NATIONAL SECURITY AGENCY Ft. George G. Meade, MD
|
|
|
- Owen Turner
- 10 years ago
- Views:
Transcription
1 NATIONAL SECURITY AGENCY Ft. George G. Meade, MD 18 October 2007 Systems and Network Analysis Center Best Practices for Storage Networks This document contains 30 sheets.
2 Table of Contents 1. Executive Summary General Storage Network Security Physical Security, Operations Security, and Business Continuity Planning Documentation and Planning Availability and Confidentiality Network Management and Access Control Layer 2-3 Security Operating System and Application Security Attack Detection and Prevention Network Attached Storage (NAS) Security Confidentiality and Integrity Network Data Management Protocol (NDMP) Authentication and Access Control Data Segmentation CIFS NFS Sample NAS Security Architecture Storage Area Network (SAN) Security Confidentiality Authentication Access Control Zoning LUN Masking Node Identification Proprietary Access Control Cisco Virtual SAN (VSAN) Cut-through Switching, Physical Port Locking, and Port Type Locking Name Server Sample SAN Security Architecture Internet Small Computer Systems Interface (iscsi) Security Confidentiality and Integrity Authentication Internet Storage Name Server (isns) Best Practices Sample iscsi Security Architecture Conclusions Appendix 1 - Acronyms Appendix 2 General Storage Network Best Practices Summary Appendix 3 NAS Best Practices Summary Appendix 4 SAN Best Practices Summary Appendix 5 iscsi Best Practices Summary Appendix 6 - References... 26
3 1. Executive Summary Storage networks often contain company proprietary information, trade secrets, and mission critical data. Ensuring the availability of the storage network and its components as well as the confidentiality and integrity of information in transit and at rest within the storage network is vital to the success of the company. Implementing the common best practices described in this paper will provide greater information assurance for the storage architecture and data within the storage network. This paper will present general storage network security best practices followed by specific best practices for Network Attached Storage (NAS), Storage Area Networks (SAN), and Internet Small Computer Systems Interface (iscsi) storage networks. Included are security mechanisms that should be used to protect the content and function of storage networks. Techniques that employ these mechanisms will protect the components, interfaces, and protocols in storage networks and will provide fewer opportunities for attack. Sample architectures that incorporate many of the security features are also provided. 1
4 2. General Storage Network Security A storage network can take one of three main forms: Network Attached Storage (NAS), a Storage Area Network (SAN), or an Internet Small Computer Systems Interface (iscsi) storage network. Each form of storage network may be protected using best practices that require the use of various security mechanisms. A security mechanism is broadly defined to be anything that provides at least a minimal amount of security to either a network component or the network itself. Security mechanisms might be security protocols, configuration options, or even network components themselves. Security mechanisms provide varying degrees of security depending on their function and their placement in the network architecture. They might be used to provide access control, or to prevent data corruption or redirection. This paper will provide current best practices that should be included in secure storage networks. Refer to Appendix 1 for a list of acronyms used throughout the document. Refer to Appendix 2 for a summary of general best practices for storage networks and the types of security services each best practice provides. Refer to Appendices 3, 4, and 5 for a summary of the best practices for NAS, SAN, and iscsi networks, respectively. Refer to Appendix 6 for a list of references. 2.1 Physical Security, Operations Security, and Business Continuity Planning Certain best practices are common to securing any storage networking environment. These include physical security, operations security (OPSEC), and business continuity planning. Strong physical security measures should be implemented, since this is the first line of defense. Data availability, integrity, and confidentiality are all at great risk without appropriate physical security. Simply using a password as an access control mechanism is not a complete safeguard against unauthorized entry if there is weak physical security. Access to a physical port on a device can provide the attacker the opportunity to bypass, terminate, or steal secure logins to the storage network by taking advantage of faults or flaws in the implementation of access control mechanisms. Unused ports (both logical and physical) and unused protocols should be disabled on all storage network devices and management workstations. Likewise, best practices for maintaining OPSEC should be implemented. All aspects of operations should be controlled, including hardware, software, firmware, media, and personnel. Procedures should detail all operations, and extra care should be taken when media containing sensitive business data is physically transported. Headline news continues to relate stories of theft or loss of huge quantities of data containing personal and confidential information. Proper OPSEC would help mitigate these vulnerabilities. It is important to have a business continuity plan so that a disaster will not completely destroy the business. The plan might include provisions for data replication to a disaster recovery site. Backup copies of device operating systems, configurations, application software and data should be securely maintained both locally and off site for disaster recovery purposes. 2
5 2.2 Documentation and Planning Implementing secure storage networks requires proper documentation and planning. Documentation should be generated that includes hardware and software inventories, storage network topology diagrams, policy, and procedures. Security should be a focus throughout the documentation, and access to the documentation should be controlled and logged. Documentation should not be limited to automatically generated storage network topology diagrams stored within software, but should also include periodically updated hardcopies that are accessible on demand by authorized personnel. A risk analysis should be performed before deploying or integrating new storage architectures, and existing storage architectures should be re-analyzed before making any modifications. The outcome should include a determination of required protection levels for all data and devices in the architecture. A storage security policy should be maintained and incorporated into the larger enterprise security policy. Procedures should be documented in detail and available to the appropriate personnel. The storage network topology and how it fits in to the enterprise architecture should be documented, maintained, and stored in a secure location. The Common Criteria Evaluation Assurance Levels (EAL) and Federal Information Processing Standards (FIPS) provide different levels of security assurance. The greatest security benefits can be provided by components that have achieved the highest levels of certification, so these should be incorporated into the storage network architecture. 2.3 Availability and Confidentiality It is important to implement common best practices that provide assurance of availability and confidentiality. Uninterruptible Power Supply (UPS) should be used for all components in the architecture. Remove single points of failure within the architecture by adding redundancy and failover mechanisms. Data should be backed up appropriately to portable media and stored at a secure, off-site location. Strong encryption should be implemented throughout the storage architecture, both in the storage network and in the management network. Encrypt communications between management stations and storage network devices. The strongest hash/encryption algorithms supported by the NAS device and clients should be used. For example, Secure Hash Algorithm 256 (SHA-256) is stronger than Message Digest 5 (MD5) and Advanced Encryption Standard (AES) is stronger than DES, therefore SHA-256 and AES should be used if possible. 2.4 Network Management and Access Control A number of network management and access control best practices should be implemented. Network devices typically offer two options for device configuration and management: local administration via a serial connection, or remotely via an Ethernet connection. Perform device management locally, exclusively via the console port, since this is the most secure form of management. If the devices must be managed remotely, perform out-of- 3
6 band (OOB) management and only use protocols that incorporate strong encryption (i.e. current, patched versions of SSH or SSL). The OOB management network should not be connected to any other network, including the Internet. A less secure remote management option would be inband management using only protocols that incorporate strong encryption. Regardless of remote management type (i.e. in-band or OOB), storage network administrative access should be restricted via access control lists to a minimal set of Internet Protocol (IP) addresses if possible. Insecure protocols such as TELNET, FTP, RSH, and HTTP should be disabled. A modem should never be connected to the serial port for remote management. Access control lists should restrict any Simple Network Management Protocol (SNMP) traffic sent from unauthorized devices. SNMP version 3 (SNMPv3) should be used rather than SNMPv1 or SNMPv2. SNMP communications should be logged. All management passwords and SNMP community strings should comply with strong rules set forth in policy. Administrators should use unique passwords, should regularly change their passwords in accordance with password expiration policy, and should not reuse old passwords. Always change device default passwords before connecting to an operational or management network. Two or more-factor authentication should be required for administrators of each of the components in the storage network. Use Role-Based Access Control (RBAC) if it is available to manage storage network devices. RBAC provides much granularity in defining different administrative operations and associating these operations with different administrators. Administrators will only be able to perform those operations required to satisfy their job responsibilities. Access Control mechanisms should record login failures. Perform periodic audits to look for patterns of failed login events, since this might be evidence of attempted unauthorized access. Another best practice for access control is to close all terminal shell windows and log out of the administrative workstation immediately after performing administrative tasks on storage network devices. Also, after using the serial port on a storage network device to manage the device, log out of the device before physically unplugging the cable from the serial port. Following this practice will prevent unauthorized automatic serial port access. 2.5 Layer 2-3 Security Access to IP storage network devices should be restricted to authorized IP addresses and hostnames. This can be accomplished by using Access Control List (ACL) filters applied to layer 3 network devices such as IP routers. Physical separation or disconnection of networks as well as Virtual Local Area Networks (VLANs) should be used appropriately. Monitoring should also be performed to verify expected network traffic, and to detect unusual and anomalous network traffic. Active and passive techniques should be used. An example of an active technique is conducting a port scan of the network. Examples of passive techniques are running a network sniffer, viewing device log files, and viewing Address Resolution Protocol (ARP) table entries. Switch port security should be enabled on all interfaces of a LAN switch to limit access to only those devices listed as authorized devices. For guidance on securing LAN switches, refer to the Cisco IOS Switch Security Configuration Guide available on For guidance on securing IP routers, refer to the Router Security Configuration Guide available on as well. 4
7 2.6 Operating System and Application Security Best practices for operating system and application security should be followed. It is important to configure the operating system and application software so that it is in the most secure state. Ensure that all applicable devices, including management workstations, are kept current with virus scanner and anti-spyware software updates. Delete unnecessary application programs from systems in the storage architecture. It is possible that some application programs used during development of the product were mistakenly left in the product after sale. These programs can cause problems if later discovered to be accessible by unauthorized operators. Data security might be compromised if storage network device operating systems include debuggers. An operational storage network device operating system should never contain any debuggers. Steps should be taken to turn off or eliminate any debuggers present to avoid unauthorized reboots, denial of service, and unauthorized modification of data stored on the storage network. Verify that operating systems and application programs, including storage management applications, have current and stable security patches installed. Check bug tracking web sites regularly, since the quantity of new attacks is increasing and the time it takes for them to be automated and made publicly available is decreasing. If your applications are affected and a patch is unavailable, a decision should be made after performing a risk analysis to continue running unpatched or remove the application from the environment until a patch is available. On a similar note, only install software and firmware upgrades that have originated from a trusted source and have been verified on a non-production system. Periodically audit the storage network systems to verify that all software, firmware, and patches are at the expected version/release level. 2.7 Attack Detection and Prevention Mechanisms should be employed to detect and prevent: 1) attacks and 2) unnecessary traffic from entering the storage network. Logs are useful for detecting attacks. Logs should be maintained on all storage network devices and storage network management devices, and analyzed regularly. Logs should be sent to external devices rather than stored locally on the devices creating the logs to help prevent log modification by an attacker. Any abnormal activities in a log such as changes made by administrators at times when the real administrator was not actually present, deleted or appended logs with missing entries, or repeated failed login attempts are indications of potential hacking. Synchronization of time on network devices is important to detect attacks. Synchronize time on storage network devices using the Network Time Protocol (NTP) for ease of attack correlation and analysis. The NTP server might be located on the Internet or it might be on an internal Local Area Network (LAN). The more secure option is to source time locally OOB. Two more tools are useful for detecting and preventing attacks: Intrusion Detection Systems (IDS) and firewalls. IDS should be used to detect anomalies and known attacks. IDS can be either network-based (NIDS) or host-based (HIDS). Both should be used when a mediumhigh degree of assurance of detection is required. IDS should be deployed both on the operational end-user network and on the management network. Firewalls should be used to prevent malicious and unnecessary traffic from entering the storage architecture. 5
8 3. Network Attached Storage (NAS) Security Securing Network Attached Storage (NAS) involves employing Transmission Control Protocol/Internet Protocol (TCP/IP) security mechanisms, as well as employing additional mechanisms that are specific to NAS technologies and protocols. Two major NAS file system protocols exist, Common Internet File System (CIFS) and Network File System (NFS). Some NAS security mechanisms are common to both CIFS and NFS, while others are specific to either CIFS or NFS. The remainder of this section describes the best security practices for NAS. 3.1 Confidentiality and Integrity Confidentiality and integrity of all data and metadata (i.e. protocol header field information) is a security goal for the NAS environment and may be provided by the NAS device itself or by a third party device. Most NAS devices support IP Security (IPSec) to protect data in transit between a NAS client and a NAS device. Third party encryption devices may be used to protect data at rest. The best practice is to use IPSec encryption (Authentication Header (AH) + Encapsulating Security Payload (ESP)) between a NAS client and a third party encryption device. Also use the strongest available encryption on a third party device to encrypt the data in transit between the third party device and the NAS device as well as the data at rest on the NAS device. 3.2 Network Data Management Protocol (NDMP) If Network Data Management Protocol (NDMP) is used for network-based NAS backup, authentication should be required. Access control lists should restrict any NDMP traffic sent from unauthorized devices. NDMP communications should be logged. 3.3 Authentication and Access Control Authentication and access control can be provided via data segmentation. The two major file system protocols, CIFS and NFS, also have applicable authentication and access control mechanisms. These are described in the following sections Data Segmentation Two mechanisms that can be employed to provide access control to data residing on NAS devices are logical segmentation and physical segmentation. A Virtual Filer (vfiler) can be used to provide a low level of access control by logically segmenting a single NAS device into multiple NAS devices, comparable to what a VLAN does to a LAN. Environments that require a high level of access control should use physical segmentation rather than logical segmentation. 6
9 Separate NAS devices should be used for each group or level of security classification e.g. one NAS device for unclassified data, a separate NAS device for confidential data, and so on CIFS A NAS device running CIFS can be made more secure by employing New Technology Local Area Network Manager version 2 (NTLMv2) or Kerberos authentication mechanisms. For instance, NTLMv2 should be used for a medium level of authentication assurance, while Kerberos is most appropriate for environments where a high level of authentication assurance is required. Use mutual Kerberos authentication if possible, because it is the authentication of each device to the other, and this is more secure than one-way authentication (i.e. one device authenticates itself to the other device). Weak authentication mechanisms such as LAN Manager (LM) and NTLMv1 should always be disabled on all Windows domain controllers and clients. An IDS should be used to alert on LM and NTLMv1 to detect attempts to authenticate using a weaker form of authentication. If Kerberos is used, alerts should also be generated for NTLMv2 authentication attempts to indicate that NTLMv2 authentication was attempted rather than the stronger Kerberos authentication. Another CIFS NAS best practice is to restrict share permissions to specific users and groups. This provides a form of access control to NAS data NFS A NAS device running NFS can be made more secure by employing Kerberos authentication mechanisms. Use NAS client operating systems that support Kerberos for authentication. Establish privileged user accounts and associate them with specific IP addresses. Log and ignore requests from privileged users at unauthorized IP addresses. When a client makes a request to a NAS device from the root account, the device should treat the request as being from the nobody account. Use export options appropriately on all NAS devices to help ensure that data is only accessible to devices that are authorized to receive the data. Configure NAS devices to log and ignore showmount requests. If responses must be sent, create local hostname aliases and configure exports to those aliases to obscure the information an attacker can enumerate when making showmount requests. 3.4 Sample NAS Security Architecture A sample NAS architecture that implements security mechanisms is shown in Figure 1. Two NAS networks are shown: one classified and one unclassified. End-to-end IPSec encryption is used between the unclassified NAS device and its clients, as well as between the third party encryption device and clients of the classified NAS device. The third party encryption device encrypts data sent to the classified NAS device, and the data remains encrypted while stored on the classified NAS device. Kerberos is used for authentication of NAS clients to NAS devices. The Key Distribution Center (KDC) resides in the Demilitarized Zone (DMZ). Network Intrusion Detection Systems (NIDS) are strategically positioned between the router/firewall device and the Internet and end-user networks. A limited number of protocols are used to communicate with the management network. 7
10 Unclassified NAS Network IP Out-of-Band Management, Logging, & NTP Source Network SSH SSL SNMPv3 SYSLOG Logical Network NTP Connection Device End-to-End IPSec Encryption (encryption not shown but does occur within clouds) NAS Classified NAS Network NAS Encryption Device Kerberos 3 rd Party Encryption (e.g. AES) NIDS NIDS KDC DMZ Network End-User Network Internet Figure 1: NAS Architecture with Added Security 8
11 4. Storage Area Network (SAN) Security Many options exist for implementing SAN security. A number of SAN-specific security mechanisms should be integrated into the SAN environment to provide confidentiality, authentication, and access control. Following the recommendations outlined in this section will provide a reasonable level of security assurance for SAN architectures. 4.1 Confidentiality Confidentiality services help guarantee the privacy of data, by using advanced encryption techniques, to ensure only authorized individuals see the information. Confidentiality of data and metadata can be provided with a number of mechanisms. Equipment that supports the Fibre Channel Security Protocols (FC-SP) should be selected and properly configured for use throughout the SAN. FC-SP provides Fibre Channel frame confidentiality through the use of ESP encryption. In addition to FC-SP, encrypt inter-switch communications using a strong cryptographic algorithm. Enable and use protocols that provide strong cryptography for switch administration and management (e.g. SSH, SSL, SNMPv3) to protect network traffic that contains passwords. Data-at-rest on storage devices such as disks or tapes should be encrypted using a strong cryptographic algorithm. Encryption appliances are commercially available that perform this function. However, typically the encryption device does not encrypt data between the servers and the SAN switches, but rather between the switches and the storage devices. Ideally, encryption would occur at the server so that data is encrypted (i.e. confidentiality is maintained) from server to SAN switch to storage device (i.e. wherever it is in transit on the SAN) and when it is at rest on the storage devices. 4.2 Authentication Authentication can be provided in numerous ways. In order to limit the attacker s ability to enumerate the SAN, choose Fibre Channel switches that require authentication before allowing a connection to a management interface. Authentication should be used to prevent masquerading and Denial-of-Service (DoS) attacks. Switches connect to each other in a SAN via E-ports. Authentication should be performed between switches to prevent the loss of fabric information via an E-port connection to a rogue SAN switch. For architectures requiring the most secure level of security assurance, disable E-port replication (i.e. automatic transfer of fabric information to any connected switch). Any of the following authentication mechanisms may be present in a given piece of equipment. The most secure authentication features that are available should be used. The FC-SP standard mechanism for switches to authenticate to each other is the Diffie- Hellman Challenge Handshake Authentication Protocol (DH-CHAP). It must be implemented in FC-SP compliant implementations, and it must be configured to function properly within the 9
12 SAN architecture. SHA-1 is stronger than MD5, so SHA-1 should be chosen as the DH-CHAP hash algorithm. Additionally, whenever a DH-CHAP challenge is sent, ensure that it is unique. The Fibre Channel Authentication Protocol (FCAP) and Fibre Channel Password Authentication Protocol (FCPAP) are optional authentication mechanisms that are part of the FC-SP framework. FCAP is a digital certificate-based mechanism. FCPAP is a password-based mechanism. FCAP and FCPAP should be used when available. Vendors might choose to implement an authentication protocol that is not FC-SP compliant. For instance, Brocade offers a proprietary authentication protocol in its secure Fabric OS known as Switch Link Authentication Protocol (SLAP). SLAP is a digital certificate-based mechanism. Vendor proprietary authentication mechanisms should be used when no alternative FC-SP mechanisms are available. If FC-SP and proprietary mechanisms are available, implement the strongest mechanisms. Authentication of administrative traffic to management ports on SAN equipment is also important. If possible, management should be done out-of-band using an IP management network that has no connectivity to the Internet or other networks. However, if this is not feasible, use the Common Transport (CT) Authentication protocol (which is part of FC-SP) to authenticate in-band (Fibre Channel) network management communications. 4.3 Access Control A variety of mechanisms exist for providing and supporting access control in SANs. Zoning, LUN masking, and the way in which nodes are identified can all be used to provide access control. Proprietary mechanisms such as Cisco Virtual SANs can be used as well. Other features that should either be used or disabled to provide access control are cut-through switching, physical port locking, and port type locking. Name servers should control access to their information. Each of these access control mechanisms will be described in turn Zoning There are a number of SAN zoning mechanisms available to provide access control for data. Some are more secure than others: 1) Port-based hard zoning, 2) port-based soft zoning, 3) port WWN-based hard zoning, 4) port WWN-based soft zoning, 5) node WWN-based hard zoning, and 6) node WWN-based soft zoning. Port-based hard zoning should be used to achieve a high level of access control assurance. Port-based hard zoning counters zone hopping attacks, WWN spoofing, and LUN masking attacks. Port WWN-based hard zoning should be used to achieve a medium-high level of access control assurance. Node WWN-based hard zoning, port-based soft zoning, or port WWN-based soft zoning should be used to provide a medium level of access control assurance. Node WWN-based soft zoning is an insecure solution that should not be used. Zoning changes should be forced to take effect immediately LUN Masking Logical Unit Number (LUN) masking is used to specify the visibility of logical units of data to servers. It should be implemented properly to help prevent LUN masking attacks in which attackers would access data that they should not be able to access. The masking 10
13 mechanism can be implemented at different points in the SAN. Implement LUN masking on the storage devices for the highest level of security assurance. Implement LUN masking on SAN switches for a medium level of security assurance. Do not configure LUN masking at the servers since this is the least secure location for implementing LUN masking. LUN masking software is more vulnerable to attack if it is located on servers rather than the switches or storage devices, since the servers are probably more accessible to attackers than switches and storage devices. The more accessible the LUN masking mechanism is on the network, the more vulnerable the SAN is to attack Node Identification A network node is any entity that is connected to the network and is addressable. There are different ways to address network nodes. Thus, there are different ways to identify nodes, particularly when implementing LUN masking or a zoning mechanism that is WWN-based. These different forms of node identification provide different levels of security. Use World Wide Port Name (WWPN) + World Wide Node Name (WWNN) for authorization when possible to identify nodes for LUN masking and WWN zoning. This is the most secure form of node identification and will help to prevent LUN masking attacks. Port WWN alone will provide less security assurance, if you can verify with the vendor or by some other means that the software only checks port WWN rather than checking either port or node WWN. Node WWN alone should never be used since it is easily spoofed and therefore insecure Proprietary Access Control Cisco Virtual SAN (VSAN) Use proprietary access controls when they are available to help secure the SAN, e.g. Cisco Virtual SANs (VSANs), which are similar to VLANs. When properly configured, VSANs can help mitigate certain attacks, including zone hopping, WWN spoofing, and LUN masking attacks. Care should be taken when determining what type of VSAN to implement. Static VSANs are configured according to physical switch port numbers, and are more secure than dynamic VSANs, which are configured based on port WWN or node WWN. Avoid dynamic VSANs if possible, but if they must be used, prefer port WWN-based dynamic VSANs Cut-through Switching, Physical Port Locking, and Port Type Locking Access Control can also be provided by disabling or using different SAN switch features such as cut-through switching, physical port locking, and port type locking. These features specify both physical switch port and traffic switching controls. Cut-through switching is a method of switching traffic that offers performance gains, but at the cost of reduced security. If cut-through switching is an option on a SAN switch, disable it. Physical port locking, also referred to as port binding, is similar to port security on Cisco LAN switches, and should be used when available. It associates a particular WWN with a specific physical port. It should be used for all connected ports on a SAN switch (i.e. not just some connected ports). Port type locking allows the SAN administrator to specify what type of device (e.g. switch, HBA) should be connected to each port on the switch by locking ports to port types (e.g. 11
14 E-port, F-port). All major Fibre Channel switch vendors support port type locking, so it should be used to help mitigate E-port replication attacks Name Server Access Control techniques apply to name server practices as well. Each SAN switch has a name server, and name server information is synchronized among the switches in a SAN fabric. The purpose of the name server is to provide SAN nodes with addresses of other nodes within the fabric. Name server replies should only be sent to requests from authorized nodes in a given zone. This will help to prevent enumeration, name server corruption, and zone hopping attacks. 4.4 Sample SAN Security Architecture A SAN architecture that implements security mechanisms is shown in Figure 2. Management is performed using secure protocols. A router with a three-legged firewall is positioned between the end-user network, the DMZ network, and the Internet. NIDS are strategically positioned around the router/firewall. SAN switch-to-switch communication is authenticated using DH-CHAP and encrypted using an appropriate algorithm. Port WWN + Node WWN based LUN masking is performed at the two disk storage devices. Backups are performed to a tape device. Confidentiality of data in transit between a Fibre Channel switch and connected storage devices is protected with encryption performed by an encryption device connected to a port on the Fibre Channel switch. Only one encryption device is shown in the diagram due to space limitations, but each switch should have an associated encryption device. Data is also replicated to a disaster recovery network physically located off-site. The data is sent to the disaster recovery site encrypted as well. The key used to decrypt this data at the disaster recovery site should be stored in a secure location off of the main SAN site in case a disaster affects the SAN. 12
15 Ethernet connection Fiber connection Encryption used for all communications on link End-User Network NIDS FC HBA FC HBA Disaster Recovery Network NIDS DMZ Network Internet DH-CHAP Encryption Device WWPN + WWNN LUN Masking WWPN + WWNN LUN Masking SSH SSL NTP SNMPv3 SYSLOG IP Out-of-Band Management, Logging, & NTP Source Network Figure 2: SAN Architecture with Added Security 13
16 5. Internet Small Computer Systems Interface (iscsi) Security Securing the Internet Small Computer Systems Interface (iscsi) environment requires proper employment of all general storage network best practices, some NAS and SAN security mechanisms (e.g. zoning, LUN masking), and other security mechanisms specific to the iscsi environment. Integrity, confidentiality, and authentication can be achieved by using the following mechanisms. By implementing these mechanisms, a reasonable level of security assurance can be gained. 5.1 Confidentiality and Integrity Confidentiality and integrity can be provided to the iscsi environment by the use of two mechanisms: IPSec ESP and Cyclic Redundancy Check (CRC) checksums. Use IPSec ESP between iscsi devices that communicate via IP to provide data confidentiality. Use Cyclic Redundancy Check (CRC) checksums on each IP packet to provide integrity assurance. The packet recipient calculates a checksum on the received packet and compares it to the checksum that was sent with the packet. Any difference in the compared values indicates a lack of integrity. Enable CRC checksums to cover the entire packet, both the header and the data. 5.2 Authentication Challenge Handshake Authentication Protocol (CHAP) is a protocol that will allow an iscsi device to authenticate to another iscsi device. Although the CHAP protocol has weaknesses, some implementations of CHAP are more secure than others. A best practice is to choose devices that implement a relatively secure implementation of CHAP and enable it for use in the iscsi architecture. The following items should be considered before purchasing a CHAP solution to ensure that the implementation is relatively secure. CHAP challenges should not be repeated. A unique challenge should be sent each time. When an iscsi target storage device sends a challenge, if it receives the same challenge back before getting a correct response, it should ignore and log the challenge. CHAP can be implemented as either one-way CHAP or as mutual CHAP. Using an iscsi client and a storage device as an example, one-way CHAP only authenticates the iscsi client to the storage device. Mutual CHAP authenticates an iscsi client to a storage device as well as authenticates the storage device to the iscsi client. Use mutual CHAP authentication for a medium-high level of authentication assurance. One-way CHAP authentication provides a lower level of authentication assurance. 5.3 Internet Storage Name Server (isns) Best Practices An iscsi environment might optionally employ one or more Internet Storage Name Servers (isns). If it does, they should be used as security management and security policy distribution devices between clients and storage devices. Multiple isns discovery domains 14
17 should be created, and whenever a new node connects to the network, it should be placed in an untrusted domain until security mechanisms are applied to the new node. isns communications should be secured. The confidentiality and integrity of unicast messages should be protected using IPSec. Broadcast and multicast communications should be authenticated with a Public Key Infrastructure (PKI). 5.4 Sample iscsi Security Architecture An iscsi architecture that incorporates security mechanisms is shown in Figure 3. Secure protocols are used for management of iscsi network devices. A router with a threelegged firewall is positioned between the end-user network, the DMZ network, and the Internet. NIDS are strategically positioned around the router/firewall. CHAP is used for mutual authentication between iscsi initiators (clients) and iscsi storage router devices. IPSec ESP is used between iscsi initiators and storage routers to maintain a level of data confidentiality. Ethernet connection Fiber connection CHAP-authenticated connection IPSec encryption used for all communications on link End-User Network NIDS iscsi Initiator iscsi Initiator NIDS DMZ Network iscsi Storage Router FC Storage Devices Internet SSH SSL NTP SNMPv3 SYSLOG IP Out-of-Band Management, Logging, & NTP Source Network Figure 3: iscsi Architecture with Added Security 15
18 6. Conclusions Best practices for securing storage networks were presented in this document. General storage network security was discussed, followed by a presentation of best practices for three distinct storage technologies: Network Attached Storage (NAS), Storage Area Networks (SAN), and Internet Small Computer Systems Interface (iscsi). Diagrams were offered that show each of the three types of storage networks with security mechanisms incorporated into the networks. The best practices outlined in this paper will provide administrators with the information they need to strengthen their storage networks. Using mechanisms that provide authentication, access control, confidentiality, and data integrity will make it harder for attackers to use malicious code to take advantage of functionality errors or protocol faults within the storage networks. Implementing the best practices described in this paper will help protect the content and function of NAS, SAN and iscsi storage networks and provide a sufficient level of information assurance for most storage architectures. 16
19 Appendix 1 - Acronyms ACL Access Control List AES Advanced Encryption Standard AH Authentication Header ARP Address Resolution Protocol CHAP Challenge Handshake Authentication Protocol CIFS Common Internet File System CRC Cyclic Redundancy Check CT Common Transport DES Data Encryption Standard DH-CHAP Diffie-Hellman Challenge Handshake Authentication Protocol DMZ Demilitarized Zone DoS Denial-of-Service EAL Evaluation Assurance Level ESP Encapsulating Security Payload FC-SP Fibre Channel Security Protocols FCAP Fibre Channel Authentication Protocol FCP Fibre Channel Protocol FCPAP Fibre Channel Password Authentication Protocol FIPS Federal Information Processing Standards FTP File Transfer Protocol HBA Host Bus Adapter HIDS Host-based Intrusion Detection System HTTP Hypertext Transfer Protocol IDS Intrusion Detection System IP Internet Protocol IPSec IP Security iscsi Internet Small Computer Systems Interface isns Internet Storage Name Server KDC Key Distribution Center LAN Local Area Network LM LAN Manager LUN Logical Unit Number MAC Media Access Control MD5 Message Digest 5 NAS Network Attached Storage NDMP Network Data Management Protocol NFS Network File System NIDS Network-based Intrusion Detection System NTLMv1 New Technology Local Area Network Manager version 1 NTLMv2 New Technology Local Area Network Manager version 2 NTP Network Time Protocol OOB Out-of-band 17
20 OPSEC Operations Security OS Operating System PKI Public Key Infrastructure RBAC Role-Based Access Control RSH Remote Shell SAN Storage Area Network SHA-1 Secure Hash Algorithm 1 SLAP Switch Link Authentication Protocol SNMP Simple Network Management Protocol SNMPv1 - Simple Network Management Protocol version 1 SNMPv2 - Simple Network Management Protocol version 2 SNMPv3 - Simple Network Management Protocol version 3 SSH Secure Shell SSL Secure Sockets Layer STIG Security Technical Implementation Guide TCP Transmission Control Protocol UPS Uninterruptible Power Supply vfiler Virtual Filer VLAN Virtual Local Area Network VSAN Virtual Storage Area Network WWN World Wide Name WWNN World Wide Node Name WWPN World Wide Port Name 18
21 Appendix 2 General Storage Network Best Practices Summary The following table is a quick reference that summarizes the general storage network best practices covered in this document. Section numbers are used to reference each best practice found in the table. Each best practice is associated with the primary security service(s) that it provides. Security services include Confidentiality (C), Integrity (I), Availability (Avail), Access Control (AC), Authentication (Auth), and Attack Detection (AD). In cases where the best practice (see table) contains a numbered list of items, the best practices are listed in order from most secure to least secure. General Storage Network Best Practice Security Services Provided (2.1) Physical Security AC, Avail, C, I (2.1) Disable unnecessary ports (physical and AC, Avail logical) and protocols on all storage network devices and management workstations (2.1) OPSEC C (2.1) Maintain business continuity and disaster Avail recovery plans (2.1) Perform backups and securely store backup Avail media; maintain local and offsite copies of operating systems, configurations, application software, and data (2.2) Maintain a storage security policy and related AC, AD, Auth, Avail, C, I documentation (2.2) Perform a risk analysis before deploying new AC, C, I devices to reassess protection levels (2.2) Use devices that have achieved the highest AC, Auth, Avail, C, I EAL and FIPS certification levels (2.3) Use UPS, redundancy, and failover Avail mechanisms (2.3) Use the strongest encryption and hash C, I algorithms available throughout the storage architecture (2.3) Encrypt administration and management C communications by using protocols that support cryptography (e.g. SSL, SSH, SNMPv3) (2.4) Appropriately restrict SNMP and AC administrative traffic via access lists (2.4) Use SNMPv3 over v1 or v2 if using SNMP AC, C, I (2.4) Log SNMP communications AD 19
22 (2.4) Configure strong, unique passwords and AC strong, unique SNMP community strings, and change passwords regularly (2.4) Use two or more factor authentication for Auth administrators (2.4) AC, Avail, I 1. Manage devices locally over serial port 2. Manage devices OOB remotely using strong encryption (e.g. SSL, SSH) 3. Manage devices in-band remotely using strong encryption (e.g. SSL, SSH) (2.4) Disable insecure protocols such as TELNET, AC FTP, RSH, and HTTP (2.4) Use RBAC AC (2.4) Close all terminal shell windows and log off of AC the administrative workstation immediately after performing administrative tasks on SAN devices (2.4) After using the serial port on a SAN device to AC manage the device, log out of the SAN device before physically unplugging the cable from the serial port (2.5) Apply layer two/three security mechanisms AC, Avail, C, I (e.g. ACLs, VLANs) (2.5) Monitor for IP spoofing AD (2.6) Keep current with virus scanner and antispyware updates, and delete unnecessary programs C, I (2.6) Avail, C 1. Remove debuggers from operational storage network devices 2. Disable debuggers resident on operational storage network devices (2.6) Keep current with patches, and verify patches I on a non-operational network before installing them on the operational network (2.6) Obtain software/firmware upgrades from I trusted sources, and perform periodic audit (2.7) Log appropriate network and system activities, AD, I and write logs to external devices (2.7) Synchronize time using a local OOB time AD source (2.7) Deploy NIDS and HIDS AD (2.7) Deploy firewalls AC 20
23 Appendix 3 NAS Best Practices Summary The following table is a quick reference that summarizes the NAS best practices covered in this document. Section numbers are used to reference each best practice found in the table. Each best practice is associated with the primary security service(s) that it provides. Security services include Confidentiality (C), Integrity (I), Availability (Avail), Access Control (AC), Authentication (Auth), and Attack Detection (AD). In cases where the NAS best practice (see table) contains a numbered list of items, the best practices are listed in order from most secure to least secure. NAS Best Practice Security Services Provided (3.1) Employ IPSec (ESP + AH) between NAS device C, I and each connecting client (3.1) Use an in-line encryption device to encrypt data C destined for NAS (and tape) devices (3.2) Require authentication if using NDMP Auth (3.2) Filter unauthorized devices AC (3.3.1) AC 1. Use separate NAS devices on physically separate networks for physical segmentation 2. Use a Virtual Filer (vfiler) for logical segmentation (3.3.2) If CIFS is used: 1. Deploy Kerberos; require mutual Kerberos authentication; disable LM, and NTLMv1; monitor for LM, NTLMv1, NTLMv2 traffic 2. Use NTLMv2; disable and monitor for LM, NTLMv1 (3.3.2) If CIFS is used: Restrict share permissions by users and groups (3.3.3) If NFS is used: Deploy Kerberos; require mutual Kerberos authentication (3.3.3) If NFS is used: Log and ignore requests from privileged users originating from unexpected IP addresses (3.3.3) If NFS is used: Treat root requests as being from nobody (3.3.3) If NFS is used: Use export options appropriately AD, Auth AC, C Auth AC, C AC, C AC, C 21
24 (3.3.3) If NFS is used: 1. Log and ignore showmount requests to NAS devices 2. Create local hostname aliases; configure exports to aliases only AC, C 22
25 Appendix 4 SAN Best Practices Summary The following table is a quick reference that summarizes each of the SAN best practices covered in this document. Section numbers are used to reference each best practice found in the table. Each best practice is associated with the primary security service(s) that it provides. Security services include Confidentiality (C), Integrity (I), Availability (Avail), Access Control (AC), Authentication (Auth), and Attack Detection (AD). In cases where the SAN best practice (see table) contains a numbered list of items, the best practices are listed in order from most secure to least secure. SAN Best Practice Security Services Provided (4.1) Implement FC-SP ESP C (4.1) Encrypt inter-switch communications C (4.1) Encrypt data-at-rest on storage devices by using an C encryption appliance (4.2) Choose FC switches that require authentication Auth before allowing connections to FC switch management interfaces (4.2) Disable E-port replication C (4.2) Perform authentication between switches using Auth DH-CHAP (FC-SP standard means of switch authentication) (4.2) Ensure unique DH-CHAP challenges are sent each Auth time (4.2) Use FCAP Auth (4.2) Use FCPAP Auth (4.2) Use proprietary authentication protocols such as Auth SLAP (4.2) AC, Avail, C, I 1. Perform OOB management from a network that is not connected to any other network 2. Perform in-band Fibre Channel management using CT authentication (4.3.1) Implement zones in the most secure way: 1. Port-based hard zoning 2. Port WWN-based hard zoning 3. Node WWN-based hard zoning OR port-based soft zoning OR port WWN-based soft zoning (4.3.1) Push zoning changes immediately AC, I AC 23
26 (4.3.2) Implement LUN masking on: AC, C 1. Storage devices 2. SAN switches (4.3.3) Identify nodes for LUN masking and WWN AC Zoning: 1. Use WWPN + WWNN 2. Use WWPN only (4.3.4) Use proprietary access controls such as VSANs: AC 1. Static VSANs 2. Port WWN-based dynamic VSANs (4.3.5) Disable cut-through switching I (4.3.5) Use physical port locking, also known as port AC binding, for all connected ports on SAN switches (4.3.5) Use port type locking to specify the type of AC, C device that can be connected to each specific port on a SAN switch (4.3.6) Do not reply to SAN switch Name Server C requests from unauthorized nodes 24
27 Appendix 5 iscsi Best Practices Summary The following table is a quick reference that summarizes each of the iscsi best practices covered in this document. Section numbers are used to reference each best practice found in the table. Each best practice is associated with the primary security service(s) that it provides. Security services include Confidentiality (C), Integrity (I), Availability (Avail), Access Control (AC), Authentication (Auth), and Attack Detection (AD). In cases where the iscsi best practice (see table) contains a numbered list of items, the best practices are listed in order from most secure to least secure. iscsi Best Practice Security Services Provided (5.1) Use CRC Checksums I (5.1) Use IPSec ESP between iscsi devices C (5.2) Acquire relatively secure CHAP implementations Auth and configure CHAP securely; CHAP challenges should not be repeated; a unique challenge should be sent each time; a challenge received that matches a challenge sent (before receiving a response) should be ignored and logged (5.2) 1. Use mutual CHAP authentication between iscsi devices 2. Use non-mutual CHAP authentication (5.3) If using isns: Use the isns server as a security management and policy distribution service (5.3) If using isns: Place new nodes in an untrusted domain until security mechanisms are applied (5.3) If using isns: Protect unicast messages with IPSec ESP (5.3) If using isns: Authenticate broadcast and multicast messages with a PKI Auth AC, C, I AC C, I Auth 25
28 Appendix 6 - References [1] Beauchamp and Judd, Kuo (contributor) Building SANs with Brocade Fabric Switches: How to Design, Implement, and Maintain Storage Area Networks (SANs) with Brocade Fabric Switches. Syngress Publishing, Inc. [2] Farley, M Storage Networking Fundamentals: An Introduction to Storage Devices, Subsystems, Applications, Management, and File Systems. Cisco Systems, Inc. (Cisco Press) [3] Dwivedi, H Securing Storage: A Practical Guide to SAN and NAS Security. Pearson Education, Inc. (Addison-Wesley) [4] Chirillo and Blaul Storage Security: Protecting SANs, NAS, and DAS. Wiley Publishing, Inc. [5] Internet Web site: [6] Internet Web site: [7] Internet Web Site: July2004.pdf [8] Internet Web Site: [9] Storage Networking Industry Association Audit Logging for Storage: A SNIA Security White Paper. [10] Internet Web Site: [11] Internet Web Site: [12] Cisco Storage Networking Fundamentals for the End User, Student Guide, Version 2.0 [13] SNIA IP Storage Forum End User Education CD-ROM [14] SNIA Resources CD-ROM April 2007 [15] Storage Networking Industry Association The Dictionary of Storage Networking Terminology 26
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
IT Security Standard: Network Device Configuration and Management
IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Data-at-Rest Encryption Addresses SAN Security Requirements
Data-at-Rest Encryption Addresses SAN Security Requirements QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs Key Findings SAN security via encryption is necessary for protecting
Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems
Hitachi Virtual Storage Platform Family: Security Overview By Hitachi Data Systems April 2015 Contents Executive Summary... 3 Hitachi Virtual Storage Platform G1000 Security Components... 4 Privileged
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Storage Security. Presenter: Himanshu Dwivedi. BlackHat 2003
Storage Security Presenter: Himanshu Dwivedi BlackHat 2003 Agenda Introduction Fibre Channel Overview Attacks on Fibre Channel SANs Conclusion Introduction Overview What are SANs? What is Storage Security?
CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security (640-554)
CCNA Security Öngereksinimler: CCNA http://www.cliguru.com/ccna Kurs Tanımı: CCNA Security network'ün temellerini anlamış olan katılımcılara network güvenliği hakkında temel bilgi sağlamaya yönelik hazırlanmış
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Evaluation of Storage Area Network (SAN) Security and Performance
MASTER THESIS Evaluation of Storage Area Network (SAN) Security and Performance Master Thesis in Computer Network Engineering November 2013 Author: Siavash Hajirostam Supervisor: Tony Larsson Examiner:
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.
CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
VMware ESX Server 3 Configuration Guide
Date: 03/03/08 VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate National Security Agency 9800
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Storage Area Networks Security Protocols and Mechanisms
SAN Security Protocols and Mechanisms 1 Storage Area Networks Security Protocols and Mechanisms Whitepaper for information security practitioners Franjo Majstor [email protected] April 2004 Ver v1.0 SAN
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Domain 6.0: Network Security
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 6.0: Network Security Chapter 6 6.1 Explain the function of hardware and software security devices Network based firewall, Host based firewall
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title
Introduction The CCNA Security IINS exam topics have been refreshed from version 2.0 to version 3.0. This document will highlight exam topic changes between the current 640-554 IINS exam and the new 210-260
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Storage Networking Foundations Certification Workshop
Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
8Gb Delivers Enhanced Storage Area Network (SAN) Data Security
W H I T E P a pe r Third party information brought to you courtesy of Dell. 8Gb Delivers Enhanced Storage Area Network (SAN) Data Security QLogic s Better 8Gb is Security Optimized Expanded Access Control
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
Cisco Virtual SAN Advantages and Use Cases
Cisco Virtual SAN Advantages and Use Cases The Challenge Application data is accumulating at an increasingly fast pace, and to control costs, IT departments are looking at the benefits of economies of
REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance
REDSEAL NETWORKS SOLUTION BRIEF Proactive Network Intelligence Solutions For PCI DSS Compliance Overview PCI DSS has become a global requirement for all entities handling cardholder data. A company processing,
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
The Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
