Information. Questions will be answered at the end. Please submit questions to Erick Mendoza using the chat function.



Similar documents
Using a VPN with Niagara Systems. v0.3 6, July 2013

Niagara AX Hardening Guide. Tips to Secure a Niagara AX System

Using a VPN with CentraLine AX Systems

Technical Document. NiagaraAX SSL Connectivity Guide. August 30, 2012

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Security. TestOut Modules

7.1. Remote Access Connection

SSL Guide. (Secure Socket Layer)

PowerChute TM Network Shutdown Security Features & Deployment

Small Business Server Part 2

Enterprise Security Interests Require SSL with telnet server from outside the LAN

LDAP User Service Guide 30 June 2006

RemotelyAnywhere. Security Considerations

Implementing Secure Sockets Layer on iseries

DiamondStream Data Security Policy Summary

Integrated SSL Scanning

Network Configuration Settings

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

1. Scope of Service. 1.1 About Boxcryptor Classic

Integrated SSL Scanning

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Secure Socket Layer (SSL) Machines included: Contents 1: Basic Overview

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

SAS Mobile BI Security and the Mobile Device

IIS 6.0SSL Certificate Deployment Guide

EMR Link Server Interface Installation

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Catapult PCI Compliance

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Cloud Security:Threats & Mitgations

Cisco QuickVPN Installation Tips for Windows Operating Systems

Angel Dichev RIG, SAP Labs

Training module 2 Installing VMware View

2X SecureRemoteDesktop. Version 1.1

ReadyNAS Remote. User Manual. June East Plumeria Drive San Jose, CA USA

1. Product Information

Sync Security and Privacy Brief

A Guide to New Features in Propalms OneGate 4.0

Enabling SSL and Client Certificates on the SAP J2EE Engine

Security Policy JUNE 1, SalesNOW. Security Policy v v

Online Backup Client User Manual Linux

VNC User Guide. Version 5.0. June 2012

Carillon eshop User s Guide

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

BlackBerry Enterprise Service 10. Version: Configuration Guide

Sophos Mobile Control SaaS startup guide. Product version: 6

Section 12 MUST BE COMPLETED BY: 4/22

GoToMyPC Corporate Advanced Firewall Support Features

CTS2134 Introduction to Networking. Module Network Security

Web Plus Security Features and Recommendations

RecoveryVault Express Client User Manual

Web Security School Entrance Exam

How To Understand And Understand The Security Of A Key Infrastructure

DRAFT Standard Statement Encryption

Sophos Mobile Control Installation guide. Product version: 3.5

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

Online Backup Linux Client User Manual

Sophos Mobile Control Installation guide. Product version: 3

Supplier Information Security Addendum for GE Restricted Data

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Online Backup Client User Manual

CS5008: Internet Computing

FileCloud Security FAQ

Introduction to Mobile Access Gateway Installation

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Configuring Secure Socket Layer (SSL)

AkrutoSync 4.0 User Guide

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

CHIS, Inc. Privacy General Guidelines

Salesforce1 Mobile Security Guide

Security IIS Service Lesson 6

Kaspersky Lab Mobile Device Management Deployment Guide

End User Devices Security Guidance: Apple OS X 10.10

Executive Summary and Purpose

Quickstream Connectivity Options

Corporate and Payment Card Industry (PCI) compliance

Advanced Diploma In Hardware, Networking & Server Configuration

Security Considerations White Paper for Cisco Smart Storage 1

IceBreak FileShare. Quick Guide. File sharing with workflow management

Security Policy Revision Date: 23 April 2009

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.7+

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist

Chapter 17. Transport-Level Security

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Windows Remote Access

BYOD Guidance: BlackBerry Secure Work Space

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

Transcription:

Information Questions will be answered at the end. Please submit questions to Erick Mendoza using the chat function.

Securing Niagara, Part 2 Java 1.7.0.25 Update Announcement Review basic hardening steps Discuss basic usage of SSL functionality Discuss VPNs Highlight recent update changes The Future Questions

Review System security is like an onion: No, not because it smells bad (although it can) It is made up of LAYERS

Review Passwords Change the Default Platform Credentials Use Strong Passwords Enable the Account Lockout Feature Use the Password History Use the Password Reset Feature Leave the Remember These Credentials Box Unchecked

Review Account Management Use a Different Account for Each User Assign the Minimum Required Permissions Use a Single Super User Require Super User Permissions for Program Objects Use the Minimum Required Permissions for External Accounts

Review Authentication Use Digest Authentication in the FoxService Set the FoxService Legacy Authentication to Strict Use cookie-digest Authentication in the WebService

Review TLS/SSL & Certificate Management Enable Platform SSL Only (3.7+ only) Enable Fox SSL Only (3.7 only) Enable Web SSL Only Enable SSL on Other Services Set Up Certificates

Review Additional Settings Disable FTP and Telnet Remove the serial shell jumper Disable Unnecessary Services Blacklist Sensitive Files and Folders Update NiagaraAX to the Latest Release

Review External Factors Install JACEs in a Secure Location (locked room, wiring in conduit, etc) Make Sure that Stations Are Behind a VPN Even internally, make sure that stations are behind a firewall with only necessary ports open Protect your backups

SSL Pair Certificate Self Signed Certificate Trusted Certificate Certificate Authority (CA) Certificate Chain SSL Handshake SSL and NiagaraAX

SSL Pair Public Private Common sizes: 1024 and 2048 bits

SSL Certificate Certificate Metadata Issuer Subject expiration Public key usage serial number etc Private Signature

SSL Self Signed Certificate Certificate Public Private Metadata Issuer Subject expiration key usage serial number etc Signature

SSL Trusted Certificate Certificate Public Trusted Source Private Metadata Issuer Subject expiration key usage serial number etc Signature

SSL Signed Certificate CA Certificate CA Public CA Private Signature Certificate Public Private Signature

SSL Certificate Chain Root CA Certificate Root CA Public Root CA Private Signature Intermediate CA Certificate Intermediate CA Public Signature Intermediate CA Private End Certificate End Public End Private Signature

SSL Certificate Validation End Certificate End Public Signature Intermediate CA Certificate Intermediate CA Public Signature Sent to the client by the server From the trust store Root CA Certificate Root CA Public Signature

SSL Certificate Validation Certificate chain is valid and trusted Certificate Distinguished name matches server address usage is valid Certificate is in the valid date range Metadata Issuer Subject expiration Public key usage serial number etc Signature

SSL Handshake Client Browser Requests Secure Socket (https://yadda.com) Session Seed is Encrypted with SSL Public From Server Encrypted Data Server Server Responds with SSL Certificate Chain Server Indicates All Transmissions Are Encrypted Encrypted Data

SSL Certificate Tools

SSL Client Interface

SSL Server Configuration Web Service (port 443) Fox Service (port 4911) Niagarad (port 5011)

SSL Small Network Example CA Certificate Installed on Client Machines in Their Trust Store CA Private Used to Sign Server Certificates

SSL Large Network Example Root CA Certificate Installed on Client Machines in Their Trust Store Root CA Private Used to Intermediate CA Certificates Intermediate CA Private Used to Sign Server Certificates Intermediate CA Certificate

VPN Workbench PC Jace Router PC with Browser Cable/DSL Modem Supervisor Workbench PC Typical Niagara Setup - with all ports forwarded, it gives full access to web, fox, niagarad

VPN Workbench PC Jace Router PC with Browser Cable/DSL Modem Supervisor Workbench PC A port scan would reveal all open Niagara ports Attackers could use weak credentials or known vulnerabilities to exploit the system.

VPN Workbench PC w/ VPN Client Jace PC with Browser Cable/DSL Modem Router VPN Supervisor A port scan would only reveal the VPN port Once connected, the client PC is effectively part of the local network. Workbench PC

VPN The VPN Guide discusses all this in great detail It also provides an example setup using a ZyWall USG 20 Supports the built in VPN clients in Windows, Android and ios. In addition to client to server connections, a VPN can also support a persistent connection between remote networks Station to station connections

Niagara Updates Enhanced password management PBKDF2-SHA256 AES-256 Enhanced digest authentication SCRAM-SHA256 Miscellaneous other security fixes

The Future Always improving! Encrypted backups Rolling keys Two factor authentication Sandboxing and more!!

FAQ Won t SSL slow things down? What is the difference between a firewall and a VPN? If I m using a VPN, do I need to use SSL? If I m using SSL, do I need to use a VPN? If Tridium is pushing secure by default, why isn t SSL enabled by default?

Sources for Good Information Niagara Hardening Guide Available next week VPN Guide Available next week Niagara SSL Documentation (docssl) In 3.7 release SNA Forum on LinkedIn ICS-CERT http://ics-cert.us-cert.gov/ Niagara Central http://www.niagara-central.com Schneier on Security http://www.schneier.com/

Questions