Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux



Similar documents
Best Practices For Department Server and Enterprise System Checklist

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

LINUX Operating System Audit & Assessment August 9, 2006

Configuring Secure Linux Hosts

CUIT UNIX Standard Operating Environment and Security Best Practices

How To Harden Cisco Linux On A Cisco Box On A Linux System On A Ubuntu System On An Ubuntu (Amd64) System On Cisco V2.2.3 (Ahemos) On A Windows 7 (

SSL Tunnels. Introduction

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Linux Security Ideas and Tips

Red Hat Enterprise Linux Benchmark v1.0.5

Bastille Linux: Security Through Transparency

SCP - Strategic Infrastructure Security

Guardium Change Auditing System (CAS)

Case Study: Access control 1 / 39

Operating System Security Hardening for SAP HANA

Unix Security. Vulnerability Assessment Course

Case Studies. Joint software development Mail 1 / 38. Case Studies Joint Software Development. Mailers

Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08

Security and Control Issues within Relational Databases

Configure Backup Server for Cisco Unified Communications Manager

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Network and Security Controls

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Detailed Analysis Achieving PCI Compliance with SkyView Partners Products for Open Systems

Guide. Operating System Security Hardening Guide for SAP HANA. Developed for SAP HANA Running on SUSE Linux Enterprise Server. Solution Guide Server

Healthcare Information Security Governance and Public Safety II

Best Practices to Secure Linux Server homing Oracle

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

HP Education Services

Center for Internet Security SUSE Linux Enterprise Server Benchmark

Network Infrastructure Security Recommendations

Linux FTP Server Setup

DenyAll Detect. Technical documentation 07/27/2015

HIPAA Compliance Use Case

14. CUCM 8 - free sftp solution for backup on ubuntu server

IT6204 Systems & Network Administration. (Optional)

Network Security Guidelines. e-governance

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Oracle Security Auditing

Oracle Security Auditing

GE Measurement & Control. Cyber Security for NEI 08-09

Security Best Practice

ACL Compliance Director FAQ

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Connectivity using ssh, rsync & vsftpd

Dynamic Data Center Compliance with Tripwire and Microsoft

This appendix describes the following procedures: Cisco ANA Registry Backup and Restore Oracle Database Backup and Restore

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Attack and Penetration Testing 101

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Looking at the SANS 20 Critical Security Controls

Using Network Attached Storage with Linux. by Andy Pepperdine

INFORMATION SECURITY TRAINING CATALOG (2015)

How To Manage A System Vulnerability Management Program

FREQUENTLY ASKED QUESTIONS

Linux VPS with cpanel. Getting Started Guide

Security Architecture & Risk Assessment

Security Training Programs

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments

CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE FOR ANY IDEAS OR RECLAMATIONS MAIL TO:

System Security Policy Management: Advanced Audit Tasks

CASHNet Secure File Transfer Instructions

SSH The Secure Shell

Cyber Exercises, Small and Large

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Introduction to the HP Server Automation system security architecture

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Secure Shell. The Protocol

Basics of Internet Security

The Operating System Lock Down Solution for Linux

CloudPassage Halo Technical Overview

Pragma FortressSSH 5.0

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

How To Harden An Hp Server For A Long Time

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Table of Contents. Introduction. Audience. At Course Completion

Principles of Information Assurance Syllabus

Codes of Connection for Devices Connected to Newcastle University ICT Network

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems

Transcription:

Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux

André Carrington, P.Eng, CISSP, CISM Unix experience: 13 years SunOS; NeXTSTEP; Sun Interactive; Wyse Unix; BSD; Solaris; QNX; HP-UX; Mandrake Linux; RedHat Linux; SUSE Linux; AIX As a user, developer, system administrator, webmaster, security specialist, security architect Professional IT experience: 13 years Recent: A Large Telco, Center for Internet Security (CIS), a commercial bank, etc. Also passed the CISA exam

What is hardening? Applying security controls to information systems to make them hard to exploit for unauthorized purposes. Preventing the candy-bar phenomenon: hard and crunchy on the outside, but soft and chewy on the inside.

What should be hardened? That is a risk-based decision. Any information system component can be compromised, so hardening guidelines and standards exist for: Servers Databases Workstations Routers Wireless access points Web server software E-mail server software

Assertions about hardening Hardening is: Effective Necessary to perform due diligence Measurable Detailed/skilled work that can be automated!

Hardening is effective According to the Center for Internet Security (CIS): The vast majority of cyber attacks exploit known vulnerabilities for which a patch or security configuration control is available. Solution: 80-100% of known vulnerabilities are blocked by implementing the CIS consensus benchmark configuration controls and applying available patches. http://www.cisecurity.org/documents/reducing_over_80.htm (based on studies by NSA, MITRE and Solutionary)

We ll come back to the other assertions

How do you harden a Unix system? Protect the system during setup Setup from scratch (or scan/review) Backup configuration files Apply patches Turn on system accounting/logging Turn off unneeded services Use secure services Tune file/directory permissions Tune system administration accounts Tune kernel parameters

E.g. Use secure services: SSH Configure and use SSH A tunnel that is encrypted and mutually authenticated that allows: SSH v2 instead of telnet SFTP, SCP instead of FTP, TFTP, rcp, rdist X-Windows in a secure manner Servers are authenticated with public keys stored on the client Clients are authenticated with public keys or passwords

SSH configuration script cp sshd_config sshd_config.tmp awk '/^#? *Protocol/ { print "Protocol 2"; next }; /^#? *X11Forwarding/ \ { print "X11Forwarding yes"; next }; /^#? *IgnoreRhosts/ \ { print "IgnoreRhosts yes"; next }; /^#? *HostbasedAuthentication/ \ { print "HostbasedAuthentication no"; next }; /^#? *PermitRootLogin/ \ { print "PermitRootLogin no"; next }; /^#? *PermitEmptyPasswords/ \ { print "PermitEmptyPasswords no"; next }; /^#? *Banner/ \ { print "Banner /etc/issue.net"; next }; {print}' sshd_config.tmp > sshd_config rm sshd_config.tmp

E.g. Tune file/directory permissions Review permissions & requirements: passwd, shadow, group User home directories & dot files World-writable files World-writable directories sticky bit Set-UID and set-gid files Nosuid option re: mounted file systems Unowned files

Set-UID/GID files Find them: for PART in `awk '($6!= "0") { print $2 }' /etc/fstab`; do find $PART \( -perm -04000 -o -perm -02000 \) \ -type f -xdev print done Compare them to a baseline (e.g. expected system files per a brand new installation also included with some tools) Watch for changes with a file integrity checker (and watch for new ones with a cron job)

E.g. Tune kernel parameters cat <<END_SCRIPT >> /etc/sysctl.conf # Following 11 lines added by CISecurity Benchmark sec 4.1 net.ipv4.tcp_max_syn_backlog = 4096 net.ipv4.tcp_syncookies=1 net.ipv4.conf.all.rp_filter = 1 net.ipv4.conf.all.accept_source_route = 0 net.ipv4.conf.all.accept_redirects = 0 net.ipv4.conf.all.secure_redirects = 0 net.ipv4.conf.default.rp_filter = 1 net.ipv4.conf.default.accept_source_route = 0 net.ipv4.conf.default.accept_redirects = 0 net.ipv4.conf.default.secure_redirects = 0 net.ipv4.icmp_echo_ignore_broadcasts = 1 END_SCRIPT chown root:root /etc/sysctl.conf chmod 0600 /etc/sysctl.conf cat <<END_SCRIPT >> /etc/sysctl.conf # Following 3 lines added by CISecurity Benchmark sec 4.2 net.ipv4.ip_forward = 0 net.ipv4.conf.all.send_redirects = 0 net.ipv4.conf.default.send_redirects = 0 END_SCRIPT chown root:root /etc/sysctl.conf chmod 0600 /etc/sysctl.conf

That seems like a lot of work!

How to make it easier Some vendors/resellers have images Dell, Oracle For your own installation images: Assemble scripts & baselines from standards like the CIS benchmarks Use the 80/20 rule select controls based on overall priorities/risks

Some issues may arise. Some application functions may not work right away Sometimes this identifies non-secure practices in vendor products Consider your options and resolve the conflict as needed Use standards that differentiate between: Actions that generally won t break functions Actions that may

Standards Organizations Center for Internet Security NIST (including DISA) NSA ISF Vendors also provide hardening guidelines

The Center for Internet Security (CIS) Modeled after other community initiatives, e.g., transportation safety A not-for-profit consortium of users Focused on the common needs of the global Internet community Convenes and facilitates consensus teams that develop detailed operational best practices

The CIS consensus process Teams are formed with security experts from CIS public and private sector member organizations I ve worked on teams with DISA, DOE, NIST, Cisco, Jay Beale, etc. An initial benchmark draft is obtained or developed Consensus is established via conference call discussion & e-mail Note: Benchmarks & scoring tools are made available free to all users globally via the CIS website

How do I audit my system?

The technical part of the audit can be automated. Free scoring tools CIS scoring tools are free for individual use within VA Scanners are focused on vulnerabilities in network services Address local users; prevent candy bars Assists with intrusion detection Other platforms: Cisco RAT; MBSA Commercial enterprise management tools There are many: ISS, Computer Associates, etc. Some can score against published standards

The old CIS scoring tool was textbased (default installation sample). *** CIS Ruler Run *** Starting at time 20051010-19:58:57 Positive: 1.1 System appears to have been patched within the last month. Negative: 1.2 sshd_config parameter Protocol is not set. Negative: 8.10 Current umask setting in file /etc/profile is 022 -- it should be stronger to block group-read/write/execute. Negative: 8.10 Current umask setting in file /etc/csh.login is 022 -- it should be stronger to block world-read/write/execute. Negative: 8.10 Current umask setting in file /etc/csh.cshrc is 000 -- it should be stronger to block group-read/write/execute. Negative: 8.11 Coredumps aren't deactivated. Preliminary rating given at time: Mon Oct 1 19:58:58 2005 Preliminary rating = 5.85 / 10.00 Positive: 6.6 No non-standard world-writable files. Positive: 6.7 No non-standard SUID/SGID programs found. Ending run at time: Mon Oct 1 19:58:59 2005 Final rating = 6.15 / 10.00

The new scoring tool is in development (Windows sample)

The Audit process Policy Processes Configuration Activity

Audit Policy Processes Deployment Administration Monitoring Configuration Activity

Audit Policy Processes Deployment Administration Change Management Patch Management Backup and Recovery Monitoring Configuration Activity

Audit Policy Processes Deployment Administration Monitoring Vulnerability Assessment Log Review & HIDS Compliance Review Configuration Activity

Audit Policy Processes Configuration Scoring tools Hardening scripts Activity

Audit Policy Processes Configuration Activity User Login Attempts File changes Root shell commands Errors

How audit fits into the lifecycle Audit Standardize Harden Monitor

The management view of it Audit Standardize Harden Monitor Risk of policy & practice; corrective action Set/negotiate/review standards Assist Raise awareness; require training

In conclusion I have addressed the assertions that hardening is: Effective Necessary to perform due diligence Measurable Detailed/skilled work that can be automated!

Thank-you for your time. André Carrington, P.Eng, CISSP, CISM