Firewall News

Top Menu

  • Home
  • Our Blog
  • Contact Us

Main Menu

  • Software Updates
  • Alerts & Bugs
  • Out of the Box
  • Home
  • Our Blog
  • Contact Us

Firewall News

Firewall News

  • Software Updates
    • WatchGuard logo

      TDR 6.0.0 is now integrated into WatchGuard Cloud

      04/01/2021
      0
    • Sophos Logo

      XG Firewall 17.5 MR14 Released

      30/07/2020
      0
    • Sophos Logo

      Sophos Firewall Manager SFM 17.1 MR4 Released

      27/07/2020
      0
    • Sophos Logo

      Sophos Enterprise console - Endpoint Security and Control v10.8.9 for Windows has ...

      16/07/2020
      0
    • Sophos Logo

      Sophos iView v3 MR-2 Released

      07/07/2020
      0
    • Sophos Logo

      SD-RED Firmware 3.0.002 Pattern Update

      06/07/2020
      0
    • Sophos Logo

      XG Firewall 17.5 MR13 Released

      06/07/2020
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for old firmware v17 and v17.1 for XG Firewall

      03/07/2020
      0
    • WatchGuard logo

      Fireware 12.5.4 Now Available

      01/07/2020
      0
  • Alerts & Bugs
    • Sophos Logo

      Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

      29/03/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Updates

      03/03/2022
      0
    • WatchGuard logo

      WatchGuard Support Alert

      23/02/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Reminder

      03/02/2022
      0
    • Sophos Logo

      Sophos: Product Lifecycle Information: Extended Support for Windows 7 and Windows Server ...

      31/01/2022
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for Sophos SSL VPN Client

      29/11/2021
      0
    • WatchGuard logo

      WatchGuard: macOS Monterey 12.0.1 Does Not Support the AuthPoint Logon App

      09/11/2021
      0
    • Sophos Logo

      Sophos UTM Manager (SUM) End of Distribution

      04/11/2021
      0
    • WatchGuard logo

      WatchGuard: End of Sale Notice: AP420

      01/11/2021
      0
  • Out of the Box
    • WatchGuard’s Firebox T80 Earns 5-Star Rating in SC Labs Review

      17/11/2020
      0
    • WatchGuard Wins Big in CRN 2020 Tech Innovator Awards

      16/11/2020
      0
    • Coronavirus scams: what to look for and how to stop them

      02/04/2020
      0
    • Dell SonicWALL TZ 300

      Out the Box - Dell SonicWALL TZ 300

      05/07/2016
      0
    • Dell SonicWALL TZ SOHO

      Out the Box - Dell SonicWALL TZ SOHO

      05/07/2016
      0
    • WatchGuard Firebox T50

      WatchGuard Firebox T50

      31/03/2016
      0
    • WatchGuard Firebox M200

      WatchGuard Firebox M200

      31/03/2016
      0
News
Home›News›WatchGuard Security of the Wi-Fi Cloud

WatchGuard Security of the Wi-Fi Cloud

By admin
12/09/2017
2467
0
Share:
WatchGuard logo
Introduction
Across midsize businesses and distributed enterprises, including public sectors, migrating in-house data processing to the cloud has become an accepted strategy for IT departments and service providers. This can raise eyebrows within the security department because data security controls that were traditionally managed in-house now move into the hands of third parties. Cloud-managed Wi-Fi is no exception to this concern. Hence, WatchGuard has taken proactive steps to build a robust security program for the cloud that strengthens its Wi-Fi access and security solutions. The WatchGuard Wi-Fi Cloud security program comprises multiple pillars, as described throughout this paper.
Local data plane and cloud management plane
In the WatchGuard Wi-Fi Cloud architecture, the wireless data plane (A) is kept local to the network, while the management plane lives in the cloud (B). Wireless data transacted through WatchGuard access points (APs) does not flow to the Wi-Fi Cloud; rather it is routed locally on the network based on the network’s routing controls. This also facilitates local enforcement of data security controls such as content filtering and forensic logging. The authentication and authorisation functions of the data plane are also kept local to the network. The management console used to configure and monitor the wireless network is provided from the Wi-Fi cloud. This console also provides security monitoring of the Wi-Fi environment at the business to detect and contain any undesirable activity in that airspace.
The control plane operates locally in the network among APs (C). This plane implements inter-AP messaging for handoffs, load balancing, RF optimisation, etc., and does not require constant input from the management plane past its initial configuration.
Data collected by cloud management plane
The cloud management plane collects and stores MAC and IP addresses of devices on the network that are seen by APs deployed within the network. It also collects metadata about devices such as their Layer 2 wireless activity (probing, associations), OS, hostname, application usage, locations to the level of proximity to APs, and 802.1x login identities that are transmitted over the air in order to connect to the Wi-Fi network.
It’s important to note that passwords used for 802.1x authentication are not collected or stored in the Wi-FiCloud, as they are validated by local RADIUS servers.802.1x user passwords are also not readable by the APs since they are only passed between the client and the authentication servers.
For guest Wi-Fi, the cloud management plane also collects and stores identities of guest users used during Wi-Fi authentication to facilitate security audits of guest visitors. Businesses can, if they wish, implement a guest Wi-Fi network with anonymous login as well.
AP-to-Cloud communication
There are three security measures in place to ensure proper protection for AP-to-Cloud communication.
1. Mutual authentication: This occurs anytime an AP initiates a connection with the Wi-Fi Cloud. This is always an inside-out request, and both the AP and cloud authenticate to one another in the process. This verifies the identity of both parties.
2. Per message authentication: This uses an HMAC SHA-1 authentication code for every message sent from anAP to the Wi-Fi Cloud. This ensures the integrity of the communication by confirming the message is sent by the correct entity and is not changed in transit.
3. AES encryption: This is used throughout AP-to-cloud communication. This ensures the messages remain confidential and cannot be intercepted.
Wi-Fi Cloud environment in AWS data centre
The WatchGuard Wi-Fi Cloud is deployed as a virtual private cloud (VPC) in the Amazon Web Services (AWS) data centre. In the VPC architecture, the Wi-Fi Cloud environment is logically isolated from environments of other entities that co-exist within the AWS data centre. The physical and environmental security for the VPC is provided by AWS (1). Multiple subnets are provisioned inside the WatchGuard VPC that host WatchGuard application servers. Each subnet hasa network ACL (Access Control List) that only allows certain protocols in and out of the subnet (2). The application server virtual machines are deployed as EC2 (Elastic ComputeCloud) instances and are connected to these subnets. Each EC2 instance that WatchGuard deploys has a host-based firewall that is configured to only allow protocols required for corresponding applications in and out of the server (3).
The WatchGuard applications that run on these EC2 virtual machines themselves are port-hardened to ensure that unwarranted services and ports are not accessible on them (4). The Wi-Fi cloud is deployed in AWS data centres located around the globe.
Vulnerability scanning
WatchGuard regularly performs three types of vulnerability scans on its cloud-hosted applications as follows.
1. Port scans: As compute instances are launched in different parts of the data centre, it is essential to validate that open ports are restricted to only those that are essential for accessing the application functionality. This reduces the attack surface considerably. WatchGuard performs regular port scans on its cloud environment.
2. WAS (Web Application Security) scans: WAS scans focus on finding vulnerabilities at the web application level. Since the cloud application is accessible over HTTPS (port 443) and thus the Internet at large, the objective of a WAS scan is to ensure that there are no exploitable vulnerabilities if an unauthorised user attempts to access the application. Another important objective is to prevent an authorised (authenticated) user from breaching application security controls, such as injection attacks, privilege levels, multi-tenancy, and so on. WatchGuard deploys 24×7 automated WAS scanning using WhiteHat Security services and complements it with twice-a-year manual(deep) scans by WhiteHat Security experts.
3. Software components scans: These scans are performed to audit software modules within the application for any missing security patches, stale versions, and misconfigurations. WatchGuard performs software component scans on all its cloud applications at least once a quarter using the Nessus Enterprise tool.
Data encryption
WatchGuard encrypts data in transit using AES. This includes management GUI (HTTPS) communication between the WatchGuard AP and theWi-Fi Cloud and all interactions between different WatchGuard servers and applications in the cloud (HTTPS). AES-encryption is also applied to data at rest. Database backups of WatchGuard applications in the cloud are stored in AWS S3 and Glacier that are also AES-encrypted. The live database of the Wi-Fi Cloud’s Manage, the flagship application that provides the wireless management console, resides in AWS EBS (Elastic Block Storage) and is also AES encrypted.
Access control
WatchGuard personnel need to access cloud applications for the purposes of provisioning, maintenance and resolving support issues. WatchGuard implements access control mechanisms that limit WatchGuard personnel access of customer accounts to a basic minimum. Privilege escalation for any task that requires higher level of access is subject to the customer’s permission and available for a temporary period of time. Employees who might work with such privileges must pass background screening first. Maintenance access to an EC2 server must go through the bastion hosts. Login to the bastion hosts requires SSH and is allowed only from specific IP addresses. Bastion hosts implement strong access control and auditing functions to prevent unauthorised maintenance access (5).
Compliance certifications
WatchGuard pursues security compliance certifications that include third party scrutiny (audit) and validation of the WatchGuard Wi-Fi Cloud security controls geared towards confidentiality, integrity, and availability (the CIA triad).
WatchGuard has achieved ISO 27001:2013 certification for its Information Security Management System (ISMS). The scope of WatchGuard’s ISO certification covers all its operations.
WatchGuard is currently in the process of obtaining its own SSAE 16 SOC 2 validation for its production Wi-Fi Cloud. Of course, the AWS data centres where WatchGuard applications are hosted are already SSAE 16 SOC 2 certified. However, data centre SSAE certification by itself isn’t adequate to guarantee comprehensive cloud security for the customers. This is because there are a number of cloud operations that are handled by application providers such as WatchGuard that are beyond the scope of SSAE certification of the data centre itself. WatchGuard’s SSAE control framework covers such operations.
Summary
Shifting from traditional controller-based management to modern cloud-based management offers a myriad of benefits, from dramatically reduced TCO to increased scalability. With the WatchGuard Wi-Fi Cloud, businesses can enjoy all of the valuable features afforded by a cloud-based management solution, without ever compromising on security.
Previous Article

The Value of Fortinet Products in Education: ...

Next Article

WatchGuard Fireware 12.0 is now available!

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • BarracudaNews

    Recent Barracuda Awards

    09/11/2020
    By admin
  • SonicWall CRN ARC Report
    News

    SonicWall Email Security Wins Coveted 2018 CRN Annual Report Card (ARC) Award

    19/08/2018
    By admin
  • WatchGuard logo
    NewsWatchGuard

    WatchGuard’s New DNSWatchGO Service Eliminates Evolving Security Blind Spots, Blocks Phishing Attempts

    01/10/2019
    By admin
  • NewsTrendMicro

    Small and Midsize Businesses Face Greater Cybersecurity Risks and Challenges

    06/09/2019
    By admin
  • WatchGuard Q3 2017 IS Report
    News

    WatchGuard’s Q3 2017 Internet Security Report

    13/12/2017
    By admin
  • SonicWall Logo
    News

    New SonicWall SecureFirst Partner Program -100% Security, 100% SonicWall

    28/11/2016
    By admin

  • WatchGuard logo
    Software UpdatesWatchGuard

    WatchGuard – Threat Detection and Response AD Helper 5.3.x and older End of Life

  • Sophos Logo
    FirmwareSoftware UpdatesSophos

    Sophos XG Firewall v18 EAP 3 Refresh-1 Firmware Has Been Released!

  • Sophos Logo
    Alerts & BugsSophos

    Issue with RED 50 and Sophos UTM Causing Increase in RMAs

Timeline

  • 29/03/2022

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

  • 03/03/2022

    Sophos: Important Product Lifecycle Updates

  • 01/03/2022

    Shoring up your cybersecurity posture in light of ongoing crisis

  • 23/02/2022

    WatchGuard Support Alert

  • 03/02/2022

    Sophos: Important Product Lifecycle Reminder

Sponsored Links

Latest Comments

  • Paul Sillars
    on
    21/06/2016
    I received this in an email this morning, it was the first I heard about it ...

    Dell Software Group sold to help fund looming EMC deal

  • Paul Sillars
    on
    20/06/2016
    This is going to be an interesting one to watch. Especially after today's announcement that ...

    Ingram Micro gets distribution access to Dell’s security range in Australia

Find us on Facebook

Firewall.News Logo

This site serves more as a reference point for some of the major security vendor's updates and product/press releases

It will never be a definitive list, but it helps our customers keep up to date and also allows us to express our comment and observations as well.

About us

  • PO Box 451, North Lakes, Queensland, 4509, Australia
  • [email protected]
  • Recent

  • Popular

  • Comments

  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Sophos Logo

    Sophos: Important Product Lifecycle Updates

    By admin
    03/03/2022
  • Shoring up your cybersecurity posture in light of ongoing crisis

    By admin
    01/03/2022
  • WatchGuard logo

    WatchGuard Support Alert

    By admin
    23/02/2022
  • Dell SonicWALL Supermassive

    Ingram Micro gets distribution access to Dell’s security range in Australia

    By admin
    14/06/2016
  • Francisco Partners and Elliott Management to Acquire the Dell Software Group

    Dell Software Group sold to help fund looming EMC deal

    By admin
    21/06/2016
  • WatchGuard Firebox M500 – The Cure for HTTPS Performance Headaches

    By admin
    05/03/2015
  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Paul Sillars
    on
    21/06/2016

    Dell Software Group sold to help fund looming EMC deal

    I received this in ...
  • Paul Sillars
    on
    20/06/2016

    Ingram Micro gets distribution access to Dell’s security range in Australia

    This is going to ...

Follow Me

  • Contact
  • About Us
  • Home