IT Security: New Trends, Ancient Techniques. Alec Muffett Chief Architect, Security Sun Professional Services EMEA



Similar documents
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May The OWASP Foundation

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Complying with PCI Data Security

What is Web Security? Motivation

Solve a Security Problem Instead

CMPT 471 Networking II

Introduction to Cyber Security / Information Security

Building A Secure Microsoft Exchange Continuity Appliance

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

A Decision Maker s Guide to Securing an IT Infrastructure

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Lotus Domino Security

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Advanced Security and Mobile Networks

Designing and Coding Secure Systems

Cisco Advanced Services for Network Security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

How To Secure An Rsa Authentication Agent

EA-ISP-012-Network Management Policy

The Business Case for Security Information Management

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

Society for Information Management

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

External Supplier Control Requirements

Network and Host-based Vulnerability Assessment

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Security and Vulnerability Testing How critical it is?

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Privacy 101. A Brief Guide

Achieving PCI Compliance Using F5 Products

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

SSL BEST PRACTICES OVERVIEW

Does your Citrix or Terminal Server environment have an Achilles heel?

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls and Network Defence

Security Technology: Firewalls and VPNs

Protecting Your Organisation from Targeted Cyber Intrusion

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

What is VNC. VNC Solutions and Related. What VNC Solutions are available. Defining some terms

Where every interaction matters.

Cyber Exploits: Improving Defenses Against Penetration Attempts

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

AppDirector Load balancing IBM Websphere and AppXcel

πωχ Notes on Domino Black Hat Las Vegas 2003 Aldora Louw PricewaterhouseCoopers

User Security Education and System Hardening

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

FileCloud Security FAQ

elearning for Secure Application Development

Secure Software Programming and Vulnerability Analysis

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

CONTENTS. 1.0 Introduction

Eleventh Hour Security+

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

COORDINATED THREAT CONTROL

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

INTRODUCING KERIO WINROUTE FIREWALL

Evaluation of different Open Source Identity management Systems

CS Final Exam

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

How To Use Egnyte

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

INTRUSION DETECTION SYSTEMS and Network Security

PRIVACY, SECURITY AND THE VOLLY SERVICE

Chapter 4 Application, Data and Host Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

You can protect your computer against attacks from the Internet with Windows Vista integrated Firewall.

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

Description: Objective: Attending students will learn:

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

SCADA SYSTEMS AND SECURITY WHITEPAPER

Security: Firewall/Proxy Server Chapter

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

System Security Guide for Snare Server v7.0

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

IBM Managed Security Services Vulnerability Scanning:

Client Server Registration Protocol

Secret Server Qualys Integration Guide

Web Engineering Web Application Security Issues

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Transcription:

IT Security: New Trends, Ancient Techniques Alec Muffett Chief Architect, Security Sun Professional Services EMEA

Alec Muffett: Work SunPS Europe, Mid-East & Africa Chief Architect for Security, EMEA 18+ years of Network Security 12+ years for Sun Microsystems Specialising in: Network Architecture Network Security Auditing Authentication & Cryptography

Alec Muffett: Leisure Open Source Author Crack Password Cracker CrackLib Password Integrity Checker Original USENET Security FAQ Various other security stuff RSA Factorisation BlackNet: 384-bit Secret/PGP key break RSA155: world's first 512bit RSA break

Proposition There are many security components available today... Components == Tools, Utilities, Appliances... Available across many platforms... Addressing many specific security risks... Multi-billion dollar industry But...

Proposition Many useful security components are available, but... They are easily misassembled, misused or misconfigured They are often better used in combination, rather than individually

Further... Regarding components People tend to seek homogeneity, whereas diversity yields greater robustness, at the cost of management complexity Without proper design/architecture, you will be wasting your money It is perfectly possible to spend $1,000,000's and yet have a terribly insecure network... It is further possible to spend almost nothing, and yet improve your security enormously.

Therefore, today... We shall: review what may go wrong. review how it can go wrong. suggest a strategy, even a design philosophy which helps to address it.

As a first illustration... Consider this problem: The misassembly of security components Viz: Right Components, Put Together Wrong Example: TopBox Breaking Video (2m 50s)

So Let's... Recap some history of IT Security Compare it to the State of the Art Review individual security tools, and the issues they sought to address Determine whether we are still defending against the older security issues

IT Security A Rough History

IT Security Eras 1955..65 Computers too complex for ordinary people yielding security through obscurity

IT Security Eras 1965..75 Advisory separation of different users within a computer Technology (mostly) not advanced enough to support mandatory separation. Lack of VM, etc

IT Security Eras 1975..85 Partitioning of file access via robust file permissions Strong virtual memory to enforce mandatory user/program separation......but not in all platforms (eg: Personal Computers)

IT Security Eras 1985..95 Password security extended to basic network services Networking too complex for ordinary people yielding security through obscurity again...yet early buffer-overflow exploits occur Personal Computers virus-ridden from lack of technology to implement integrity Compartmented/Certified Systems considered exotic ; Military & Banking only?

IT Security Eras 1995..now Partitioning of service access via firewalls Firewalling used as panacea Impact upon network architecture and throughput Personal Computers begin to employ strong permissions, VM (etc) to ensure integrity......boosting subsequent growth in macroviruses and active-content exploits in popular applications, to fill the gap.

IT Security Future? 2005+... What is the next big, open resource that is fit to protect with mandatory controls? Encapsulated Data Security / Per-Object Crypto? Proximity wireless / Bluetooth? SMS-Firewalling & Antivirus? Your guess is as good as mine...

Implementation Cycles Generalising: New resource/tool becomes available Identity, Filestore, Network, E-mail... Resource/tool grows in popularity Access restriction to/by the resource is layered-on afterwards Passwords, Permissions, Firewalls, Virus scanner...

Security Deployment Problem: Access controls which are designed after the fact are often sub-optimal Eg: Password protection on plaintext HTTP Eg: Session-State Cookies in HTTP Eg: 40-bit WEP in 802.11b Arguably all of the above could have been forseen and implemented properly

Security Deployment In security, often only the latest trendy issues are managed......to the detriment of others. Weak file permissions on a big server Ignored because: The firewall does all our security!!! How many people here have hardened every server they own?

So Why Do Security? What are we protecting? Data has value to us, and to others. Data is valuable but intrinsically defenceless. Data exists in more places for shorter or longer periods of time caches, routers; how many of these places do you actually own? How shall we protect it? So what we actually do to protect that which we value?

Issues of Implementation We actually protect the containers where data exists! But: data exists in many places! Hence the need to defend: Multiple data containers In multiple places At the same time. This explains why security is complicated

Same Problems, Repeating Rough Categories of Challenge: Over-reliance on one security technology Blithe trust in what you are told Reusable weak authentication The right tools, put together wrongly

Same Problems, Repeating Overreliance upon single technologies Obscurity Permissions Passwords Firewalls IDS For instance: Potato famine Antibiotic Resistance

Same Problems, Repeating Blithe trust in what you are told Unauthenticated identity Buffer overflows (sometimes) WWW Cookies For instance: Forged passports / identity papers Social engineering

Same Problems, Repeating Reusable weak authentication Plaintext passwords Unencrypted Communications Compare: Story of Ali-Baba and the 40 Thieves Reusable Password: Open Sesame Published circa 950AD A 1000-year-old IT security issue!

Same Problems, Repeating Right Tools, Assembled Wrongly Firewalls with far too many holes Firewalls with too much complexity Same firewall technology everywhere Poor Network Design Example: Simple SSL Accelerator (later...)

Attempts to Address Security: End To End Security

End-to-End: Communication Client (eg: browser) Server (eg: bank) Secure & Authenticated Communication

End-to-End: Integration Application Application Integration Software Platform & OE Storage & Network, Other HW Hardware Platform, CPU/Mem Physically Secure Proper Integration of Components

End-to-End: Functionality Remote Access Authentication Antivirus Firewall Intrusion Detection Spectrum of Security Functionality

End-to-End: Quality Quality of Implementation in all things, at all levels Quality of Components

End-to-End: 4-D Security Quality of Implementation in all things, at all levels Application Application Integration Remote Access Authentication Client Antivirus Server Firewall Software Platform & OE Intrusion Detection Storage & Network, Other HW Physically Secure Apparently Confusing, but...

End-to-End: Simple 4-D Security Quality Integration Function Source Destination Function Foundation...actually rather simple.

When 2-D Drawings Fail... There is even a fifth, Human dimension to security, that which pertains to having correct People, Policy and Procedure - there are probably more.

Now consider: Does your security solution address all of these dimensions?

Better Security Through Better Design

Design Example: SSL

Design Example: Theory

Design Example: Oops!

Better Design

Solution? How do we address these challenges? Clever Network Design Bear risks in mind when laying-out architecture Build so that (some) problems never arise Clever Host Design Build computers so they are less-subject to attack Build computers for extra robustness Overall: apply Defence In Depth philosophy So, what is Defence in Depth?

The Philosophy of Defence In Depth

Defence in Depth Motto #1 Use multiple, independent, different, mutually-reinforcing security technologies Motto #2 Use whatever works, is manageable and available, and configure them sensibly and as simply as possible Motto #3 Employ a default-deny approach I.e., you can only access that which we publish

Defence in Depth Use of: Multiple Independent Different Mutually-Reinforcing...Security Technologies Not a 100% solution......but nothing is!

Defence in Depth Compare: Castle Defences Castle Video (6m33s)

Key Points Defence in Depth Use of different technologies with different failure modes Layers of security work to reduce profile available for attack You only see 10% of 10% of 10% of attacks... There may be loss of some auditing information between layers, but... Are you doing security research, or are you trying to defend yourself?

How Much Depth? When do I stop adding layers? Good question! Depends upon what you are trying to protect. Judgement call Personally, I reckon when all major risks have been mitigated twice, in different, independent ways, that's the minimum.

How robust is it? A very good approach to security......although it is not a 100% solution...its ablative shield approach yields better security than other monolithic solutions. You will never get 100% security, anyway. But things can still go wrong... For illustration...

If Implemented Well...

If Implemented Badly...

Extremes of Available Choice

Summary Defence in Depth Is a 7000-year-old approach to security that works really well Avoids monolithic security issues and monoculture syndrome Easy / inexpensive to build, but requires conscientious management and some forethought. Investment in this methodology will last for a long time

Summary Security requires continual investment Why audit, if you never read the logs? Why have intrusion detection, if you don't want to wake up at 0300h? Together, these yield budget justification! Why implement security, and yet fail to check its continued effectiveness over time? Healthchecks will yield ROI figures! Why protect, if you do not value?

Truisms Security is not a product......it is a process!...or, personally speaking: Security is not a process......it is a lifestyle!

Alec Muffett Sun Professional Services Alec.Muffett@Sun.COM