Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server



Similar documents
Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12

Advanced Systems Management with Machinery

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12.

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Operating System Security Hardening for SAP HANA

Implementing Linux Authentication and Authorisation Using SSSD

We are watching SUSE

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256

Challenges Implementing a Generic Backup-Restore API for Linux

Wicked A Network Manager Olaf Kirch

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

kgraft Live patching of the Linux kernel

SUSE Linux Enterprise 12 Security Certifications

Configuration Management in SUSE Manager 3

Using btrfs Snapshots for Full System Rollback

SUSE Linux uutuudet - kuulumiset SUSECon:sta

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris

DevOps and SUSE From check-in to deployment

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management

How To Make A Cloud Work For You

Wicked Trip into Wicked Network Management

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications

SUSE Customer Center Roadmap

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen

Deploying Hadoop with Manager

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales

High Availability Storage

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales gnyers@suse.com

Btrfs and Rollback How It Works and How to Avoid Pitfalls

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect

Oracle Products on SUSE Linux Enterprise Server 11

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School

Of Pets and Cattle and Hearts

How SUSE Is Helping You Rock The Public Cloud

Software Defined Everything

SUSE Cloud 5 Private Cloud based on OpenStack

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com

TUT8155 Best Practices: Linux High Availability with VMware Virtual Machines

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs

Novell Collaboration Vibe OnPrem

Linux w chmurze publicznej SUSE na platformie Microsoft Azure

1 Scope of Assessment

Leveraging Wikis to Manage SCP Documentation TWiki Novell Technical Services

NIST ITL July 2012 CA Compromise

Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension

Apache LDAP Configuration

How To Secure An Rsa Authentication Agent

SUSE Virtualization Technologies Roadmap

Introducing Director 11

Cisco Secure PIX Firewall with Two Routers Configuration Example

NetIQ Sentinel Quick Start Guide

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

SUSE Linux Enterprise Server 11 SP2 for UEFI Clients

SUSE Virtualization Technologies Roadmap

RedHat (RHEL) System Administration Course Summary

Novell Identity Manager Resource Kit

Yosemite Server Backup Installation Guide

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

TUT19344 Managing RH/CentOS with SUSE Manager

RSA Security Analytics. S4 Broker Setup Guide

ENTERPRISE LINUX SYSTEM ADMINISTRATION

How SUSE Manager Can Help You Achieve Regulatory Compliance

This document has been provided by the International Center for Not-for-Profit Law (ICNL).

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Open Enterprise Server Product Roadmap Presentation

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

ZYPP common package and patch management for SUSE Linux. Duncan Mac-Vicar P. Software Engineer, YaST

Secure Web Gateway 11.7 Upgrade Release Notes

Linux MPS Firewall Supplement

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

UTM Quick Installation Guide

Firewall implementation and testing

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2

Dell One Identity Cloud Access Manager Installation Guide

Nixu SNS Security White Paper May 2007 Version 1.2

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

Support Notes for SUSE LINUX Enterprise Server 9 Service Pack 3 for the Intel Itanium 2 Processor Family

OVERVIEW. DIGIPASS Authentication for Office 365

Abstract. Microsoft Corporation Published: November 2011

Boundary Encryption.cloud Deployment Process Overview

Transcription:

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Marcus Meissner Software Engineer SUSE Craig Gardner Software Engineer SUSE Roman Drahtmueller Software Engineer SUSE

Overview What? and Why? Architecture Dive: Inspection Tools 2

What? and Why? What Should Security Be?

What is Security? Good software......does what you expect it to do, and does it well. Secure software......is good software that does nothing else. 4

What to Do? Software contains errors Malfunctions Crashes Downtime Security Vulnerabilities Data loss and disclosure, identity theft, system abuse, privilege transition Apply Maintenance Updates 5

A Closer Look Administration Purpose, responsibilities, mandates, team play Infrastructure Network and network boundaries, services Security Zones Assets and protection, domains, domain transitions Systems Deployment, installation, configuration (hardening), monitoring, maintenance, auditing 6

A Closer Look Administration Purpose, responsibilities, mandates, team play Infrastructure Network and network boundaries, services Security Zones Assets and protection, domains, domain transitions Systems Deployment, installation, configuration (hardening), monitoring, maintenance, auditing 7

Inspection, Configuration, Hardening

DMZ 0 Inner Networks DMZ 1 Shuttle Networks Admin Network 9

YaST Security Center

11

What Local Security Does in the Background Run another YaSTmodule Change settings in files in /etc/sysconfig Modify configuration files directly 12

Architecture and Design

Human Schematical Overview: O/S Kernel + Userland system calls device files ext3 VFS reiserfs proc, sys vfat NFS (mount table) sd sg SCSI SCSI aic7xxx KDE TCP ICMP UDP IP eth0 opp0 BT USB Serial PCI User-land processes Kernel-land drivers, kernel threads Libraries Shell Physics/Electronics 14

Inspection Approach your system as if you were an attacker: network ports services processes files kernel 15

Network Interface addresses: all interfaces enabled and conn.? Routing setup: IP-forwarding on/off? Netfilter rules: active, any? maintain ARP table records Other tweakables: txqueuelen, mtu ICMP replies, ICMP redirects ECN slow-start 16

Ports port scan: Open TCP and UDP sockets nmap -ss -v -O ip.address.on.network Compare to output of netstat -anpl Discrepancies...? (Not all services are userland process bound! (knfsd)) Watch out for UDP sockets! 17

Services Disable all services that are not needed, permanently Remove the runlevel symlinks (insserv -r <servicename>) Kill the servers (rcapache2 stop) Verify if they the services are really dead! Remove the packages from the system? 18

Processes Get to know all processes on your system in person... ps faux rpm -qfi /usr/sbin/nscd...and deactivate whatever is not needed running. 19

Files Permissions: /etc/permissions* from /etc/sysconfig/security Use chkstat -set <permissions file> or SuSEconfig find / /usr... -mount -type f \( -perm +2000 -o -perm +4000 \) -ls Integrity measures: AIDE, RPM maintain offsite RPM database backup for rpm -Va maintain offsite AIDE database backup Mount options: /etc/fstab, /proc/mounts 20

Kernel: Use AppArmor! Example profile: dhcp daemon #include <tunables/global> /usr/sbin/dhcpd { #include <abstractions/base> #include <abstractions/nameservice> capability dac_override, capability net_bind_service, capability net_raw, capability setgid, capability setuid, capability sys_chroot, /db/dhcpd.leases* lrw, /etc/dhcpd.conf r, /etc/hosts.allow r, /etc/hosts.deny r, /usr/sbin/dhcpd rmix, /var/lib/dhcp/dhcpd.leases* rwl, /var/lib/dhcp/etc/dhcpd.conf r, /var/run/dhcpd.pid wl, } 21

Tools

Tools The YaST Security Center The YaST AppArmor profile generator Integrity: AIDE and RPM Port Scanner: nmap Vulnerability scanner: openscap + OVAL 23

More Tools, More Considerations System Monitoring: Nagios, Ganglia Syslog Monitoring: logwatch, Sentinel Vulnerability scanner: openvas 24

Corporate Headquarters Maxfeldstrasse 5 90409 Nuremberg Germany +49 911 740 53 0 (Worldwide) www.suse.com Join us on: www.opensuse.org 25

Unpublished Work of SUSE. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE. Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for SUSE products remains at the sole discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.