What Is Noncompliant Traffic?

Noncompliant traffic includes unauthorized access attempts, misconfigurations, malicious activities, or any traffic that does not comply the rules set in policies. Dealing with noncompliant traffic within an organization's network poses significant challenges. Noncompliance affects not only the security posture of the company, but also its compliance with industry regulations, legal requirements, and internal policies.

What Is the Risk?

Noncompliant traffic in an organization could lead to potential data breach and loss of customer trust. If not resolved immediately, it could lead to violation of regulatory laws and local data-protection laws.

Is This Use Case for You?

The intended audience for the Secure Workload Policy Compliance use case is the administrator, who is responsible for managing and securing the network of an organization. Since it is the administrator who applies several policies to safeguard the network, it is of utmost importance for the administrator to ensure that the traffic complies with the policies, that is, traffic behaves as intended. Cisco Secure Workload provides insight into the traffic flow for the administrator to immediately identify and isolate unintended traffic, if any.

Cisco Secure Workload provides comprehensive workload protection by tailoring the security posture that is based on the application behavior. It can maintain the compliance of the network by automatically identifying application behavior deviations and invoking appropriate workflows for policy updates.

Scenario

A financial services company sees a significant surge in noncompliant traffic in its network. The company handles sensitive cardholder and customer data. It operates in a highly regulated industry and must comply with various financial regulations and industry-specific guidelines to protect cardholders’ data such as the Payment Card Industry Data Security Standard (PCI DSS).

The company’s administrator is responsible for configuring and managing the network.

There could be many reasons for noncompliant traffic in an organization, including the following:

  • Attempts to connect to unauthorized ports or IP addresses, leading to a potential violation of the security system rules.

  • Incoming or outgoing traffic not complying with the defined ingress and egress policies, for example, access from geographically restricted locations.

  • Unapproved, outdated, or unsecured protocols that are vulnerable to exploitation.

  • Using a peer-to-peer (P2P) application that bypasses the security controls and introduces risks such as data loss or malware infiltration.

  • Anomalies in traffic, such as significant increase in data exfiltration or unexpected communication with known malicious IP addresses.

  • Traffic originating from a compromised system communicating with other devices.

How Does Cisco Secure Workload Help?

Cisco Secure Workload provides segmentation and microsegmentation policies that allow only the required traffic to conduct business and block all other traffic. This reduces the network's attack surface without disrupting business operations.

The administrator looks at the telemetry data that is gathered by Secure Workload from various resources. The administrator then analyzes the flow and observes granular details of the flow, such as source, destination, port, protocol, and a few other attributes over the lifetime of that flow. Based on the findings, the administrator discovers policies and enforces them. If noncompliant traffic that needs immediate attention is discovered, the administrator creates specific policies to isolate them.

After enforcing the policies, the administrator monitors the flow periodically for noncompliance.

How Does It Work?

The administrator must ensure the following before checking for noncompliant traffic:

Procedure

Step 1

The necessary labels, scopes, and workspaces are created for the workload in the organization. The Quick Start wizard helps you to group and label your workloads to build a hierarchy for your organization. For more information, see the Cisco Secure Workload Quick Start Guide. Scope Tree - More Info

Step 2

Policies for the workloads are created. For example, setting up common policies to:

  • Restrict access from internal hosts to an external application.

  • Deny access from all the hosts outside your organization to the hosts inside your network unless explicitly permitted.

  • Validate traffic from the preproduction environment to production environment.

  • Implement regulatory policies such as PCI-DSS.

    Policies can be classified as Absolute or Default. Absolute policies cannot be overridden by granular or specific policies. When applied, they take precedence over other policies. Predefined policies, such as policies to meet regulatory requirements and quarantine specific workloads, can be absolute policies that get inherited automatically.

    See Policy Rank: Absolute, Default, and Catch-All.

    For information about how to create policies manually, see Manually Create Policies.

Step 3

Automatically discover policies that are based on existing traffic patterns. Discovering policies automatically allows Secure Workload to analyze traffic between workloads, groups workloads based on their behavior, and suggests a set of policies that are intended to allow the traffic that your organization requires, so that you can block all other traffic. See Discovery Policies Automatically.

Step 4

Review and analyze the policies that are suggested by Secure Workload.

Investigate Escaped Flows to Detect Noncompliant Traffic

According to policy analysis, an Escaped flow in a network is a flow that should be dropped and not allowed further. Escaped flows require special attention because their actual flow disposition differs from the planned action based on the currently analyzed policies. Investigate to ensure that enforcing these policies does not block the required flows and adversely impact your applications.

 Note

Escaped flows occur during the policy analysis phase before policy enforcement. However, if preserved rules are enabled, any local rules applied by the customer can create escaped flows.

Procedure

Step 1

Navigate to Defend > Segmentation.

Step 2

Click Manage Policies.

Step 3

Click Policy Analysis.

Permitted, Rejected, and Escaped traffic are displayed. For more information, see the Policy Analysis Results: Understand the Basics in the Policy Analysis Results: Understand the Basics.

Step 4

Investigate Escaped flows to determine noncompliant traffic.

1. Click the violation type Escaped. Escaped flows can occur for many reasons other than noncompliant traffic. Eliminate these possibilities before investigating the actual traffic:

  • Is the traffic taking a path that is different from the route that your policies address?

  • Is the policy in a workspace that is not being analyzed?

After you eliminate the above reasons, start investigating the flow for noncompliant traffic:

2. Use Filter Flows to filter using the consumer and provider names.

If the flow is legitimate, but does not have explicit Allow policies, add appropriate explicit policies in the corresponding inbound or outbound scopes. If the flow is suspicious, identify it quickly, and investigate the details further.

To focus on these flows, apply filters based on the catch-all value of inbound_Analysis policy_rank or outbound_Analysis_policy_rank.

  1. Prioritize the flow to investigate further. For example, if most traffic is using IPv4, focus only on IPv4 flows: --filter using address type = IPv4, address type != IPv6. Filtering out link-local address is also helpful.

  2. Select the most frequent attributes such as hostnames, ports, addresses, scopes, and so on, that are involved in the Escaped traffic from the Top N feature pane and search for flow data. You can usually combine these with other filters to drill down to a particular type, or manually enter relevant filters when diagnosing policies.

    For example, Consumer Hostname contains {something}, Provider Hostname contains {something}, Provider Port = {some port number}, Protocol = TCP Protocol != ICMP.

    If you have created inventory filters for your scopes, use those filters to query and drill down your search. For example, if you have created filters for production and nonproduction traffic within a scope, use them to check for Escaped traffic if you have set policies for child scopes.

  3. Check individual flow and run a quick analysis:

    Focus on a specific flow to examine its policy results by clicking the row corresponding to the flow. Pay attention to the policies matched to the flow and the scopes of both the consumer and the provider addresses. If the policy action does not match your intended action, it means the traffic is noncompliant.

Step 5

If the traffic is intended to be noncompliant, it needs to be denied. Enforce the policies and the traffic will be denied, go to Step 8.

Step 6

After analyzing the policies, update the policies based on your analysis. If the traffic is noncompliant do the following:

  1. Manually add a narrowly focused Absolute policy to a scope at or near the top of your scope tree and then enforce the primary workspace for that scope. After you remediate the threat, you can remove that policy and re-enforce the workspace.

  2. Create a policy to immediately quarantine the vulnerable workload. See Create a Policy to Quarantine Vulnerable Workloads.

Step 7

You can iteratively discover policies, as required. Each time you rediscover policies, you must review and analyze them.

 Note

Before you rerun automatic policy discovery, ensure that you approve the policies and clusters that you want to retain.

Step 8

When you are ready, enforce policies. After you determine that the policies associated with a workspace (and hence, the associated scope) are appropriate and will block unwanted traffic while not interrupting essential services, you can enforce those policies.

You can iteratively enforce policies, for example, you may choose to initially enforce only the manually created policies in the scopes near the top of your tree and, over time, enforce the discovered policies in the scopes lower in the tree.

For more information, see Enforce Policies.

What's next

You can configure alerts to notify any noncompliant traffic, policy violations or other critical issues. Cisco Secure Workload provides various alert types. For more information, see Configure Alerts.

The segmentation compliance score on the security dashboard provides a high-level view of the permitted and rejected traffic. For more information, see View Security Dashboard.

Conclusion

This use case shows how an administrator uses Cisco Secure Workload effectively to identify and isolate noncompliant traffic.

This helps the financial company to be compliant with regulations, protect sensitive data, and prevent financial loss because of malicious activities.

Full Cisco Trademarks with Software License

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.

Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)