Introduction to Computer Security



Similar documents
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

Computer Security: Principles and Practice

Windows security for n00bs part 1 Security architecture & Access Control

SECURITY SUBSYSTEM IN WINDOWS

Windows Security Environment

Windows servers. NT networks

Objectives I. IY5512 Computer Security. Agenda. Objectives II. Chris Mitchell. Final part of the course covers:

Securing. Active. Directory. Your. Five Key Lessons to. Chapters. Sponsored by: 1. Perform a Self-Audit

Windows Server 2008/2012 Server Hardening

Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall Lake

Windows Advanced Audit Policy Configuration

BMC Performance Manager Windows Security White Paper DCOM / WMI

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

About Microsoft Windows Server 2003

SIEMENS. Sven Lehmberg. ZT IK 3, Siemens CERT. Siemens AG 2000 Siemens CERT Team / 1

Windows Operating Systems. Basic Security

Web. Security Options Comparison

[MS-GPAC]: Group Policy: Audit Configuration Extension

WINDOWS 2000 Training Division, NIC

Session 17 Windows 7 Professional DNS & Active Directory(Part 2)

The Institute of Internal Auditors Detroit Chapter Presents

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

SQL Server Hardening

Configuring and Administering Windows 7

A Survey of Access Control Policies

Windows Log Monitoring Best Practices for Security and Compliance

Course 50322B: Configuring and Administering Windows 7

Windows NT Server Operating System Security Features Carol A. Siegel Payoff

70-685: Enterprise Desktop Support Technician

Chapter 15 Windows Operating Systems

Windows Server 2003 Active Directory MST 887. Course Outline

Understand Troubleshooting Methodology

Windows 7, Enterprise Desktop Support Technician

Directory and File Transfer Services. Chapter 7

Admin Report Kit for Active Directory

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Agency Pre Migration Tasks

ILTA HANDS ON Securing Windows 7

Remote Administration

Product Specification

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices Edition Don Jones

SHARING FILE SYSTEM RESOURCES

Microsoft Baseline Security Analyzer

Security Options... 1

Networking Best Practices Guide. Version 6.5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Introduction to Computer Security

The Win32 Network Management APIs

Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Guide to Securing Microsoft Windows 2000 Active Directory

TESTBED. SekChek for Windows Security Report. System: PUFFADDER (Snake.com) 10 November SekChek IPS

Unit 11: Installing, Configuring and Administering Microsoft Windows Professional

Defense Security Service Office of the Designated Approving Authority

CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS

MCSA Security + Certification Program

Objectives. At the end of this chapter students should be able to:

CIS433/533 - Computer and Network Security Operating System Security

Timbuktu Pro for Windows, version 8

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

CIS 551 / TCOM 401 Computer and Network Security

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

AT&T Global Network Client Domain Logon Guide. Version 9.6

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains

Windows 7, Enterprise Desktop Support Technician

[MS-GPAC]: Group Policy: Audit Configuration Extension

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

NetWrix USB Blocker. Version 3.6 Administrator Guide

Securing Active Directory Presented by Michael Ivy

WHITE PAPER. Understanding Windows & UNIX File Permissions on GuardianOS

Windows Server 2008 Active Directory Resource Kit

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v

Data Stored on a Windows Server Connected to a Network

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

Access Control Lists in Linux & Windows

MCSE TestPrep: Windows NT Server 4, Second Edition Managing Resources

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

Windows 7. Qing Liu Michael Stevens

EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Windows Server 2003 default services

How the Active Directory Installation Wizard Works

Transcription:

Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science

Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and TCP/IP Windows 2000: Active Directory, Kerberos, security architecture. Server 2003: security policies, LAN and wireless security Vista (2007): no admin-by-default, firewall, DEP, ASLR 64-bit versions (Vista+): mandatory kernel code signing

Architecture of modern Windows OS

Security components of Windows OS Kernel mode: Security Reference Monitor: ACL verification User mode: Log-on process (winlogon): user logon Local Security Authority (LSA): password verification and change, access tokens, audit logs (MS04-11 buffer overflow: Sasser worm!) Security Accounts Manager (SAM): accounts database, password encryption User Account Control (UAC, Vista): enforcement of limited user privileges

Windows registry A hierarchical database containing critical system information Key-value pairs, subkeys, 11 values types A registry hive is a group of keys, subkeys, and values Security-related registry hives: HKEY_LOCAL_MACHINE\SAM: SAM database HKEY_LOCAL_MACHINE\Security: security logs, etc HKEY_LOCAL_MACHINE\Software: paths to programs! Security risks: manipulated registry entries missing security-related registry keys

Windows domains A domain is a collection of machines sharing user accounts and security policies. Domain authentication is carried out by a domain controller (DC). To avoid a single point of failure, a DC may be replicated

Active directory Active directory introduced in Windows 2000 is an LDAP-like directory service for organization of system resources: Users and groups Security credentials and certificates System resources (desktops, servers, printers) Security policies DNS service Trust management

Active Directory structure

Access control in Windows Access control is applied to objects: files, registry keys and hives, Active Directory objects. More than just access control on files! Various means exist for expressing security policies: groups roles ownership and inheritance rules complex access rights

Principals Principals are active entities in security policies Principals can be local users aliases domain users groups machines Principals have a human readable user name and a unique security identifier (SID) Local principals are created by a LSA, e.g. principal = MACHINE\principal Domain principals are administered by DC, e.g. principal@domain = DOMAIN\principal

Security identifiers A security identifier (SID) is a unique, machine generated code of varying length used to identify principals. Format: S-1-IA-SA-SA-SA-N, where IA (identifier authority): characterizes an issuer, e.g. World Authority (1) or Local Authority (2) SA (subauthority): identifies a specific SID issuer, e.g. a domain controller N: relative identifier, unique for each authority Examples: Everyone (World): S-1-1-0 System: S-1-5-18 Administrator: S-1-5-21-<domain>-500

Principals used for access control SID: an individual principal Group: a collection of principals managed by DC; groups have their own SIDs and can be nested Alias: a local group managed by LSA; cannot be nested Aliases implement logical roles: an application may define an alias to which SIDs are assigned at run-time

Subjects Subjects are active entities in OS primitives. Windows subjects are processes and threads. Security credentials for a subject are stored in a token. Tokens provide a principal/subject mapping and may contain additional security attributes. Tokens are inherited (possibly with restrictions) during creation of new processes.

Token contents Identity and authorisation contents user SID, group SIDs, alias SIDs privileges Defaults for new securable objects owner SID, group SID, DACL Miscellaneous attributes logon SID

Privileges A set of fixed privileges is defined by numeric constants in Winnt.h Privileges control access to system resources. Example privileges: load or unload a device driver lock a page in a physical memory create a computer account shut down a system modify a system time Privileges are not access rights!

Objects Objects represent various passive OS entities Example Windows objects: files or directories pipes processes and threads file mappings access tokens window-management objects registry keys printers network shares synchronization objects job objects Active Directory objects Security of built-in objects is managed by OS Security of private objects must be managed by applications Securable objects are equipped with a security descriptor

Security descriptor Owner: a principal who owns an object Primary group: for POSIX compatibility DACL: specifies who is granted and who is denied access SACL: specifies a security audit policy

Access rights: an overview Describe what one can do to an object Encoded as a 32-bit mask Standard access rights (bits 16 23) are common to most object types DELETE READ_CONTROL: read object s security descriptor SYNCHRONIZE: use object for synchronization (not all objects) WRITE_DAC: change object s DACL WRITE_OWNER: change object s owner Object-specific rights (bits 0 15) are tailored to each class of objects Extended rights can be specified for Active Directory entries.

Generic access rights The highest 4 bits (28 31) represent generic access rights: GENERIC_READ GENERIC_WRITE GENERIC_EXECUTE GENERIC_ALL Each class of objects maps its generic rights to object-specific rights. Generic rights are used to simplify design: they provide an intermediate description level for access rights.

ACLs in Windows DACL in a security descriptor is a list of Access Control Entries (ACE) ACE format: ACE type: positive or negative permissions Principal SID Access rights mask Inheritance flags ACEs are processed sequentially until either some entry denies all requested access rights or a set of ACEs grants all requested access rights

ACE matching algorithm For any objects that do not have DACL, access is always granted. For all other objects, the subject s token is compared sequentially with each ACE as follows: ACE does not contain a matching SID: skip and continue. SID matches and contains a negative permission: deny access and stop. SID matches and contains a positive permission: if accumulated access rights match access mask, grand access and stop. otherwise add ACE to the accumulated access rights and continue.

ACL processing example

ACL inheritance When a new object is created, its ACL is inherited from that of the enclosing container, e.g. a directory. Only ACEs with a matching object type are inherited

Summary Windows systems contain complex security mechanisms for user account and object management as well as access control. DACLs enable fine-grained access control of heterogeneous entities in Windows itself as well as applications. The complexity of Windows security mechanisms is also its enemy: misconfiguration as well as implementation bugs may lead to severe security incidents.