"/>

PAe - EMMA, the new solution for the control of access to network infrastructure
accesskey _ mod _ content

EMMA, the new solution for the control of access to network infrastructure

15 october 2019

La solución está pensada para agilizar la visualización de activos en una red, su autenticación y segregación, así como la automatización de auditorías de seguridad de la infraestructura.

The National Cryptologic centre (Opens in new window) (CCN), en colaboración con la empresa Open Cloud Factory, han lanzado EMMA, una nueva solución desarrollada para el control de acceso a la infraestructura de red. Con ella, el CCN pretende facilitar a las organizaciones una visibilidad completa de la capa de acceso a la red (routers, switches, puntos de acceso, controladores, etc.), un punto crucial para verificar quién o qué está conectado en una red. Todo en un momento como el actual, en el que los modelos de seguridad requieren de una verificación de identidad estricta para cada persona y dispositivo (estén dentro o fuera del perímetro) y en el que es más difícil controlar todos los activos (distintos lugares físicos, data-centers o proveedores).

Once you have the visibility and control of the electronic network should be a bastionado.

In addition, if you do not have automated management of network devices, bastionado and continuous monitoring of their security can be a difficult task to deploy.

The solution EMMA allows, inter alia, the following:

  • Access controls to all the devices according to their context and rationale of the business (authenticating by identity/entity, 2FA, etc.).
  • Implement segmentation dynamically to reducing the size of attack, isolate critical devices and respond to attacks centrally.
  • The pursuit of security baselines, both in the network devices such as an.
  • Integration with ROCIO to contrast the configurations of network devices, centrally, with the national security.
  • Establish a process to monitor any deviation.
  • Create dashboards proactively with all data on CMDB.
  • To give visibility, context and all the devices in IT/OT.

The installation of EMMA

The installation of EMMA requires two virtual machines (Core and Analytics) and optionally a third (Sensor). Information guide CCN issued CCN-STIC corresponding may installation requirements. Similarly, a meeting will be scheduled in the beijing platform for online training of VANESA CCN-CERT,.

Its development stem from the need to integrate ROCIO control solutions for the deployment in isolated systems EMMA is one of its own solutions of audit of the Centre national Cryptologic, together with the above-mentioned ROCIO (implementation of security in routers and switches), ANA (Opens in new window) (Automation and Standardisation of Audits), PILLAR (Opens in new window) (risk analysis), CLEAR (Opens in new window) (compliance with the NHIS/CALLED “ CONSPICUOUS ” RELIGIOUS SYMBOLS of Windows Systems) and INÉS (Opens in new window) (State report of the security council in the NHIS), to facilitate all those responsible for the analysis of its equipment and systems.

Original source of news (Opens in new window)

  • Security
Subscribe to the youtube channel of OBSAE
 
Subscribe to the youtube channel of OBSAE