Simple Steps to Securing Your SSL VPN



Similar documents
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Passing PCI Compliance How to Address the Application Security Mandates

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Network Security Audit. Vulnerability Assessment (VA)

External Supplier Control Requirements

Networking for Caribbean Development

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Chapter 4 Application, Data and Host Security

A Decision Maker s Guide to Securing an IT Infrastructure

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Understanding Security Testing

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Directory and File Transfer Services. Chapter 7

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

5 Simple Steps to Secure Database Development

Cloud Security:Threats & Mitgations

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Database Security Guide

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Cisco Security Optimization Service

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Firewall and UTM Solutions Guide

CCNA Security v1.0 Scope and Sequence

Securing Cisco Network Devices (SND)

Penetration Testing Service. By Comsec Information Security Consulting

Network protection and UTM Buyers Guide

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Symantec Endpoint Protection Analyzer Report

PCI COMPLIANCE Protecting Against External Threats Protecting Against the Insider Threat

How To Protect Your Network From Attack From A Hacker (For A Fee)

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Windows Remote Access

Hack Your SQL Server Database Before the Hackers Do

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Global Partner Management Notice

Enforcing PCI Data Security Standard Compliance

Exploiting Transparent User Identification Systems

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

The Key to Secure Online Financial Transactions

CISCO IOS NETWORK SECURITY (IINS)

13 Ways Through A Firewall

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Payment Card Industry (PCI) Data Security Standard

Strategies to Keep Your VoIP Network Secure

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

IBM. Vulnerability scanning and best practices

Secondary DMZ: DMZ (2)

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

Network Security and Firewall 1

Devising a Server Protection Strategy with Trend Micro

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

SELF-DEFENDING NETWORKS

Achieving PCI Compliance Using F5 Products

Jort Kollerie SonicWALL

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Network Instruments white paper

SiteLock. Internet Security: Big Threats for Small Business. Presented by: Neill Feather, President

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

How To Prevent Hacker Attacks With Network Behavior Analysis

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Penetration Testing Report Client: Business Solutions June 15 th 2015

CRYPTUS DIPLOMA IN IT SECURITY

Seven for 7: Best practices for implementing Windows 7

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Thick Client Application Security

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Learn Ethical Hacking, Become a Pentester

Network and Host-based Vulnerability Assessment

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Chapter 9 Firewalls and Intrusion Prevention Systems

13 Ways Through A Firewall What you don t know will hurt you

Transcription:

Simple Steps to Securing Your SSL VPN A five-point strategy for secure remote access Managing secure remote access is a tough job. Because remote systems may directly connect to the Internet rather than through the corporate firewall, they pose an increased risk to your network environment. Virus and spyware protection, and a general VPN network policy isn t enough to keep these systems and the network they connect to safe. Here are five best practices for providing secure remote access. 1. Software controls policy Create a policy that defines the exact security software controls that must exist on systems with remote access. For example, you may need to spell out that antivirus, anti-spyware and desktop firewalls must be installed and configured in a specific manner with the latest signatures, along with which vendors are acceptable. The best practice is to distribute the policy along with the connection setup or similar instructions for end users. Often a zero tolerance policy is best for endpoint security. End users should meet a set of guidelines before connecting to the network. No AV, antispyware and desktop firewall? No remote access allowed. The policy should also spell out what ports and services may be exposed on the system. 2. Endpoint security management Choose a vendor that offers comprehensive endpoint security management and policy enforcement as part of their VPN or remote access solution. It is best to mandate that all remote users use the enterprise sponsored VPN client. That s the only way you are going to get true policy compliance and assurance of endpoint security posture. Your chosen remote access solution should be able to refuse connections for endpoint systems that do not meet the policy compliance checks. Ideally, the solution should tell end users which items are out of compliance so they can remediate the situation prior to attempting to reconnect. This cuts down on help desk calls. 3. Enforce corporate policy compliance Inform end users that corporate security policy extends to their remote desktop when connected to the enterprise network. For example, no file

sharing and other disallowed use while connected to the corporate network. 4. Reporting features Reporting on end user compliance is critical. Most of the solutions mentioned above offer reporting capabilities to keep admins updated on the status of the connecting endpoints. Depending on the number of users you have to manage, it may be wise to set up alarms that e-mail admins when a machine that is significantly out of compliance tries to connect. In some cases administrative intervention may be warranted especially when other access methods to the network may exist. Simple Steps to Securing Your SSL VPNA five-point strategy for secure remote access Pen testing your VPN A Virtual Private Network (VPN) is like a large sign, saying Sensitive Data Here. Hackers know that when they ve found a VPN, they ve hit the jackpot, because it means somebody is trying to secure something confidential.therefore, like any other gateway, your VPN needs to go through a thorough penetration test to check for vulnerabilities. It s easy to overlook VPNs when pen testing your network, as it s often assumed that they re the most secure part of it. But, they re not and they re a magnet for hackers.

Pen testing a VPN is straightforward, and there are some common tools for the job. It s not much different from the rest of your pen testing routine and should be part of it. There are two types of VPNs: IPSec and SSL. Which VPN you are running will determine how you conduct the pen test. Regardless, there are three basic steps to pen testing your VPN: 1. Scout the terrain and plan the attack. 2. Exploit known vulnerabilities then close or patch them. 3. Test for default user accounts then shut them down. To scout the terrain, run a simple port scan. This will reveal whether you are running an IPSec or SSL VPN. Even though you already know that, a port scan is a good defensive exercise that mirrors the steps of a potential intruder. Scan the network perimeter where the VPN may be located. The only caveat is to watch for bounced packets if the VPN is part of a combo with a firewall. If the scan shows that port 500 is open, the VPN is IPSec. Port 500 is the standard port for the Internet Key Exchange (IKE) protocol used for the key exchange required in IPSec. If the scan shows port 443 to be open, the standard port for SSL, then the VPN is obviously SSL. An SSL VPN uses the same port as any other SSL communication. The exploit phase of the test must go in one of two directions. Testing an IPSec VPN is very different from testing an SSL VPN. The IPSec VPN is network-based, while the SSL VPN is Web-based. In fact, the SSL VPN is essentially a Web application and should be tested as such. For IPSec VPNs, NTA Monitor has a tool called IKE-scan, which can fingerprint many VPN vendors and models. With that information, a hacker can search the Web for details of attacks against specific vendors. Exploits have been found and posted for Cisco, Nortel, Check Point and Watchguard devices. The tool can t fingerprint every VPN model, but it can reveal the type of authentication used in the VPN useful information for a prowling cracker. Other tools, like IKEProbe and IKECrack, take advantage of weaknesses in the pre-shared key (PSK) authentication used in IPSec VPNs. The hashes captured by these tools can then be run through ordinary password crackers, such as Cain and Abel, to steal passwords for malicious access to the VPN and, of course, the corporate network. For SSL VPNs, the same tools for scanning a Web application can be used. Tools can check for Web threats like cross-site scripting (XSS), SQL injection, buffer overflows, weak authentication and old-fashioned parameter manip- A Virtual Private Network (VPN) is like a large sign, saying Sensitive Data Here. Hackers know that when they ve found a VPN, they ve hit

the jackpot, because it means somebody is trying to secure something confidential. Therefore, like any other gateway, your VPN needs to go through a thorough penetration test to check for vulnerabilities. It s easy to overlook VPNs when pen testing your network, as it s often assumed that they re the most secure part of it. But, they re not and they re a magnet for hackers. Pen testing a VPN is straightforward, and there are some common tools for the job. It s not much different from the rest of your pen testing routine and should be part of it. There are two types of VPNs: IPSec and SSL. Which VPN you are running will determine how you conduct the pen test. Regardless, there are three basic steps to pen testing your VPN: 1. Scout the terrain and plan the attack. 2. Exploit known vulnerabilities then close or patch them. 3. Test for default user accounts then shut them down. To scout the terrain, run a simple port scan. This will reveal whether you are running an IPSec or SSL VPN. Even though you already know that, a port scan is a good defensive exercise that mirrors the steps of a potential intruder. Scan the network perimeter where the VPN may be located. The only caveat is to watch for bounced packets if the VPN is part of a combo with a firewall. If the scan shows that port 500 is open, the VPN is IPSec. Port 500 is the standard port for the Internet Key Exchange (IKE) protocol used for the key exchange required in IPSec. If the scan shows port 443 to be open, the standard port for SSL, then the VPN is obviously SSL. An SSL VPN uses the same port as any other SSL communication. The exploit phase of the test must go in one of two directions. Testing an IPSec VPN is very different from testing an SSL VPN. The IPSec VPN is network-based, while the SSL VPN is Web-based. In fact, the SSL VPN is essentially a Web application and should be tested as such. For IPSec VPNs, NTA Monitor has a tool called IKE-scan, which can fingerprint many VPN vendors and models. With that information, a hacker can search the Web for details of attacks against specific vendors. Exploits have been found and posted for Cisco, Nortel, Check Point and Watchguard devices. The tool can t fingerprint every VPN model, but it can reveal the type of authentication used in the VPN useful information for a prowling cracker. Other tools, like IKEProbe and IKECrack, take advantage of weaknesses in the pre-shared key (PSK) authentication used in IPSec VPNs. The hashes captured by these tools can then be run through ordinary password crackers, such as Cain and Abel, to steal passwords for malicious access to the VPN and, of course, the corporate network.

For SSL VPNs, the same tools for scanning a Web application can be used. Tools can check for Web threats like cross-site scripting (XSS), SQL injection, buffer overflows, weak authentication and old-fashioned parameter manipulation. The scan results can be followed by either automatic or manual tests to verify the vulnerabilities. Again, an SSL VPN is just a Web application. Test it like one. Finally, IPSec VPNs, like any firewall or network device, have default user accounts. These accounts are used for initial installation and aren t needed after that. Either remove them or change their names, where possible. The same goes for any administrative accounts used for routine maintenance. Change default passwords. A VPN isn t sacred. It s a network device like any other with flaws, blemishes and vulnerabilities. But, with proper pen testing, it can be hardened and secured, and effectively protect your network gateway.simple Steps to Securing Your SSL VPN Finally, IPSec VPNs, like any firewall or network device, have default user accounts. These accounts are used for initial installation and aren t needed after that. Either remove them or change their names, where possible. The same goes for any administrative accounts used for routine maintenance. Change default passwords. A VPN isn t sacred. It s a network device like any other with flaws, blemishes and vulnerabilities. But, with proper pen testing, it can be hardened and secured, and effectively protect your network gateway.