Compliance series Guide to meeting requirements of USGCB



Similar documents
Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Compliance series Guide to the NIST Cybersecurity Framework

Managing and Maintaining a Microsoft Windows Server 2003 Environment

MS MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp

Total Protection for Compliance: Unified IT Policy Auditing

Regulatory Compliance and Least Privilege Security

Security Compliance Manager (SCM) v2.0

Stellar Active Directory Manager

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

A Microsoft U.S. Public Sector White Paper by Ken Page and Shelly Bird. January government

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Course Outline. ttttttt

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10


Simplify Suite in a VDI Environment

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting

Managing Windows Environments with Group Policy

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.

Windows 7, Enterprise Desktop Support Technician

Windows" 7 Desktop Support

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

System Security Policy Management: Advanced Audit Tasks

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Kaseya IT Automation Framework

RSS Cloud Solution COMMON QUESTIONS

Troubleshooting and Supporting Windows 7 in the Enterprise

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led

MS 50292: Administering and Maintaining Windows 7

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

Introduction to Endpoint Security

Windows 7, Enterprise Desktop Support Technician

Planning for Windows Server 2008 Servers

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

70-685: Enterprise Desktop Support Technician

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Implementing Windows Security with Group Policy by Derek Melber MCSE, MVP

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

Configuring and Administering Windows 7

Industrial Security for Process Automation

Course 50322B: Configuring and Administering Windows 7

MS 50255B: Managing Windows Environments with Group Policy (4 Days)

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

NetWrix USB Blocker. Version 3.6 Administrator Guide

6445A - Implementing and Administering Windows Small Business Server 2008

ICT Professional Optional Programmes

(Exam ): Configuring

Zone Labs Integrity Smarter Enterprise Security

MS Configuring Windows 8.1

Designing and Deploying Connected Device Solutions for Small and Medium Business

AV-006: Installing, Administering and Configuring Windows Server 2012

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Implementing and Administering Windows Small Business Server 2008

THE POWER OF GROUP POLICY

Network Access Protection (NAP)

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Qualys PC/SCAP Auditor

SANS Top 20 Critical Controls for Effective Cyber Defense

Implementing HIPAA Compliance with ScriptLogic

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing

Best Practices for PC Lockdown and Control Policies. By Dwain Kinghorn

MCSA Windows 8 (Exam )

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

ManageEngine Desktop Central Training

ios Enterprise Deployment Overview

Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician.

Federal Desktop Core Configuration (FDCC)

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Implementing and Supporting Microsoft Windows XP Professional

Kaspersky Endpoint Security 10 for Windows. Deployment guide

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Business Value of Microsoft System Center 2012 Configuration Manager

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Windows Operating Systems. Basic Security

What we are going to cover...

PCI Data Security Standards (DSS)

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Upgrading Client Security and Policy Manager in 4 easy steps

How To Achieve Pca Compliance With Redhat Enterprise Linux

DisplayLink Corporate Install Guide

GFI White Paper PCI-DSS compliance and GFI Software products

System Management. What are my options for deploying System Management on remote computers?

Protecting Your Organisation from Targeted Cyber Intrusion

Administering Windows Server 2012

Complete Patch Management

Windows Remote Access

Transcription:

Compliance series Guide to meeting requirements of USGCB avecto.com

Contents Introduction to USGCB 2 > From FDCC to USGCB 3 > USGCB settings and standard user accounts 3 > Application compatibility 4 > SCAP and USGCB (FDCC) scanners 4 > Implementing USGCB 5 > Managing least privilege PCs 5 > USGCB Group Policy settings 5 > Windows and third-party updates 6 > Virtualization 6 > HomeGroup 6 > Remote support 6 > Defendpoint helps businesses meet USGCB compliance 7 About Avecto 8 Russell Smith 8 avecto.com 1

Summary Baseline configurations for IT systems have long been used in the enterprise for security hardening, to reduce costs and improve the service IT departments can deliver to end users. Starting in 2008, US Federal Agencies were required to adopt the Federal Desktop Core Configuration (FDCC), which contained more than 700 baseline settings for Windows XP and Vista. When Microsoft released Windows 7 in 2009, FDCC became the United States Government Configuration Baseline (USGCB). Mandated by the Office of Management and Budget (OMB), all federal agencies and government contractors are required to comply with the code. A key ingredient is that the mandate also requires administrative rights be removed from users. Microsoft Certified Systems Engineer (MCSE) Introduction to USGCB As the successor to FDCC, and unlike most industry regulations, USGCB is a mandate for Windows and Redhat Linux PCs that explicitly defines more than 700 settings and how they must be configured. The requirements are outlined in a series of spreadsheets, available from the NIST website (http://usgcb.nist.gov/usgcb_content.html), for Windows XP, Vista and Windows 7. NIST also provides GPO backup files and virtual hard disks (VHDs) with Windows preinstalled so that federal agencies can easily test and deploy the settings. USGCB was initially introduced with settings for Windows 7, but now incorporates Windows XP and Vista, and is designed to improve PC security and reduce the likelihood of a security incident. Maintaining a standard configuration helps reduce costs by providing a known configuration so that support issues are less likely to arise and if they do, IT staff can resolve problems faster. A key ingredient is that the mandate also requires administrative rights be removed from users. Configuration for Windows power management features is also included to reduce energy bills. avecto.com 2

From FDCC to USGCB Some of the technical difficulties agencies experienced implementing FDCC settings on Windows XP were alleviated with the development of FDCC for Vista. One example is the disposal of the requirement to disable the Remote Access Connection Manager (RACM) service, which prevented users from establishing VPN connections using the builtin VPN client in Windows. USGCB further eases mandate compliance for Windows 7 and Vista by no longer disabling the WLAN AutoConfig service, which was disabled in FDCC for Vista and prevented wireless connections being established unless 3rd-party software was installed. The rationale for disabling the WLAN AutoConfig service (known as Wireless Zero Configuration in Windows XP) was to prevent dualhoming when hardwired to the corporate Ethernet, which could potentially allow devices to circumvent company filtering mechanisms via a second unmanaged network. Many agencies decided to allow these services and monitor for the presence of dualhomed connections. Windows 8 will introduce a Group Policy setting, Prohibit connection to nondomain networks when connected to domain authenticated network, to prohibit dual-homed connections, i.e. if a device is hardwired to an Ethernet port, the wireless connection is automatically disabled. Requirement 10.2.5 Use of and changes to identification and authentication mechanisms including but not limited to creation of new accounts and elevation of privileges and all changes, additions, or deletions to accounts with root or administrative privileges. USGCB settings and standard user accounts The 448 Windows and 115 Internet Explorer configuration settings were field tested during the development of USGCB, but implementing these changes in your own environment still requires a significant commitment to testing. You must ensure that applications are compatible with USGCB settings and least privilege user accounts, and appropriate workarounds found if the settings cause problems. USGCB compliance is further complicated by the need to remove administrative rights from users, as there s little point in deploying a standardized configuration if users are able to change it at will. The limitations of standard user accounts also affect a host of operating system tasks that users will no longer be able to perform, such as installing a printer that doesn t have appropriately signed drivers or manually updating Windows or a 3rd-party application. This can be especially problematic for notebook users, who rely on greater autonomy to fix their own problems when the IT department isn t able avecto.com 3

to establish a remote connection. Despite this, if the IT department has appropriate systems for software deployment and patching, and a plan for providing remote support, there should be an overall reduction in helpdesk calls as users are no longer able to make unauthorized changes, intentionally or accidentally, and PCs are less prone to damage caused by malware. Application compatibility One of the biggest challenges with standard user accounts on the desktop is compatibility with legacy applications. When administrative rights are removed from users, applications could fail to run if they re unable to write to restricted areas of the Windows file system or registry. Windows 7 UAC includes registry and file virtualization that redirects read and write operations to protected parts of the registry and file system to specially designated locations in the user s profile. This helps many legacy applications run without the need to make any manual configuration changes. For more stubborn applications, Microsoft s Application Compatibility Toolkit (ACT) contains tools that allow system administrators to analyze the programs installed across a network and apply compatibility shims, which include fixes for XP that instruct Windows to intercept application I/O requests and redirect them to the user s profile. The limitations of standard user accounts also affect a host of operating system tasks that users will no longer be able to perform, such as installing a printer that doesn t have appropriately signed drivers or manually updating Windows or a 3rd-party application. Microsoft Certified Systems Engineer (MCSE) ACT is available as a free download and can be used to solve many problems related to least privilege security. Developing and deploying fixes with ACT, however is a time-consuming process. Problem applications must be identified, and compatibility shims selected and tested before they can be deployed. Distributed Compatibility Evaluators are used to collect information about installed applications and help systems administrators identify problems with access rights when running programs from a standard user account. Information about open modules, accessed files and registry keys are uploaded to the ACT database for analysis. SCAP and USGCB (FDCC) scanners Agencies are required to confirm compliance using a certified FDCC scanner, such as McAfee Policy Auditor. The Security Content Automation Protocol (SCAP) can be used by scanners for automatic vulnerability management, confirming the configuration of a given avecto.com 4

device against the latest SCAP content files. The files are formatted in Extensible Markup Language (XML) and contain information about the necessary settings and patch requirements for compliance. Implementing USGCB Testing and deploying USGCB settings can be a daunting task but can be broken down into four key stages: Assess, create, test and deploy: > Assess your current environment - Collect information about the applications running on your PCs and understand how programs are using elevated privileges. Identify any potential problems users might experience when running without administrative rights. > Create a series of test images - Use Group Policy or NIST virtual hard disks to create your test images. Remove administrative privileges so users log in with standard user accounts. > Test the images in a pilot scheme to identify any issues that may not have been captured during the assessment phase. It may be necessary to seek variances from the USGCB configuration settings if no practical workaround can be achieved for a specific problem. In this case, a deviation report must be filed. > Deploy the final images to users. Once all issues have been remediated, the images can be finalized and distributed to end users. Any privilege management solution used for compliance should be tamper-proof so that users can t disable the management software or otherwise modify assigned privileges. Russell Smith Managing least privilege PCs When users log on without administrative privileges, the IT department is faced with a new set of challenges. IT staff must have a good understanding of the Windows security model now that it s being enforced, and strategies should be in place for connecting to devices both on and off the corporate network. While managing desktop PCs under USGCB will present some extra challenges, supporting and managing notebook users is by far the biggest problem that compliance brings. USGCB Group Policy settings The configuration settings mandated by USGCB are provided as Group Policy Object (GPO) backups that can be imported into GPOs using the Group Policy Management Console (GPMC). Once the necessary GPOs are linked to Organizational Units (OUs) in your Active Directory hierarchy, the required configuration will be applied to all devices and users with accounts in the OUs. avecto.com 5

Windows and third-party updates Managed desktops require an automatic solution for distributing Windows updates and software patches. At the most basic level, this could be Windows Server Update Services (WSUS) or a more sophisticated solution like System Center Configuration Manager (SCCM), which has the advantage of being able to deploy third-party software and updates. Virtualization Solutions from Microsoft and other companies, such as virtual desktop infrastructures (VDI) that provide users with a virtualized desktop hosted on a remote server, can help resolve some of the issues encountered when running with a standard user account. VDIs can reduce costs by centralizing desktop management and allowing old PCs or thin clients to be deployed instead of expensive new PC hardware. Application virtualization allows system administrators to distribute and update programs from a central location, at the same time isolating program code from the operating system and other applications. Testing and deploying USGCB settings can be a daunting task but can be broken down into 4 key stages: Assess, create, test and deploy. Microsoft Certified Systems Engineer (MCSE) Cached logons USGCB limits the number of cached logons to 2, allowing only an administrator and the primary user of the device to login if there s no domain controller available for authorization. This setting can be problematic for notebook users if the device is being shared. When a 3rd user attempts to log on to Windows, access will be denied if a domain controller is not found. HomeGroup Windows 7 HomeGroup services are disabled in USGCB and this could impact users connecting to devices, such as printers, hosted on home networks. Resources on home networks can be shared without using HomeGroup. Remote support IT departments need to develop a strategy for supporting notebook users when they re away from the office once administrative rights have been removed. While it s less likely that users can get themselves into trouble as a standard user, other tasks, such as installing permachine software or adding hardware with unsigned drivers, remain administrative tasks. avecto.com 6

Defendpoint helps businesses meet USGCB compliance Agencies can accelerate and simplify the process of identifying applications not compatible with standard user accounts, and provide a means to quickly assign those programs with the necessary privileges, by deploying Avecto Defendpoint. Avecto s solution runs as an agent on PCs, providing advanced privilege management capabilities not available in Windows out-of-the box. Defendpoint assigns rights to processes as determined by system administrators, using Windows built-in local groups, or individual NT rights to keep the attack surface low. Managed using Group Policy, Defendpoint leverages your current investment in Active Directory. Managed using Group Policy, Defendpoint leverages your current investment in Active Directory. Microsoft Certified Systems Engineer (MCSE) Defendpoint can monitor how applications use privileges and that data can be used by system administrators to automatically generate rules that assign programs the necessary privileges to run under a standard user account, ensuring applications continue to run as they did before administrative rights were removed. This capability saves system administrator s time as there is no longer a need to manually create and test rules. Built-in rules also allow system administrators to quickly enable functionality in Windows that is blocked by default for standard users, such as the ability to run Windows Update. Additionally, Defendpoint provides application control that s compatible with all supported versions of Windows and offers system administrators a unified interface for blocking unauthorized applications on your network. Not only can Defendpoint expedite achieving initial USGCB compliance, but also assists in maintaining compliance by providing a means to quickly respond to changing needs and realize a solution where compatibility problems with standard user accounts are identified. avecto.com 7

About Avecto Avecto is an innovator in endpoint security. Founded in 2008, the company was established to challenge the status quo that effective security leads to user lockdown. This philosophy of security + freedom promotes a positive user experience across every software implementation, allowing organizations to strike just the right balance. UK 2014 Its unique Defendpoint software makes prevention possible, integrating three proactive technologies to stop malware at the endpoint. This innovative software has been implemented at many of the world s most recognizable brands, with over 8 million licenses deployed. Attention to detail is paramount, with a team of qualified and experienced technology consultants to guide clients through a robust implementation methodology. This consultative approach provides clients with a clearly mapped journey against measurable objectives to ensure project success. The company has placed in the top four of the Deloitte Fast 50 for the last two consecutive years, making it one of the UK s fastest growing software companies as well on the global stage. USA / UK / Germany / Australia avecto.com / info@avecto.com avecto.com 8