Secure System Setup

Download Report

Transcript Secure System Setup

Secure System
Setup
COEN 250
System Administration Lifecycle

Harden / Secure
 Install
only minimal essential OS configuration
 Install patches to known deficiencies
 Install most secure / up-to-date versions of system
applications
 Remove all privilege and access and grant them back
only as needed

“Deny first, then allow”
 Enable
as much system logging as possible
System Administration Lifecycle

Prepare

Running system contains a collection of
vulnerabilities that are yet to be identified
 Administrator
needs to know system in a
production setting

Collect baseline state
 Install
monitoring tools for detecting and
responding to intrusions
System Administration Lifecycle

Detect
 Monitoring
reveals unusual, unexpected, or
suspicious behavior.
 External stimulus reveals unusual,
unexpected, or suspicious behavior.
User report
 Call from other organization
 security advisory / bulletin

System Administration Lifecycle

Response
 Analyze
effects of, scope of, and damage
caused by an intrusion
 Contain these effects
 Eliminate further intruder access
 Return information asset to a known,
operational state
System Administration Lifecycle

Improve

Triggered by detection and response
 Holding
a post mortem conference
 Update policies and procedures
 Collect measures of resources required to
deal with the intrusion an dother security
business case information
Definitions

Assets


Threat


Action conducted by an adversary on a victim system
Incident


Anything that can compromise an asset
Attack


includes information, hardware, software, people
Collection of data representing one or more related attacks
Intrusion

Actual illegal or undesired entry into an information system
Securing Network Servers and
User Workstations
Default hardware and software
configurations are set by vendors to
emphasize features and functions over
security
 Critical data stored on network servers
and user workstations

Securing Network Servers and
User Workstations

Confidentiality
 Some information on asset is sensitive or proprietary.
 Access to data limited to authorized users.
 Access to services limited to authorized users.

Integrity
 Integrity

of this information is critical.
Availability
 Information
must be readily available to authorized
users.
 Authorized users need to access services quickly
Securing Network Servers and
User Workstations

Four Stages
 Planning
and Executing deployment of
computers
 Configuring computers to make them less
vulnerable to attacks.
 Maintaining the integrity of deployed
computers
 Improving user awareness of security issues
Securing Network Servers and
User Workstations

Address security issues in computer
deployment plan
 Identify
the purpose of each computer
 Identify network services that will be provided
 Identify network service software to be
installed
 Identify users
Securing Network Servers and
User Workstations

Address security issues in computer deployment
plan
 Determine
user privileges
 Plan authentication

Network servers: OS authentication, Network service
authentication
 Determine access enforcement
 OS access control
 Encryption
 Develop
measures
Intrusion Detection Strategies
Securing Network Servers and
User Workstations

Address security issues in computer deployment
plan
 Document
Backup and Recovery Procedures
 Determine modus of network service restoration
 Develop and follow a documented procedure for
Installing an OS
 Determine how the computer will be connected to
your network
Securing Network Servers and
User Workstations

Address security issues in computer
deployment plan
 Identify
security concerns related to day-today administration
 Protect information contained on hardware no
longer in use
 Keep computer development plan current
Securing Network Servers and
User Workstations

Policy Considerations




A detailed computer deployment plan will be developed,
implemented, and maintained
Access to deployment plan will be given only to those who
require the information to perform their jobs
All new and updated computers will be installed, configured, and
tested in a stand-alone mode or within test networks.
All computers will present a warning banner to all users



indicating that they are legally accountable for their actions
implying consent through use of computer
All computers will be configured securely prior to deployment.
Securing Network Servers
Addressing Security Requirements

Server Selection is based on

Organization’s requirements





range of services
response time
throughput
ability to remotely administer software
Security Requirements







Availability of experienced staff
Absence of known vulnerabilities
Ability to restrict administrative activities to authorized users
Ability to deny access
Ability to disable unnecessary network services
Ability to control access to various forms of executable programs
(CGI…)
Ability to log
Securing Network Servers
Addressing Security Requirements

Identify Functionality and Performance
Requirements
 Document

OS features needed
Aside: An infrastructure made up of inhomogeneous
systems is more resilient
 Document
the applications software to run
 Derive hardware requirements
 Document hardware configuration and secure
configuration of software
Securing Network Servers
Addressing Security Requirements

Review Server Product Features
 Review
recommended practices
 Note type of security problems
 If available, look at sample installations
 Identify specific security-related features
 Check incident data to determine likelihood of
incidents and vulnerability of servers
Securing Network Servers
Addressing Security Requirements

Estimate Differences in Operating Costs
for different solutions
Securing Network Servers
Addressing Security Requirements

Policy Consideration
 Security
Policy should require a security
evaluation as part of computing and network
technology selection process
Securing Network Servers and User
Workstations
Keep OS and Apps up to date

Keep informed about security-related
patches
 Time
lag between discovery of vulnerability,
exploit, and patch
Securing Network Servers and User
Workstations
Keep OS and Apps up to date

Evaluate and Install Updates
 Installing
an update can cause security
problems
During update, computer can be in a more
vulnerable state
 Update schedule might render computer
unavailable when needed
 Non-synchronous update in a large network leads
to a situation with different software versions,
which might loose data
 Update might introduce new vulnerabilities.

Securing Network Servers and User
Workstations
Keep OS and Apps up to date

Evaluate and Install Updates
 Vendors
might not use proper authentication methods
to distinguish patches from Trojans
 Test updates before using them


Use isolated test environment to measure performance
Update less mission critical computers first
 Back-up data before updating
 Automatize updating
 Use secure connectivity tools such as SSH
 Use isolated network segments to propagate updates

 Use
Because update process makes computers more vulnerable
documented procedure to install updates
Securing Network Servers and User
Workstations
Keep OS and App up to date

Deploy new computers with up-to-date
software
 Installation
media might be out of date
Securing Network Servers and User
Workstations
Keep OS and App up to date

Create new Integrity-Checking Information
 Protect
OS files, Application files by storing
crypto-hashes on a secure medium
 Periodically verify integrity
Securing Network Servers and User
Workstations
Keep OS and App up to date

Policy Consideration
 Policy
should require system administrators to
monitor need for necessary software updates
 install them in a timely manner

Securing Network Servers:
Stick to Essentials on the Server Host
Machine

Offering only essential network services on a particular
host

Lowers vulnerability profile


Different services may be administered by different staff




Each additional service installed increases likelihood that host is
vulnerable
Less likelihood of conflict
Separation of duties
Host can be better configured for one / few services
Less logs / log entries

Easier to spot problems
Securing Network Servers:
Stick to Essentials on the Server Host
Machine


Determine functions host provides
Select Most Secure Alternative
 Example:
 Do not choose RSH or other r-services in favor of SSH
 Choose TCP wrapper



A small program that listens on the port where the service is
provided
Whenever a connection is made, wrapper records name of the
remote host and then run the original network server program
 Which has been moved to a different place.
Can provide additional access control
Securing Network Servers:
Stick to Essentials on the Server Host
Machine
Install only the minimal set of services and
applications
 Create and record cryptographic
checksums (tripwire)

Securing Network Servers:
Stick to Essentials on the Server Host
Machine

Policy Considerations
 Individual
network servers, including public
servers should be configured to offer only
essential services.
 Each network service should be on a
dedicated, single-purpose host wherever
possible.
Securing Network Servers:
Stick to Essentials on the Workstation Host
System

A new workstation is enabled by default to
provide the following roles:
 A personal
workstation that uses network services
only as a client
 A personal workstation that in addition provides
services and also uses services from other
workstations.
 A workstation that serves as a public server.

This role comes with considerable risks.
Securing Network Servers:
Stick to Essentials on the Workstation Host
System

Determine Functionality
 Applications
to be used
 File systems
 Default settings for small
 web access
 FTP
 File sharing
 System maintenance
 remotely or by console
 Network configuration
 Offered protocols
services
Securing Network Servers:
Stick to Essentials on the Workstation
Host System
Install only essential software
 Create and record cryptographic
checksums

Securing Network Servers:
Stick to Essentials on the Workstation
Host System

Policy Consideration
 All
user workstations should only be
configured with essential software
 All other software should be removed.
Securing Network Servers:
Configure network service clients to
enhance security

Users need to access several network services
from their workstation
 file
servers
 electronic mail
 bulletin boards
 file transfer
 remote access to other workstations

Configure client software that accesses those
services to operate securely
Securing Network Servers:
Configure network service clients to
enhance security

Identify behaviors that may lead to security problems

Can the client be used to store and transmit confidential information?


Does client software require increased user privilege?






If yes, misuse can result in dangerous operations at a higher security level.
Can the client be used to download and execute software?



If yes, provide cryptography.
Maybe Active X, Java, JavaScript is enabled in the browser.
Can the client corrupt data?
Can the client disclose confidential information about the client’s host
system configuration, network, user?
When can users download and execute code from external sites?
Are there private cryptographic keys on the client?
Does the client have turst relationships with other users and computers?
If the client is multi-homed, can it be used to bridge or route to other
computers?
Securing Network Servers:
Configure network service clients to
enhance security

Push vendor updates
Securing Network Servers:
Configure network service clients to
enhance security

Configure the client to maintain security
 Determine
what is configurable.
 Determine the likely threats to security presented by
the software.
 Turn off all unnecessary software features.
 Use access controls to inhibit the enabling of
restricted settings
 Establish user policies to maintain security where
features are lacking
Securing Network Servers:
Stick to Essentials on the Workstation
Host System

Policy Consideration
 Provide
users with clear explanations of
Precautions necessary when using a web browser
 Circumstances – if any – in which users can
download and execute software from other hosts
 Limitations on information that may be included in
e-mail

Securing Workstations
Configure Computers for User
Authentication
Only authorized users may access the
computers and the data and services they
provide
 Computers need to be configured to allow
identification and authentication
 Deployment plan documents the users or
user categories and the approach to
authenticating users

Securing Workstations
Configure Computers for User
Authentication


Configure hardware based access controls
Handle accounts and groups
 Change default accounts
 Disable accounts that need
to exist but do not require
an interactive login





UNIX: Provide a login shell with NULL functionality: /bin/false
Check password policy and ensure compliance
Require reauthentication after idle period.
Deny logins after a small number of false
attempts
Consider better authentication mechanisms
Securing Workstations
Configure Computers for
User Authentication

Policy Considerations
 Describe

life cycle of accounts
Includes triggers for actions such as deletion, disabling,
transfer, …
 Require
appropriate authentication of all users on all
computers that can access information assets
 Appropriate password policy

Prohibiting users from recording or storing passwords in
places that could be discovered by intruders
 Acceptable

use policy for workstations
Require users to shut down or lock unattended workstations.
OS Configuration for Access
Control

Identify the protection needed
 Generate
access matrix with groups of users
and groups of data
This might lead to refinements on user groups.
 Be aware that some programs change privilege
levels

OS Configuration for Access
Control
Configure access control for all protected
files, directories, devices …
 Each change / decision should be
documented

OS Configuration for Access
Control

Consider
 Disable
write/modify permissions for all binaries /
executable files
 Restrict access to system directories to administrators
 Unix: mount file systems as read only and nosuid
 Linux, BSD: use access permission “immutable” to all
kernel files
 Make all log files “append only”
 Educate users to not run scripts without
administrative review
OS Configuration for Access
Control

Pay attention to access control inheritance
for new files
OS Configuration for Access
Control

Install and configure file encryption
capabilities for sensitive data
Securing Network Servers and
User Workstations

Security Policy should specify:
 Access
privileges and controls for data stored on a
computer
 How to access files that have been encrypted
 Access privileges and controls for administrative
users:






Authority and condition for reading other user’s email
Access to protected programs of files
Disruption of service under specific conditions
Ban on sharing accounts
Ban on unauthorized creation of user accounts
Authority and conditions for use of vulnerability tools
Configure for File Backup

Develop a file backup and restoration plan
 Plan
needs to cover all deployed workstations and
servers
 Cost / Benefit analysis necessary to decide


Speed of backup / storage need / restoration effort
Local backup vs. centralized backup of user workstations
 With
cryptographic checksums, restore system files
from proven backup



Otherwise: use distribution media
Install and configure backup tools
Test the ability to recover
Configure for File Backup

Policy considerations
 Policy
should require the creation of a file
backup and restoration plan
 Inform users of their responsibilities
Use a tested model configuration
and a secure replication procedure



Configure one workstation appropriately
Test workstation
Propagate configuration

Record steps to create model configuration and then repeat
them




Save configuration on a write-protected storage medium and use
this as a master copy




Secure
Prone to human error
Does not scale
Almost as secure
Less prone to human error
Does not scale well
Use network to transfer configuration



Least secure
Least prone to human error
Scales well
Malware Protection

Develop a malware protection plan
 specifies
responsibility and authority of users
and system administrators
Install and execute anti-virus tools
 Train users
 Update detection tools

Malware Protection

Policy
 Defines
rights of users to install software
 Defines responsibility for running anti-virus
scans
 Prohibit users from running, looking at, … untrusted email attachments
Configure for Secure Remote
Administration



Local administration is more secure, but does not scale.
Computers can become vulnerable during
administration.
Insure that remote administration only comes from
authorized servers:



SSH
Insure minimum privilege level for all administration
tasks
Protect sensitive data against reading

Encryption

E.g. encrypt log data before transmission to reading computer
Configure for Secure Remote
Administration

Policy Considerations
 Require
use of secure procedures for
administration of network servers and
workstations
 Specify circumstances (if any) under which
third parties are permitted to administer
systems and the modes of such
administration.
Allow only appropriate physical
access to computers

Physical access is at least as dangerous as
network access
 Details
of security plan depend very much on
organization

Prevent installation of unauthorized hardware





key-loggers
modems
removable media
boot devices
Deploy computers in a secure facility
Allow only appropriate physical
access to computers

Policy considerations
 Permissions to install or modify hardware
 Circumstances in which users are allowed
to use
storage devices with removable media
 Circumstances in which users may take removable
media or printed information from site
 Need for network servers to be deployed in a
physically secure location

Access list for such location
 Circumstances
in which third parties are permitted to
physically access the system
Acceptable Use Policy for Users

Elements:




Workstations a user may or may not use
Hardware changes a user may make
Software installation or removal by user
What kind of work a user may perform on a given system












Manipulation of sensitive / classified data
Network services the user may or may not use
Information the user may or may not transmit across a network and under what
circumstances
User responsibilities in administering a workstation
Configuration changes a user might make
Ban on sharing accounts
Need to comply with password policy
Guidelines for accessing unprotected programs or files
Ban on breaking into accounts and systems
Ban on cracking passwords
Ban on disruption of service
Consequences of noncompliance
Acceptable Use Policy for
Users
User Training
 Provide explicit reminders at each login
