blogs.cisco.com
Open in
urlscan Pro
2600:1901:0:8658::
Public Scan
URL:
https://blogs.cisco.com/security/cisco-hypershield-our-vision-to-combat-unknown-vulnerabilities
Submission: On June 14 via api from US — Scanned from DE
Submission: On June 14 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://blogs.cisco.com/wp-comments-post.php
<form action="https://blogs.cisco.com/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
<p class="comment-notes"><span id="email-notes">We'd love to hear from you! Your comment(s) will appear instantly on the live site. Spam, promotional and derogatory comments will be removed and HTML formatting will not appear.</span></p>
<p class="comment-form-comment"><label for="comment">Comment <span class="required" aria-hidden="true">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required=""></textarea></p>
<p class="comment-form-author"><label for="author">Name</label> <input id="author" name="author" type="text" value="" size="30" maxlength="245"></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Submit Comment"> <input type="hidden" name="comment_post_ID" value="456567" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
<p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="8771d37b7c"></p>
<p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js"
value="1718398239340">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
Text Content
Skip to content Cisco Blogs / Security / Cisco Hypershield – Our Vision to Combat Unknown Vulnerabilities May 6, 2024 2 Comments -------------------------------------------------------------------------------- SECURITY CISCO HYPERSHIELD – OUR VISION TO COMBAT UNKNOWN VULNERABILITIES 6 min read Craig Connors By now, I hope you have had a chance to learn about the first-of-its-kind, groundbreaking solution we recently announced: Cisco Hypershield. As I covered in my previous blog, the unique architecture of Hypershield makes two powerful initial use cases possible: Distributed Exploit Protection and Autonomous Segmentation. Distributed Exploit Protection helps tackle the problem of the growing number of reported vulnerabilities (over 1000 Common Vulnerabilities and Exposures or CVEs per week) that teams are just not able to keep up with. This use case prioritizes vulnerabilities that might be directly affecting an organization and then recommends, tests and deploys compensating controls to protect the workload from exploit, all while keeping the application running. This immediate response closes the exploit gap between vulnerability disclosure and patching, giving teams time for a comprehensive response. But these reported CVEs are the known vulnerabilities. What about the yet-to-be-announced and even yet-to-be-discovered vulnerabilities, the unknown vulnerabilities? Cisco Hypershield can help protect organizations against those as well. Hypershield’s unknown vulnerability protection can help detect and block unknown vulnerabilities within runtime workload environments. In addition, suspected workloads can be isolated to limit the vulnerability’s blast radius. This is made possible with: 1. Deep visibility and surgical control at the workload level 2. The use of machine learning and analysis of the relationships between the application process, file and network operations against Common Weakness Enumeration (CWE) database, which is a classification system for hardware and software security weaknesses 3. Analysis of the application process graph and known application behaviors to classify suspicious or malicious activity Expanding Hypershield’s Distributed Exploit Protection to include detection and containment of unknown vulnerabilities can enhance the protection of workloads against new security threats. DEEP WORKLOAD AND APPLICATION VISIBILITY AND ENFORCEMENT Attacks exploiting unknown vulnerabilities are much harder to detect compared to known vulnerabilities, because defenders don’t have any documented signals usually defined in CVEs that enable detection. And even beyond detection, it is necessary to have options of graduated granular responses for complete remediation. This is where Hypershield’s deep workload visibility and enforcement comes into play, keeping in mind that an application may span multiple workloads. Let’s review how the solution is architected to understand that better. A core component of Cisco Hypershield is the Tesseract Security Agent, which runs on the workload. This could be a virtual machine running Linux or a Kubernetes environment. Both private and public clouds are supported; in fact, Hypershield can provide unified policy and management across the domains. The Tesseract Security Agent interacts with workload processes via the operating system’s kernel using extended Berkeley Packet Filter (eBPF). eBPF is an open-source, cloud-native capability and is becoming the de facto standard for high-performance, non-invasive visibility and security in hyperscalers. Any time a process reads a file or opens a network connection, the eBPF code placed in the kernel by the Tesseract Security Agent is executed. Hypershield uses this technology in new ways to bring together a larger system that provides visibility and control across workloads and networks. The Tesseract Security Agent uses eBPF to provide exceptionally deep visibility by sitting in the middle of each process invocation within the workload. The Tesseract Security Agent can also step in and enforce when it detects anomalous or malicious activity. This enables Hypershield to create an application behavior graph and an application fingerprint. The application behavior graph captures the relationships of the process and the invocations such as file reads, child process launches, and network opens. As that application adjusts and is updated, Hypershield can move in lockstep, recommending policy changes and a security stance. Figure 1. High-confidence application behavior graph and application fingerprint from deep workload visibility provided by the Tesseract Security Agent. ADVANCED METHODS FOR UNKNOWN VULNERABILITY PROTECTION Hypershield uses various methods to detect and contain unknown vulnerabilities. Some of the examples are below. Once detected, there are graduated responses to contain the vulnerability, extending to isolating the workload if needed. COMMON WEAKNESS ENUMERATION (CWE) ANALYSIS AND PROTECTION CWE is a classification system for hardware and software security weaknesses. A CWE can describe the type of vulnerability or the underlying weakness that leads to specific vulnerabilities listed in Common Vulnerabilities and Exposures (CVEs). For example, a CVE might detail a particular instance of a software flaw in a specific program, and the underlying type of flaw could be classified under a relevant CWE entry. Thus, while CVE focuses on specific vulnerabilities, CWE addresses the broader types of weaknesses that those vulnerabilities may exemplify. For example, the path traversal CWE is common to about 3000 CVEs in the last two years. A single CWE mitigation may prevent multiple (known and unknown) CVEs generically and might be considered a more robust solution. Therefore, to get ahead of the high incoming rate of CVEs, we need to understand CWEs better. One of the key components of Hypershield’s unknown vulnerability protection is its deep analysis of the CWE databases and its updates. This analysis, along with an application’s unique fingerprint and process graph, is used to identify weaknesses in the specific application and Hypershield can suggest monitoring and blocking constraints to protect the application in runtime. This analysis is not just for the application development team but also a crucial part of Hypershield’s AI, designed to understand and address weaknesses in near real time without the need for code access. APPLICATION-SPECIFIC BEHAVIOR CLASSIFICATIONS As described above, one method Hypershield employs to identify unknown vulnerabilities involves contrasting CWEs with the application behavior graph. Furthermore, Hypershield also utilizes the application behavior graph in a different analytical approach to enhance detection techniques. Applications monitored by Hypershield have tailored profiles that detail specific behaviors and associated risk classifications. For instance, the Apache (httpd) application-specific profile is relevant across various customer environments. This profile integrates with an environment-specific application behavior graph to provide detailed insights and assessments. Hypershield monitors applications and classifies new behaviors as valid, suspicious or malicious based on the defined application profile and historical context. Typically, most actions are valid, involving routine behaviors like reading from low-risk, benign files and writing to designated files and network connections. Occasionally, new and potentially suspicious behaviors may emerge, which are flagged for further analysis. Hypershield applies several analytical techniques to determine if a behavior is malicious. One effective method involves tracking the sequence of suspicious behaviors to ascertain malicious intent. For example, in the Apache web server application, the analysis might follow these steps: a. Detection of a payload identified as a web shell b. Observation of the payload writing to the PHP directory c. Execution of shell commands by the payload In this scenario, writing to the PHP directory (step b) rapidly reclassifies the behavior from suspicious to malicious due to the context and sequence of actions. Beyond file and network operations, Hypershield’s behavioral detection capabilities extend to any actions undertaken by the application. The comprehensive nature of the Hypershield application behavior graph, coupled with AI-driven analysis, enables robust protection across applications. This system identifies and blocks adverse actions and can isolate the application if necessary, ensuring enhanced security and operational integrity. Figure 2. CWE Analysis and application-specific behavior classifications. CONCLUSION CWE analysis, protection, and application-specific behavior classifications are essential for defenders to address increasing vulnerabilities effectively, especially unknown ones. These strategies enable Hypershield to help provide protection for organizations broadly, rather than focusing on individual vulnerabilities as they arise. In increasingly complex and distributed environments, modern enterprises face a growing number of security threats. Cisco Hypershield addresses this by offering a holistic security solution for applications, workloads, and networks, enhancing existing infrastructures. Hypershield employs AI analytics that utilize deep visibility telemetry and external information to deliver actionable insights and policy recommendations. We are committed to building trust by granting operators access to underlying data, enabling them to review and interact with our AI assistant. Moreover, operators can safely test policy recommendations using Hypershield’s dual data plane on live traffic, ensuring production environments remain unimpacted. This approach significantly accelerates our ability to defend applications confidently and effectively. Shields up! WANT TO KEEP UP-TO-DATE ON CISCO HYPERSHIELD? For more information on Cisco Hypershield availability, product announcements, demos and more, please visit our Hypershield page. Are you at RSA Conference 2024? Our booth team is ready to talk all things Cisco Hypershield! Come visit us at: * North Hall #5845 * South Hall #926 -------------------------------------------------------------------------------- We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels Instagram Facebook Twitter LinkedIn Share Share: AUTHORS CRAIG CONNORS VP AND CTO SECURITY BUSINESS GROUP Tags: Cisco Hypershield Featured RSA 2024 RSA Conference (RSAC) Vulnerability Protection -------------------------------------------------------------------------------- LEAVE A COMMENT CANCEL REPLY We'd love to hear from you! Your comment(s) will appear instantly on the live site. Spam, promotional and derogatory comments will be removed and HTML formatting will not appear. Comment * Name Δ 2 COMMENTS * Mike Poor says: May 9, 2024 at 3:20 am This is very interesting and could well change the game for defenders. Reply * Lawrence Monchonyane says: May 22, 2024 at 2:07 am I love this shield, would like to try it out on google chrome, any hints. Thanks LLM Reply CISCO CYBERSECURITY VIEWPOINTS Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more... Get expert perspectives now WHY CISCO SECURITY? Explore our Products & Services Learn More CONNECT WITH US * * * * * Cookies allow us to optimise your use of our website. We also use third-party cookies for advertising and analytics. Please read our Privacy Statement and Cookie Notice for more information. Manage cookie settings Reject Accept CONSENT MANAGER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES * FUNCTIONAL COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. From the list on left, please choose whether this site may use Performance and/or Targeting Cookies. By selecting Strictly Necessary Cookies only, you are requesting Cisco not to sell or share your personal data. Note, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Privacy Statement STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies provide metrics related to the performance and usability of our site. They are primarily focused on gathering information about how you interact with our site, including: page load times, response times, error messages, and allowing a replay of a visitor’s interactions with our site, which enables us to review and analyze visitor behavior, helping to improve site usability and functionality. These cookies also allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Save Settings Allow All