LINUX Operating System Audit & Assessment August 9, 2006



Similar documents
SCP - Strategic Infrastructure Security

Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux

BF2CC Daemon Linux Installation Guide

Nixu SNS Security White Paper May 2007 Version 1.2

Open Source Security Tool Overview

Nessus Agents. October 2015

Linux Operating System Security

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint

Detailed Analysis Achieving PCI Compliance with SkyView Partners Products for Open Systems

Operating System Security Hardening for SAP HANA

Bastille Linux: Security Through Transparency

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

ENTERPRISE LINUX SECURITY ADMINISTRATION

GL550 - Enterprise Linux Security Administration

Using SNMP with Content Gateway (not V-Series)

Attack and Penetration Testing 101

An Introduction to Event Modeling and Correlation. Stephen Rondeau Institute of Technology

Security and Control Issues within Relational Databases

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Principles of Information Assurance Syllabus

Network and Server Statistics using Cacti

Acronis Backup & Recovery 10 Server for Linux. Installation Guide

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Sample. WebCenter Sites. Go-Live Checklist

Fedora 14 & Red Hat. Descripción del curso:

Network and Server Statistics Using Cacti

Introduction to Computer Administration. System Administration

Hardened Hosting. Quintin Russ. OWASP New Zealand Chapter th December 2011

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

C13 - Establishing a Windows Baseline Mike Villegas

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Network and Server Statistics Using Cacti

WordPress Security Scan Configuration

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction

How to Restore a Linux Server Using Bare Metal Restore

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Net/FSE Installation Guide v1.0.1, 1/21/2008

DenyAll Detect. Technical documentation 07/27/2015

How To Harden An Hp Server For A Long Time

What s New in Centrify Server Suite 2015

ENTERPRISE LINUX SYSTEM ADMINISTRATION


Kevin Cardwell. Toolkits: All-in-One Approach to Security

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

May PZ-0502A-WWEN Prepared by: Internet & E-Commerce Solutions

User Guide - escan for Linux File Server

Discovering Mac OS X Weaknesses and Fixing Them with the New Bastille OS X Port

Avira AntiVir MailGate 3.2 Release Notes

Introduction to Operating Systems

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Management, Logging and Troubleshooting

3 Days Course on Linux Firewall & Security Administration

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Healthcare Information Security Governance and Public Safety II

Heroix Longitude Quick Start Guide V7.1

Securing your Linux Server: Racing against the attacker. Nigel Edwards Hewlett-Packard

Viking VPN Guide Linux/UNIX

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)

vtiger CRM 4.2 Installation Guide for Linux OS

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

Getting Started with RES Automation Manager Agent for Linux

Mapping EventTracker Reports and Alerts To FISMA Requirements NIST SP Revision 3 Prism Microsystems, August 2009

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

HelpSystems Web Server User Guide

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

System Admin Module User Guide. Schmooze Com Inc.

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

Network Security and Firewall 1

Configuration Audit & Control

Security Correlation Server Quick Installation Guide

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux

Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05

Trust but Verify: Best Practices for Monitoring Privileged Users

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

CloudPassage Halo Technical Overview

Oracle Fusion Middleware 11gR2: Forms, and Reports ( ) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64

Vulnerability Assessment Lab

- PUBLIC REPORT - CITY OF SAN ANTONIO INTERNAL AUDIT DEPARTMENT

ENTERPRISE LINUX SECURITY ADMINISTRATION

Of Penguins and Wildebeest. Anthony Rodgers VA7IRL

SECURE YOUR NETWORK WITH FIREWALL BUILDER

Windows 2000/Active Directory Security

CRYPTUS DIPLOMA IN IT SECURITY

Fundamentals of a Windows Server Infrastructure MOC 10967

Workflow Templates Library

Verax Service Desk Installation Guide for UNIX and Windows

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

Transcription:

LINUX Operating System Audit & Assessment August 9, 2006 www. lsat.sourceforg net (LSAT). www.bastille-linux.org (Jay Beale) (today s script 8.4) No longer completely free: www.cisecurity.org Standard disclaimer, I never said THAT, and if you did THAT, and something broke, it s your own durn fault. Also, the views expressed here are mine, not my past, present or future employer s, and not the conference sponsor, nor any quail hunting partners. When using any tool, do no harm. AU4 11/14/2005 Michael T Hoesing CISA, CISSP, CIA, CCP, CMA, CPA m-hoesing@cox.net (402) 981-7747

Learning Objectives Define an Audit Approach/Methodology Determine Audit Goals, Objectives, Scope Individual Tests to Achieve the Goals (7) Other Resources Auditing Example an independent assessment process (take home scripts)

Audit Approach Determine Key Success Criteria (objectives) Define System Under Review (scope, LINUX, file server, web server, both) Assess Risk (focus test resources where appropriate) Gather Standards (policy, procedures, regulation, contracts) Inventory the Current State (the scripts) Compare the Current State to Standards (analysis) Investigate Differences (reporting, correction)

Audit Objectives and Risks Authorized User Access High Authorized Services, Daemons, Modules High Authorized Networking/Connections High + Authorized File Access Appropriate Recording/Logging Appropriate Security Parameters Authorized Applications High High High High

Scope Which Systems? (risk based) How much time for each system? How much sys admin time for each system? How Long of a Duration? Who approves scope expansion?

Standards (if you don t have them the auditor will be happy to set them for you) Organization Policy, Standards, Procedures Regulation Contractual Requirements Industry Best Practice Center for Internet Security (CIS) [Jay Beale] Linux Benchmark Standards http:// www cisecurity.org standard is free assessment script is not free (version 1.6.8 on disk) approach = compares to specific metrics (8.3 password maximum days > 90 shows as negative) Bastille now has an assess option

Other Standards Resources More industry standards http:// www. linuxsecurity.com 8/05 Jay Beale contributor LINUX Security, Audit and Control Features http://www.isaca.org/bookstore Auditing Linux Krishni Naidu http:// www.sans.org/score/checklists/auditinglinux.doc SANS.ORG - Paul Santos http:// www.sans.org/rr/papers/index.php?id=81 Raul Siles www. giac.org/practical/gcux/raul_siles_gcux.pdf/

LINUX Tests User Access Who can be on the system, match to job function? Who is on the system right now? Password encryption in use? Who can be root? From where can root access the system? What default and group ID s are present?

LINUX Tests Services What services were loaded at startup? What processes are currently running? What services are set to run? What modules are loaded? What is accessing the CPU currently? What jobs are scheduled to run?

LINUX Tests Networks/Connections What networking devices are attached? What other hosts can connect to the system under review? What communication protocols are used? What routes are enabled? Firewall enabled?

LINUX Tests File Systems What file systems are in use? Which files and directories are world writeable? What are the permissions on sensitive files & directories? What files were changed in the last day? 1. Who changed it? 2. Why, was that authorized? 3. Was the change tested?

LINUX Tests Logging What was recorded recently in the systems event log? /var/log/messages What other logs are available? Who can alter the log file? Where are logs stored?

LINUX Tests Security Parms What automated password controls are in place? /etc/login.defs Min days password life Max days password life Password Length Display last login time Tries before lockout Umask motd (banner) Password Strength? (suggest or force) character_class

LINUX Tests Applications What applications are installed? (rpm) Are they running? (top) What malware is present? (chkrootkit) Are there any monitoring tools? (tripwire, FAM)

Other Test, test, test Before using the Script Flavors of LINUX (SuSE 8-9.3, 10.0, 10.1 Debian, Mandrake, SLES 8.1,9 and 10, Red Hat Enterprise 2.x, Fedora, ) Scripts gather information to discuss, they rarely produce reportable issues Portable to UNIX? Time.2 40 minutes if not testing WW files CPU usage - minimal

Other Resources (cont) Seccheck SuSE 9.x distros, nice password & shadow checking Hardening EAL3 www.124.ibm.com/linux/pubs/ (many other LINUX topics) Hardening LIDS www.lids.org Security Enhanced Linux from NSA (SELinux) nsa.gov/selinux Fedora Core 4&5 install option Hardened Gentoo http://www.gentoo.org/main/en/about.xml Syslogs analysis = SNARE, Chksyslog, logwatch, router logs = mrtg-0.9.0 Scanners = Netrecon, metasploit, chkexploit_1_13, nessus

Other Resoures (cont 2) Auditor Knoppix 3.8.1 Distro w ww.remoteexploit.org/index.php/auditor_main June 20, 2005 phlak.org 0.3 CD distro with tools http://www.linux-sec.net/harden/harden.gwif.html www,linux-sec.net/distro/ variety of linux distributions Linux from scratch www.linuxfromscratch.org LSAP.ORG volunteers desk checking code anti-exploit-1.3 file listener www.aduva.com Soundcheck (dependancy check) http://h20219.www2.hp.com/services/cache/109962-0-0-225-121.html HP Linux Security Assessment $250/hr

Show Tool Results Here Show the Audit Program Show the Script File MTH 8.4 (w chkrootkit 46a) LSAT 0.9.3 Bastille 3.0.8-1.0 CIS 1.6.8 (not updated since 2005) Nessus 3.0.3 Run the Scripts Compare Results to Standards

Questions?? (now that Bill is retiring,who is going to demo new blue-screens at conferences?)????