Host/Platform Security. Module 11



Similar documents
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Chapter 9 Firewalls and Intrusion Prevention Systems

Computer Security: Principles and Practice

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Presented by: Mike Morris and Jim Rumph

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Critical Security Controls

Computer Security DD2395

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Did you know your security solution can help with PCI compliance too?

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Section 12 MUST BE COMPLETED BY: 4/22

Secure Your Mobile Workplace

Locking down a Hitachi ID Suite server

GFI White Paper PCI-DSS compliance and GFI Software products

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Endpoint protection for physical and virtual desktops

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Global Partner Management Notice

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Nixu SNS Security White Paper May 2007 Version 1.2

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Endpoint protection for physical and virtual desktops

A Case for Managed Security

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Firewalls and Software Updates

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Building A Secure Microsoft Exchange Continuity Appliance

Goals. Understanding security testing

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

PCI Data Security Standards (DSS)

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Intro to Firewalls. Summary

Firewalls, Tunnels, and Network Intrusion Detection

DMZ Gateways: Secret Weapons for Data Security

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Zone Labs Integrity Smarter Enterprise Security

Firewalls CSCI 454/554


Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Intego Enterprise Software Deployment Guide

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

IBM Security Strategy

74% 96 Action Items. Compliance

Cyber Essentials Questionnaire

Introduction of Intrusion Detection Systems

Discovering passwords in the memory

Network Defense Tools

AN OVERVIEW OF VULNERABILITY SCANNERS

Security Administration R77

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

13 Ways Through A Firewall

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

How To Protect Your Network From Attack From Outside From Inside And Outside

Nessus Agents. October 2015

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

What Do You Mean My Cloud Data Isn t Secure?

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Network Instruments white paper

Cyber Essentials Scheme

Seven Strategies to Defend ICSs

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

CMPT 471 Networking II

Computer Security DD2395

Top 20 Critical Security Controls

Firewalls Overview and Best Practices. White Paper

ABB s approach concerning IS Security for Automation Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

The Advantages of a Firewall Over an Interafer

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Using Remote Desktop Clients

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Endpoint Security Management

13 Ways Through A Firewall What you don t know will hurt you

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Transcription:

Host/Platform Security Module 11

Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic is less restricted A person or software may initiate contact to a malicious site or person An established connection tends to be by bidirectional, so although the connection was initiated from the inside, the attacker can take control 2

Necessity Famous Internet security quote related to firewalls: Hard crunchy shell around a soft chewy center William Cheswick The soft chewy center refers to the technology and information being protected by the firewall Once passed the firewall, an attacker has an easy time of achieving their objectives 3

Necessity Host/Platform Security attempts to: Secure a resource by placing protection as close to it as possible Adjusting and maintaining the resource so it is ideally not vulnerable to attacks. Threat x No Vulnerability x Impact = No related loss When protecting a person, you: Put bodyguards near the protectee Give the protectee body amour if necessary Limit the protectee from risky activities Control access to protectee while at rest 4

Host/Platform Security This topic relates to: Servers especially those that are located in dangerous portions of the network Portable computers and devices that leave the protection of an IT environment Remote or network related threats are typically of greatest concern for servers Portable equipment has the added challenge of being lost or stolen 5

Approaches to Host Security Computer security is our primary focus Bastion Host Passive Bastion is a term the refers to fortifications of a castle or fort. A bastion host is difficult to breach because it has fewer weaknesses. Endpoint security controls Active Host firewalls Host Intrusion Detection/Host Intrusion Prevention File system integrity monitoring Disk encryption Strong console authentication 6

Bastion Host Requires a narrow well defined operational role Will likely be located in hazardous network environments Another possibility, the host handles highly sensitive information or performs critical computations Other defenses may be protecting, however, risk remains high 7

Bastion Host In most non-classified settings: Publically available operating system is used OS is hardened Service-software security is implemented Service design is evaluated and possibly adjusted Service configuration is evaluated and possibly adjusted Patches are investigated and applied Securing devices Hardening checklists are available for some devices 8

OS Hardening Basic idea Only allow what is absolutely necessary to run or even exist on the system. Secure those applications, services and libraries that will run on the system. Patch vulnerabilities when patches are available Configure every functional element (command line utilities, services, applications) conservatively Conveniences may need to be disabled Limit trust prepare for malicious change and replacement on system or another system it trusts 9

Side effects: OS Hardening Good: The attack surface has been reduced. There is less for an attacker to exploit. Bad: The system will be harder to manage, which means requiring more time and possibly more people than a less secure system. Bad: Dependency between applications and OS libraries and OS services may may result in broken apps. The supporting features may be too risky to allow. 10

Services-Software Security In-house developed software should follow secure coding best practices Limit the complexity of the deployed service if possible Limit access to service s dataset and configuration information Carefully consider how service is configured and managed 11

Service-Software Security Network services responding to requests may be asked to respond to a malicious requestor. Require authentication when possible Filter request content by removing or modifying requests that may contain attempts to exploit input processing vulnerabilities Patch services when patches are available Limit features available to only those necessary 12

Ideal Bastion Host Host can survive in dangerous environment with no external supplemental protection (e.g. firewalls) It is hard to be confident when: Future vulnerabilities are unknowable and potentially some current vulnerabilities are being kept secret 13

Endpoint Security Term traditionally refers to security for user devices, but servers may benefit from this technology Types of technology Firewall TCP wrappers for services HIDS/HIPS Anti Virus - File system integrity monitor - Disk encryption - Strong console authentication 14

Host based firewalls Host-Based Firewall Protect TCP/IP stack from connection attempts permitted by network firewall or originating from behind the firewall Another host on LAN may have been compromised Some will limit which processes may use the network Rouge software or malware may attempt to connect out 15

TCP Wrappers Concept: Security services listening on open TCP and UDP ports that allow only authorized IP addresses to connect to a TCP or UDP service. Modular network access control Primarily a Unix and Linux security option 16

HIDS/HIPS Host Intrusion Detection System (HIDS) Monitors logs and other vital operating system data looking for malicious activity Alerts administrators if events of concern occur Host Intrusion Prevention System (HIPS) Some solutions are policy oriented, and will deny behavior not consistent with policy Some solutions use operating patterns to determine an intrusion and will stop activities 17

Anti-Virus Malware is a significant threat to the environment Primary targets are hosts and devices Server oriented anti-virus may be helpful Preventing malware from exploiting server vulnerabilities Cleaning up malware that successfully loaded on the host 18

File System Integrity Monitor Host file systems contain thousands of files in hundreds of directories Integrity monitoring checks for content change in files and directories Detected: New files and directories Removed files and directories Changes to files and directories 19

Disk Encryption Encryption of the entire disk This technology is most relevant to systems that are anticipated to be moved around Laptops Portable devices Once the system successfully starts the encryption is no longer relevant A server s file system is accessible most of the time, because it remains online 20

Strong Console Authentication Password authentication for privileged accounts is inadequate Exposure resulting from unencrypted networking Keystroke logging on remote client and possibly on server Deliberate or accidental credential sharing Password reuse exposes every host configured with same password Password storage can be compromised 21

Strong Authentication Qualities Multi-factor that relies on a combination of: What you know? What you have? What you are? Authenticator is non-reusable or one time use Time based schemes (e.g. Google 2-Step authentication) are subject to reuse Screen scraping trojans can capture entry and enable reuse within time window 22

Host/Platform Security Relies on disabling features Modifying configuration details Ensuring software is patched Adding or enabling additional controls Staying informed Vulnerabilities Threats 23