NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES



Similar documents
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

6425C - Windows Server 2008 R2 Active Directory Domain Services

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Reports, Features and benefits of ManageEngine ADAudit Plus

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Reports, Features and benefits of ManageEngine ADAudit Plus

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

FISMA / NIST REVISION 3 COMPLIANCE

BMC s Security Strategy for ITSM in the SaaS Environment

6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Security Policy for External Customers

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

NETWRIX IDENTITY MANAGEMENT SUITE

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Securing the Service Desk in the Cloud

Department of Information Technology Active Directory Audit Final Report. August promoting efficient & effective local government

AV-006: Installing, Administering and Configuring Windows Server 2012

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:

Locking down a Hitachi ID Suite server

Course 6425C: Five days

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

LogRhythm and NERC CIP Compliance

Guideline on Auditing and Log Management

Outline SSS Configuring and Troubleshooting Windows Server 2008 Active Directory

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Securing Active Directory Presented by Michael Ivy

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

JIJI AUDIT REPORTER FEATURES

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Kaseya Server Instal ation User Guide June 6, 2008

Vendor Questionnaire

Installing, Configuring, and Managing a Microsoft Active Directory

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

GFI White Paper PCI-DSS compliance and GFI Software products

NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Designing and Implementing a Server Infrastructure

Top 10 Security Hardening Settings for Windows Servers and Active Directory

R4: Configuring Windows Server 2008 Active Directory

Designing and Implementing a Server Infrastructure

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Security Controls for the Autodesk 360 Managed Services

McAfee Network Security Platform Administration Course

PCI Requirements Coverage Summary Table

Training Name Installing and Configuring Windows Server 2012

ManageEngine Desktop Central Training

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Automate PCI Compliance Monitoring, Investigation & Reporting

MS 20413A: Designing and Implementing a Server Infrastructure

Security and Rights Delegations for the Password Reset PRO Master Service Applies to software versions 2.x.x and 3.x.x

CHIS, Inc. Privacy General Guidelines

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

The Comprehensive Guide to PCI Security Standards Compliance

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Industrial Security for Process Automation

CorreLog Alignment to PCI Security Standards Compliance

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Logging In: Auditing Cybersecurity in an Unsecure World

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Windows Remote Access

INCIDENT RESPONSE CHECKLIST

ADSelfService Plus Client Software Installation Guide

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

Using NetIQ Security and Administration Products to Ensure HIPAA Compliance March 25, Contents

Client Security Risk Assessment Questionnaire

20413C: Designing and Implementing a Server Infrastructure

GE Measurement & Control. Cyber Security for NEI 08-09

Active Directory Objectives

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Ovation Security Center Data Sheet

MS Exam Objectives Administering Windows Server 2012 R2

Managing and Maintaining Windows Server 2008 Servers

Vistara Lifecycle Management

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Transcription:

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

Introduction Les Chafin; Infrastructure Engineering Manager» HPES NASA ACES Responsible for:» Active Directory, Exchange Engineering Team 2

Agenda NASA Consolidated Active Directory (NCAD) Active Directory Domain Disaster Recovery OU Structure Active Directory Management Suite» ADMS Directory and Resource Administrator (DRA)» ADMS Group Policy Administrator (GPA) Security Monitoring of Active Directory (SMAD) 3

NCAD NCAD Enterprise Program» Active Directory Domain» Active Directory Management Suite (ADMS)» Security Monitoring of Active Directory (SMAD) 4

Active Directory Domain ndc.nasa.gov Single Forest; Single Domain 2008 R2 Forest and Domain Functional Level Centralized Management Domain Controllers Located at Every Center» Redundant DC s At least two at every center» NASA E-Mail System» ASA Data Center Networks NASA IP Address Management (IPAM) DNS Primary» Underscore Zones Delegated 5

Continuity of Operations AD Fully Redundant» Every DC has a Writable Copy of AD Database NCAD Core Systems Backed Up Core Active Directory Roles Fully Transferable Disaster Recovery» Fully Exercised Every 3 Years 6

OU Structure Active Directory Account Management Provided by NASA Identity, Credential, and Access Management (ICAM) Team Typical Accounts OU Configuration Domain.nasa.gov» Accounts cc1 cc2 cc3 Note: cc = Two Letter NASA Center Code 7

OU Structure Typical NASA Center Level OU Configuration cc» cc-org1 cc-orggroups cc-orgsrv cc-orgws» cc-org2 cc-org2groups cc-org2srv cc-org2ws Note: cc = Two Letter NASA Center Code 8

Active Directory Management Suite (ADMS) Provides NASA Systems Administrators with the Ability to Manage AD Objects No Native AD Rights Required by NASA Systems Administrators Provides Audit Trail and Change Tracking Components:» NetIQ Directory and Resource Administrator (DRA)» NetIQ Group Policy Administrator (GPA) 9

DRA Role Based Administration Proxies Rights to Manage AD Objects Core Support Infrastructure» Primary DRA Server» Agency Accessible Web Consoles DRA Server Located at Each Center» Web Console» Scripting Capability Smart Card Access 10

DRA Roles Agency Roles» Agency Help Desk» Account Administrators Center OU Roles» System Administrator» Account Administrator 1» Computer Support Specialist 1 and 2» Help Desk» Group Membership Management Center Sub OU Roles» System Administrator» Account Administrator 1» Computer Support Specialist 1 and 2» Group Membership Management 11

DRA OU Roles Create/ Type of Privileged User Roles Password Reset Add/ Delete from Groups Help Desk x (ND GG ADMS cc HD) Create/Delete Computer Accounts Delete Groups Account Administrator 1 (ND GG ADMS cc Acct1) X (User Accounts) Computer Support Specialist 1 x (ND GG ADMS cc CS1) Computer Support Specialist 2 x x (ND GG ADMS cc CS2) (Computer accounts) System Administrator (OU Admin) x x x x (ND GG ADMS cc SA) Group Membership Role (Controls membership in named security groups) (in OU and GPO groups) X (User and Computer in Named Groups only) 12

GPA Role Based Administration Manage and Track Changes to Group Policy Objects» Changes Reviewed and Approved before Export to AD» Allows Roll Back to Previous Version GPO s Exported to Domain After Core Team Review Centralized Infrastructure 13

GPA Roles GPO Importer/Editor» Center Level Role» Edit or Import GPO s in the database GPO Approver» Center Level Role» Approves GPO Changes for Their Center GPO Export» Role Held by Members of NASA Core AD Core Team» Export Approved GPO s After Review 14

SMAD Security Monitoring for Active Directory (SMAD)» Provides Centralized Security Log Management» Event Monitoring, Correlation, Alerting, and Response» Security Reporting Designed to Monitor and Alert» NASA Consolidated Active Directory (NCAD)» Active Directory Management System (ADMS) environments» Security Monitoring for Active Directory (SMAD) system self monitoring 15

SMAD Overview Server Communicates via IPSEC Tunnel to Clients» Uses AES Encryption for all Log Traffic All Data is Digitally Signed Before Stored SMAD Protections» Limited Direct Access» Self Monitoring» Separation of Roles» File Integrity Checking» Process Checking» Change Monitoring» Privileged User Monitoring Investigations» Incident Response» Tracking for Support Groups Throughout Agency» Additional Active Directory Team Internal Investigations» SMAD Team Works with NCAD and Centers Incident Response Teams 16

SMAD Overview: Components SMAD Comprised of Three COTS Components» NetIQ Security Manager (SM) Real-time Monitoring of System Changes and User Activity Detection of threats and intrusions Security event management and correlation Central log management Incident response automation» NetIQ Change Guardian for Active Directory (CGAD) Monitors AD and provides alerting for unmanaged changes Software module for SM» NetIQ Change Guardian for Windows (CGW) Monitors OS level, files and directories, file shares, registry and system processes and provides alerting Software module for SM 17

SMAD Components: Logical Architecture 18

SMAD Statistics SMAD Entered Production Status 8/12/08 6 SMAD Production Servers 92 SMAD Agents 361,677,155 Events per week (Week of July 23 rd 2012)» AN Average of 51,668,165 Events/Day» Approx. 5,000 Alerts/Day Warnings, Errors, Critical Errors, Security Breaches, etc» PEAK 83 million Events/Day Security Log Archive Data» 7+ TB of Compressed Forensic Data 19

Questions? 20

Backup Slides 21

NCAD Operations ACES Data Center Operations Monitoring Team» 24x7 NCAD Patch Support» Windows Server Update Services (WSUS)» Patch Monthly based on MS Patch Release Schedule Server Health Monitoring» System Centers Operations Manager (SCOM) Centralized Anti-Virus Management» Symantec Endpoint Manager» Symantec Endpoint Client 22

ESD Helpdesk 24x7 Support DRA Agency Helpdesk Role Account Unlock, Password Reset, Account Enable 23

SMAD : Purpose Cont. SMAD helps meet requirements of FISMA and NIST Standards of security review, reporting, and remediation planning. Of particular mention for log management, SP 800-53 Guide for the Security Certification and Accreditation of Federal Information Systems» Within SP 800-53 are multiple controls that recommend regular review and monitoring of audit logs, especially within the Audit & Accountability Controls set, and Access Controls set. SP 800-92» Section 2.3.1 NIST accepts and recommends Federal Agencies to utilize systems that normalize and centralize logs for faster response to incidents and remediation.» Section 2.3.2 NIST specifies that host-based intrusion detections (HIDS) products are particularly helpful in finding patterns that humans cannot easily see such as correlating entries from multiple logs that relate to a single incident. Specifies that log analysis should be proactive not reactive. To achieve this logs must be reviewed in real-time or near-real-time manner. Without sound processes the value of the logs is significantly reduced. 2011 Introduction of SMAD Services 24

SMAD Components: Reporting Data Flow 25

Alert Response Process Alert- Console and email KB Populated with known issues Unknown conditions escalated to SMAD SA and SMAD SE SMAD SA receives alerts or call from NISC Investigates and evaluates condition Creates starting SIP Initiates IR Procedure 2011 Introduction of SMAD Services 26

IR process IR Process can be internally or externally initiated Ticket filed with NISC Incident opened at SOC MSFC and center ITSM(s) notified Data given to ITSM Incident Closed with SOC Ticket Closed Resolution Phase KB Updated Rules Updated Other policy, procedure changes if needed 2011 Introduction of SMAD Services 27

IR process SMAD SLA s First 30 minutes following a notification of a new alert : Staff is responsible to acknowledge the alert and decide if the alert is a false positive or requires further investigation First 1 hour following notification: SMAD Must assign a staff member to investigate the alert using NAF / ADMS Support Staff as needed First 1 hour following classification of Alert as an incident: Severity and classification of incident with SOC by US-Cert Standards Center(s) involved in the incident. (Including MSFC ITSM and OCSO) SOC must be notified and an incident number assigned Within 14 days: Alert must be resolved, and all technical person(s) completed their remediation activities SMAD SA or SE will create a SMAD Incident Package (SIP). SIP contains reports, events, alerts and attachments for investigation During this time the internal SMAD Resolution State will be set to Level 4 to keep the alerts active for 30 days. Within 21 Days: Closeout procedure completed. All Tickets closed / Incident Closed at SOC Any restored logs to the log archive server have been detached and space allocated back to system All items marked Level 4 are now marked resolved 2011 Introduction of SMAD Services 28

Rules Overview Default Rule Set Each module provides default rules 3,600 rules were evaluated Rules were enabled, disabled, customized Rule re-writes for correctness and reduce false positives DRA and DMA Managed / Unmanaged Changes Use of account tracked external to program Vulnerability Manager / Intrusion Manager Scripts analyze registry Services and Ports monitored CGAD / CGW Managed / unmanaged changes Track authorized / unauthorized changes 2011 Introduction of SMAD Services 29

Rules Overview Cont. Antivirus Check points Self Monitoring Heartbeat active Self log checking Archive Rule for Security Logs Correlation / Collection Activity Collects Suspicious Activity OU Move Logon Failure then Disabling Account Multiple Failed logons Logon Failure followed by Log Clearing Successful Attacks Failed logon followed by account creation Account granted act as operating system Failed admin logon followed by service account logon Multiple account lockout User Enabled and Disabled in Rapid Succession 2011 Introduction of SMAD Services 30

Rules Overview Cont. Customization Standard Accounts Defined High Profile Groups and Users Defined NetIQ Optimization Rules updated to properly handle user & workstation accounts Custom Enhancement during Incident Resolution Example: GPO Incident at a center GPG Reports available needed better solution New CGGP Solution only supports 32Bit DC s Custom Alerts SM Event Manager to detect event CGW to detect changes within /sysvol/ 2011 Introduction of SMAD Services 31