Auditing Internet Security AUD11



Similar documents
The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

Security Technology: Firewalls and VPNs

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Networking for Caribbean Development

Firewalls. Chapter 3

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

INTRODUCTION TO FIREWALL SECURITY

Firewalls. Network Security. Firewalls Defined. Firewalls

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Chapter 1 The Principles of Auditing 1

Chapter 9 Firewalls and Intrusion Prevention Systems

CMPT 471 Networking II

FIREWALLS & CBAC. philip.heimer@hh.se

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewall Firewall August, 2003

A Decision Maker s Guide to Securing an IT Infrastructure

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Guideline on Firewall

74% 96 Action Items. Compliance

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Cyber Essentials. Test Specification

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

ΕΠΛ 674: Εργαστήριο 5 Firewalls

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

CIT 480: Securing Computer Systems. Firewalls

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

Networking Basics and Network Security

Firewalls, IDS and IPS

8. Firewall Design & Implementation

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

CS5008: Internet Computing

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

PROFESSIONAL SECURITY SYSTEMS

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Information Security. Training

How to Painlessly Audit Your Firewalls

March

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall Design Principles

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Chapter 8 Security Pt 2

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Overview. Firewall Security. Perimeter Security Devices. Routers

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

INFORMATION SECURITY TRAINING CATALOG (2015)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Firewalls P+S Linux Router & Firewall 2013

Architecture Overview

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Using Ranch Networks for Internal LAN Security

Lecture 23: Firewalls

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Firewalls CSCI 454/554

Chapter 15. Firewalls, IDS and IPS

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Firewalls, Tunnels, and Network Intrusion Detection

Network Security Administrator

FortiWeb 5.0, Web Application Firewall Course #251

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Network Security: A Practical Approach. Jan L. Harrington

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls. Ahmad Almulhem March 10, 2012

External Supplier Control Requirements

Basics of Internet Security

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Introduction to Firewalls

Response to Questions CML Managed Information Security

Firewalls. Pehr Söderman KTH-CSC

Security and Access Control Lists (ACLs)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

EXPLORER. TFT Filter CONFIGURATION

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Transcription:

Auditing Internet Security AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 1

Session Objectives IS Auditors have enough confidence to use ITGC skills to audit Internet security to a medium assurance level AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 2

Internet Security Audit = 1. IT General Control + 2. Access control audit of the Internet gateway vis AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 3

Agenda What is Internet security Internet security technology Common IT General Controls Specific Internet security controls AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 4

Agenda AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 5

Cisco Diagram AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 6

Internet security - Goals Secure connection to the Internet Block access to internal systems Protect Web Applications Control internal personnel use of the Internet Secure remote access AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 7

Threats and Risks Threats Hackers extract and publish sensitive information Databases Executive files, negotiation strategies Legal files IP Staff publish sensitive info Risks x x x x Damages litigation Loss of business position Breach of legal duties Loss of competitive advantage Denial of service x Cash flow loss of sales x Reputation Theft of credit card details x Liability to bank Spoofing of your email x Damages and litigation Staff and porn x Damages and litigation AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 8

Network Layers OSI Model TCP/IP Model Application Presentation Session Transport Network Data Link Physical Application (HTTP, FTP) Host-to-host (TCP, UDP) Network (IP) Network Access 10

The IP packet AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 11

Filtering Layers Cyberguard Diagram AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 12

Filtering Layers Cyberguard Diagram AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 13

IP Types IP Basic type Competitor to IPX, SNA, Decnet, etc ICMP Internet Control Message Protocol Used for flow control, pinging TCP Transmission Control Protocol 3-way handshake Starts with a SYN synchronise request State maintained in the kernel UDP Universal Datagram Protocol stateless Application maintains state Copyright (c) Infosec Services Pty Ltd 2008 14

A look back to 2002 Rating Maturity Objective Controls Gateway User 1 Initial Basic filtering, block incoming Home user, SOHO 2 Repeatable Customised filtering, good technician SME 3 Defined Content scanning, change control, logging Major companies and Government 4 Managed Risk management, compensating controls, monitoring, CSIRP, Industry evaluated products 5 Optimised ISO 15408 Evaluated products, formal accreditation process Banks, high information asset companies Sensitive Government AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 15

Auditing Context Review enterprise security policy, network security standards Identify regulatory information security requirements Review security incident history Review service provision model In house Outsourced IAAS, PAAS, SAAS, etc Determine assurance requirements AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 16

Network access control AKA packet filtering Basic packet filtering Rare these days Filtering on Destination IP address Source IP address Destination port (AKA service, eg, HTTP, telnet) Source port Trust destination only trust your own source AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 17

Network Access Control Stateful Most common, Checkpoint, Cisco Adaptive Security Appliance, PIX, e.g. Recent outgoing DNS name lookup Permit the DNS response Firewall understands network sessions Application level 18

Network Access Control Application Level Application protocol compliance and misuse Enforce protocol rules E.g. Only DNS over the DNS port Block risky but compliance protocol options, e.g. SMTP - EXPN Content filtering Filter on the data part of the IP packet AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 19

Filtering What to look for Ingress Very restricted rules Restricted access to DMZ resources No access direct to internal networks No blanket access for remote access DMZ to internal networks only essential connections Egress Enforcement of use of proxies, e.g. SMTP = enforce use of corporate email HTTP = enforce use of content filter DNS = enforce use of trusted DNS server AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 20

Content Inspection Malware Viruses, worms Buffer overflow attemtps Other exploitations Unauthorised content Keywords, e.g. F**K Images skin tones, etc Dedicated servers support firewalls AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 21

Intrusion Prevention Systems Evolution from Network IDS Historically separate IDS with feedback to the firewall Now mostly part of a firewall but licensed separately Requires annual subscription IDS engine dynamically writes firewall rules Detection techniques Signatures Anomaly / Heuristics Blacklists Disclosure Loss Prevention tools (DLP) (rarely tuned well) AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 22

Field Work AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 23

Testing - Passive Ask the administrator to show you the settings Less audit risk than accessing the admin account yourself Inspect key controls Applicable security policy Technical configuration settings Logging and incident response capability Review the firewall ruleset Inspect the IDS/IPS console Do they review or monitor suspect events? AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 24

Testing Review Firewall Rules Default deny policy? Permit risky protocols? Protocols with plaintext passwords Protocols permitting remote control or access Decisions based on untrustworthy source information? Rules match authorised usage Rule documentation Get the hidden (implied) rules on Firewall-1 AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 25

Testing Passive (3) Documentation Network diagrams Secure architecture? Ruleset descriptions? Maintainable? Periodically reviewed? Infrastructure inspection Patch cables Match diagrams? Software flaws patch plans/records Check for evidence of control effectiveness Test reports (including regression testing) System logs Incident reports AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 26

Testing Passive (4) Change Control Security risk Normal ITIL controls Administrator Authentication and logging From a trusted location Skills Access via secure interface AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 27

DMZ Servers Operating Systems Use standard server security checklist At the high security level Vendor security manual, ASD or AusCERT list, Center for Internet Security Inspect Usual ITGC Running network services netstat a rpcinfo p (on unix) Patching Malicious software controls Logging sent to a separate trusted repository? Multiple homed DMZ servers get the admin to show it is not a router Get the admin to run the vendor s security tools for you 28

DMZ Middleware Often the weakest point Web services access control Middleware containers have access control list Inspect Web services access control Authentication to access web services? Logging? Databases Dust off your database audit program 29

DMZ Servers Continued Backed up? Part of an IT Disaster Recovery Plan? Tested? Increasing using High Availability and auto failover 30

ASD s Top 35 Mitigations Firewalls, network segmentation, proxy enforcement Host and network IPS, centralized network logging Email spoof controls Sender Policy Framework Block certain file types Email and Web content filtering, malware controls Web domain whitelisting, blacklist known malicious domains Patching Dynamic analysis of email and web - sandbox Server OS exploit mitigation, server application hardening 31

Testing Active Check control effectiveness Scan accessible ports does the admin have the tools? Tools: nmap Scan application vulnerabilities Tools: nessus, acunetix, Appscan, Burp Suite, Hailstorm, NTO Spider, Qualsys, WebInspect Penetration tests by service provider? CREST Australia AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 32

Testing Analysis v s Pen Tests Pen tests and scans great for obvious stuff ups Weaknesses hard to find by pen tests Rules with source network filters Rules for decommissioned servers (firewall rule reuse) No filtering from DMZ to internal networks No egress filtering Messed up firewall object definitions Firewall software flaws and patches E.g. Cisco Pix ACL bypass AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 33

Finifter and Wagner, UC Berkley Scope: code review http://www.cs.berkeley.edu/~daw/papers/webapps11.pdf Used with permission.

? Analysis? Testing

Web Deployment Trends Virtualisation, virtualisation, virtualisation Co-hosting with other s web services Server virtualisation Storage virtualization Voice over IP security Phone toll fraud

Trends - Storage Virtualisation Alternative routes into the inside Shared server virtualization infrastructure Stretching of SANs into the DMZ All of an organisation s data in one place SAN controls Zoning, with Host Bus Adapters LUN masks or Access Control Lists Virtual servers can have very broad SAN access Use a separate SAN

Trends - Server Virtualisation Internet servers on the internal VM farm, but mainly separate VM farms Several key controls not on by default ARP spoofing MAC changes Many DOS controls Persistent log files OWASP

Trends - Server Virtualisation (2) Sprawl Duplicates running AV forgotten on virtual server clones Copies of other system snapshots Clones of insecure development configurations VM Snapshots unprotected on file system References Vmware Security Hardening Guides Microsoft Security Compliance Manager (Hyper-V) OWASP

Corrective Controls Incident Response Is there an incident response plan? Does the CSIRP cover management processes and technical responses? Is evidence protected? Does the plan have management authority? 17 September 2002 CACS 2002 48

Controls Effectiveness Logs Are they protected? Are they stored on a separate server? Is it the only gateway? Wireless Modems 17 September 2002 CACS 2002 52

Controls Effectiveness Malicious content scanning Frequency of signature updates Quality of tool Scan by heuristics and signatures Additional scanning on server or desktop Inspection regardless of file type Inspection inside of archive files HTTPS scanning HTTPS whitelisting, or blacklisting Independent expert review 17 September 2002 CACS 2002 53

Internet Routing Authenticity BGP authentication Border router outside the firewall Reference, NIST SP800-54 Real world attacks and accidents China Telecom advertised 37 000 unowned networks 2010 Pakistan Telecom blocks YouTube 2008 Malaysian ISP blocks Yahoo 2004 Turkish ISP takes over the Internet 2004, TTNet sent out a full table of Internet routes via BGP that routed most Internet traffic through Turkey for several hours AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 54

Standards and Guidelines ISO 27002, 27005 Australian Government Information Security Manual Security Vendor Guides COBIT NIST csrc.nist.gov Center for Internet Security (SANS) www.cisecurity.org O Reilly & Assoc publications Spafford Cheswick AUD11 SPEAKER: Gary Gaskell (QLD), Infosec Services 55

Questions 56

Threats, Vulnerabilities and Risks Risks Assets (incl Business Processes) Threats exploit Vulnerabilities expose Value 57