A lot of people are nervous about IPS because of its inline nature and the risk of blocking legitimate traffic. However, it does offer a welcome higher level visibility of network traffic, and done right, will give excellent results – potentially saving your network. Stay calm and deploy carefully. Above all, avoid vendor hysteria. IPS isn’t perfect, but until a unicorn brings us an effective neural computing based platform, it remains an effective tool for securing networks.
Oh, and don’t try punching a goat. Not only is it cruel to the goat, they can be pretty cruel back.
* Yes, I’m going to let that statement hang there. I may turn it into another blog post