Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1



Similar documents
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

GE Measurement & Control. Cyber Security for NEI 08-09

USM IT Security Council Guide for Security Event Logging. Version 1.1

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Patch and Vulnerability Management Program

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

2012 Risk Assessment Workshop

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

BM482E Introduction to Computer Security

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

BKDconnect Security Overview

Security Controls for the Autodesk 360 Managed Services

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

1 Introduction 2. 2 Document Disclaimer 2

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

GFI White Paper PCI-DSS compliance and GFI Software products

March

IBX Business Network Platform Information Security Controls Document Classification [Public]

Did you know your security solution can help with PCI compliance too?

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Passing PCI Compliance How to Address the Application Security Mandates

Best Practices For Department Server and Enterprise System Checklist

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

ABB s approach concerning IS Security for Automation Systems

Media Shuttle s Defense-in- Depth Security Strategy

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Network and Security Controls

White Paper: Librestream Security Overview

74% 96 Action Items. Compliance

SonicWALL PCI 1.1 Implementation Guide

Use of The Information Services Active Directory Service (AD) Code of Practice

IT Security Standard: Computing Devices

KeyLock Solutions Security and Privacy Protection Practices

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

INCIDENT RESPONSE CHECKLIST

FISMA / NIST REVISION 3 COMPLIANCE

Codes of Connection for Devices Connected to Newcastle University ICT Network

PCI DSS Requirements - Security Controls and Processes

Payment Card Industry Data Security Standard

Hosts HARDENING WINDOWS NETWORKS TRAINING

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Server Security Checklist (2009 Standard)

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Security Standard: Servers, Server-based Applications and Databases

LogRhythm and PCI Compliance

FormFire Application and IT Security. White Paper

Network Security Guidelines. e-governance

The Protection Mission a constant endeavor

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Why The Security You Bought Yesterday, Won t Save You Today

CompTIA Security+ (Exam SY0-410)

System Security Plan University of Texas Health Science Center School of Public Health

Critical Security Controls

Office of Inspector General

A Decision Maker s Guide to Securing an IT Infrastructure

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Goals. Understanding security testing

How To Manage Security On A Networked Computer System

Cisco Advanced Services for Network Security

Name. Description. Rationale

Supplier Information Security Addendum for GE Restricted Data

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Guideline on Auditing and Log Management

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

Client Security Risk Assessment Questionnaire

Global Partner Management Notice

Security + Certification (ITSY 1076) Syllabus

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

Autodesk PLM 360 Security Whitepaper

Presented by Evan Sylvester, CISSP

Chapter 4 Application, Data and Host Security

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Security Policy JUNE 1, SalesNOW. Security Policy v v

Top 20 Critical Security Controls

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Fortinet Solutions for Compliance Requirements

Exhibit to Data Center Services Service Component Provider Master Services Agreement

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Protecting Your Organisation from Targeted Cyber Intrusion

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

NetBrain Security Guidance

SANS Institute First Five Quick Wins

Data Management Policies. Sage ERP Online

Transcription:

Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A host that provides services for other hosts as a primary function Web, Database, DNS, Mail, File Server, etc Server Vulnerabilities, Threats, and Environments Defining threats can help mitigate them 2

Background Security Categorization of Information and Systems 3 objectives of Security» CIA = Confidentiality, Integrity, and Availability FIPS Publication 199 defines 3 security categories» Low, moderate, and high based on impact Security controls» Fixing vulnerabilities» Applying the least privilege needed to complete a task» Balance security and usability» Layer security 3

Background Basic Server Security Steps 1. Plan the installation 2. Install, configure, and secure the OS 3. Install, configure, and secure the server software 4. Test the security 5. Add network defenses 6. Monitor and Maintain 4

Background Server security principles: Simplicity Complete Mediation Separation of Privilege Psychological Acceptability Compromise Recording Fail-Safe Open Design Least Privilege Work Factor Defense-in-Depth 5

Secure Server Planning Installation and Deployment Planning The Five P s Identify The purpose of the server The services provided on the server Network service software client and server The users or types of users of the server 6

Determine Secure Server Planning Installation and Deployment Planning Privileges for user and categories of users How the server will be managed Decide if and how users will authenticate How appropriate access will be enforced Which server applications meet the requirements» cost, compatibility, functionality, and prior knowledge 7

Secure Server Planning Installation and Deployment Planning Work closely with manufacturers during the planning stage Choose the OS with provides the following: Ability to restrict admin access Granular control of data access Ability to disable services Ability to control executables Ability to log activities Host based firewall provisioning Support for strong authentication and encryption 8

Secure Server Planning Installation and Deployment Planning Availability of trained, experienced staff Physical Security Protection mechanisms Environmental controls Backup power source Fire containment Redundant network connections Location hardened against local natural disasters 9

Securing the Operating System Basic steps to follow after planning installation and deployment of the OS Patch and update the OS Harden and configure the OS Install and configure additional security controls Test the security of the OS 10

Securing the Operating System Patch and Update the OS Create a process Identify vulnerabilities Mitigate if necessary and patch when available Patch servers in isolation Test patches before applying 11

Securing the Operating System Harden and Configure the OS Disable or remove unnecessary services or applications Single purpose servers Remove rather than disable to prevent re-enabling Additional services increases the attack vector More services can increase host load and decrease performance Reducing services reduces logs and makes detection of intrusion easier 12

Configure user authentication Securing the Operating System Harden and Configure the OS Remove or disable unnecessary accounts Change names and passwords for default accounts Disable non-interactive accounts Assign rights to groups not user Don't permit shared accounts if possible Configure time sync Enforce appropriate password policy Configure to prevent password guessing Use 2-factor authentication when necessary Always use encrypted authentication 13

Securing the Operating System Harden and Configure the OS Configure resource controls Deny read to protect confidentiality Deny write to maintain integrity Limit execution to prevent reduction of security Use an isolated virtual environment» chroot, sandbox, or jails Control access to:» System software and configuration files» Security files password hashes, cryptographic keys» OS logs 14

Securing the Operating System Install Additional Security Controls Install and Configure Additional Security Controls Anti-malware Host-based IDPS» File integrity tools Host-based firewalls Patch management software Disk encryption Return-to-state software Secure deletion tools Secure remote tools 15

Securing the Server Software Secure Installation Install and patch the Server Software In a secure location Clean the installation Remove anything you don t need Harden and Configure Apply templates Remove banners Change ports and/or locations 16

Securing the Server Software Configuring Access Controls Control access to: Application software and configuration files Security files Server logs System software and configuration files Application content and uploads Run the server with limited privileges Not root or administrator Limit write permission No access to server temp files 17

Securing the Server Software Server Resource Constraints Prevent DOS attacks. Limit resources Install content on a different drive Limit upload space and file size Store log files separately Limit processes Limit memory Limit connection time User Access Restrictions Grant individual accounts and access Encrypt authentication IP restrict 18

Security maintenance is continual and includes: Logging, backups, testing, patching Logging provides: Alerts Tracking Information Evidence Maintaining the Security of the Server 19

Maintaining the Security of the Server Logging Identify capabilities and requirements Determine available logs and types Log from other applications Synchronize using NTP Review and retain Reviewing can be time consuming Use automated tools Create an archiving policy 20

Create a backup policy that fits: Legal requirements Mission requirements Organizational policy Create baseline "image Maintaining the Security of the Server Server Backups Encrypt or securely store backups 21

Maintaining the Security of the Server Test Server Use identical hardware and software Or consider virtualization Can be used for: Testing patches Developing new content and applications Testing configuration changes More risky behavior» Compilers, remote access, additional tools 22

REPORT THE INCIDENT TO ABUSE@PURDUE.EDU Isolate the system or contain the attack Consult as appropriate, management, legal counsel, or law enforcement Investigate similar hosts for possible compromise Analyze the intrusion: current system state including memory, network connections, time stamps and logged in users modifications to the system modifications to the data tools left behind system, ID, and firewall logs Maintaining the Security of the Server Reporting a Compromise 23

Restore Use a clean install Disable additional services Apply patches Change all passwords Reconfigure network for additional security and notification Test Reconnect Monitor Document Maintaining the Security of the Server Recovering From a Compromise 24

Maintaining the Security of the Server Security testing servers Use automated vulnerability scanning weekly or monthly Use manual Penetration testing annually Factors when testing a production server or QA: Possible impact - DOS or data corruption Possible data disclosure Similarity of QA and Production Secure Computing Baselines - CIS Benchmarks 25

Maintaining the Security of the Server Security testing servers Vulnerability scanning can: Identify hosts on a network Identify active services and which are vulnerable Identify applications and banners Identify OSs Enumerate vulnerabilities in discovered services or OSs Test compliance with policies Penetration testing Tests with the same tools as an attacker Verifies vulnerabilities Demonstrates exploits Provides realism Allows for testing of social engineering 26

Use strong authentication Use strong encryption Restrict access Enforce least privilege Maintaining the Security of the Server Remote administration No access from the internet Remove or change default accounts 27

Recommendations of the National Institute of Standards and Technology (excerpts) http://csrc.nist.gov/publications/drafts/800-123/draft-sp800-123.pdf Useful tools, guidelines, and best practices: http://www.purdue.edu/securepurdue Questions? Guide to General Server Security (Draft) 28