Ch02-SystemAdministration

Download Report

Transcript Ch02-SystemAdministration

Chapter 2
System Administration - 1
Overview

Introduction to system administration

Importance of system administration to information
security

General system administration facilities provided by
enterprise software
2
Introduction to system administration
Definition


System administration

A set of functions that




provides support services
ensures reliable operations
promotes efficient use of the system
ensures that prescribed service-quality objectives are met
System administration functions


installation, configuration and maintenance


3
network equipment (switches, routers, DHCP, DNS servers etc)
computer systems (database systems, email systems, ERP systems etc)
System administrators
Definition


Person responsible for the day-to-day operation of a
technology system
First line of defense


System administrators secure critical information systems
May also be system security officers


Person responsible for writing, enforcing and reviewing security
operating procedures
Some of the most important IT personnel in an
organization


4
Keep IT humming
Motivation
System administration is a foundational skill for an
aspiring information security professional



Most employers value these skills for entry-level positions
Many students find system administration skills valuable
Skills development requires



Discipline
time
Hence introduced early


Hands-on activities after every chapter designed to refine
system administration and technical skills
Tempting to skip


5
But persistence strongly encouraged
Relation to information security
First line of defense for all the three dimensions of
information security




Confidentiality
Integrity
Availability
Examples


Availability

Anticipate failures


Confidentiality

Use appropriate file permissions

6
Prevent the hardware failure from affecting end users
Ensure that unauthorized people cannot not read or copy transcripts
Common system administration tasks
Installation


Writing necessary data in the appropriate locations on a
computer’s hard drive, for running a software program

e.g.



Installing operating system
Installing application programs
System administration challenge

Streamline process across thousands of computers in the organization
Consumers often believe


When in doubt, install
Professional system administrators believe


7
When in doubt, do not install
Common tasks (contd.)
Configuration



Selecting one among many possible combinations of features of
a system
Has information security implications

Vulnerabilities can arise due to interactions among components

System administrators must comprehend the implications of these
interactions
Challenge


Many software components desired by end users are not
maintained by their creators

8
Resulting information security hazards must be controlled
Common tasks (contd.)
Access control


Limiting access to information system resources only to
authorized users, programs, processes, or other systems


Typically refers to


And, establishing what authorized users can do on a system
Files or directories a user can read, modify or delete
Can also include


Limiting access to network ports
Application level


9
Limiting rows and/or columns a user can see in a database
Available screens in a business application.
Common tasks (contd.)

User management





Defining the rights of organizational members to information in
the organization
Key component of access control
Creating and removing user accounts
Updating permissions when users change roles
Challenge

Managing large numbers of users

Commonly organized into groups


E.g., all faculty members in the Computer Science department


10
users with similar privileges
Members of the CompSci-Faculty group
Granted access to mailing list for email discussions.
Common tasks (contd.)

Monitoring


listening and and/or recording the activities of a system to
maintain performance and security
Required continuously after installation and configuration


To ensure desired performance and security
Two kinds

Reactive monitoring

Detecting and analyzing failures after they have occurred


Problem notifications
Analyzing logs after failures



11
Identify modus-operandi
Identify affected systems
Proactive testing
Common tasks (contd.)

Proactive testing


Testing a system for specific issues before they occur
Vulnerability scanners

Access systems and look for potential vulnerabilities.


Prioritize and resolve identified vulnerabilities
Penetration testing


Usually carried out by a professional security firm
Actively exploiting vulnerabilities found


Recent developments

Chaos Monkey

Deliberately destroy running systems

12
Assessing the level of access that is gained
Promoted by Netflix
Common tasks (contd.)

Updates

Replacing defective software components with components in
which the identified defects have been removed


Remove vulnerabilities detected during ongoing use and monitoring of
software
Two categories

Operating system updates

Fix issues with the low-level components of the system software


13
Developed and released by the operating system vendor
All modern operating systems can automatically check for and install
required security updates without system administrator intervention
Common tasks (contd.)

Application updates


Fix problems in individual applications
Typically involve more effort



Many customizations not well documented or tested


Ensure functioning of plug-ins from other vendors
And in-house additions
Impact of an application update on customizations not predictable
 Manual updates often necessary to deploy application updates
Typical update procedure



Install update on a development server
Test all applications on the development system
If successful

14
Deploy update to production systems
Common tasks (contd.)

Single points of failure

A part of a system whose failure will stop the entire system from
working is a single point of failure



Related to hardware
Availability implications
Standard solution

Redundancy



Surplus capability, which is maintained to improve the reliability of a system
E.g. spare power supply
Cold spares

Extra parts used when necessary


Hot spares

Redundant components already in operation that can replace the failed
component


15
Involve down time
No downtime
Used in all mission critical components
System administration utilities


Available for all enterprise software
Microsoft Windows

Systems Center

Configuration manager


Operations center


Monitor installation and configuration of software across enterprise
Monitor hardware status across enterprise
Unix/ Linux

Various utilities

16
Puppet, Oracle Jumpstart
Unix family tree
Unics
BSD
OpenBSD
17
NetBSD
System III
FreeBSD
SunOS
System V
Hp/ UX
Mac OSX
AIX
Solaris
XENIX
Summary

Role of system administration

Role of system administrators

Common system administration tasks

Enterprise utilities
18
Example case: T J Maxx


Major corporate information security incident
2007

Hackers had complete access to credit-card databases


August 5, 2008

US government charged 11 individuals


T. J. Maxx, Barnes and Noble, Office Max and other retailers
Wire fraud, damage to computer systems, conspiracy, criminal
forfeiture, and other related charges
System administration failure


19
No encryption at T J Maxx stores
Web application vulnerabilities at other stores
T J Maxx sales (around intrusion)
20.5
19.5
Sales ($ bn)
18.5
17.5
16.5
15.5
14.5
2005
2006
2007
2008
Year
20
2009
2010
Design case

Email provider selection
21
Hands-on activity

Install VirtualBox

Download and install the OS image

Start the virtual machine
22