IS3440 Linux Security Unit 3 User Account Management

Slides:



Advertisements
Similar presentations
Linux Users and Groups Management
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 2 Manage User Access and Security.
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
Linux+ Guide to Linux Certification, Second Edition
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Linux Security.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Guide to Operating System Security Chapter 4 Account-based Security.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Linux+ Guide to Linux Certification, Third Edition
File Permission and Access. Module 6 File Permission and Access ♦ Introduction Linux is a multi-user system where users can assign different access permission.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
CHAPTER Creating and Managing Users and Groups. Chapter Objectives Explain the use of Local Users and Groups Tool in the Systems Tools Option to create.
Chapter 10: Rights, User, and Group Administration.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 2 Establishing and maintaining baseline security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
NetTech Solutions Security and Security Permissions Lesson Nine.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
SCSC 455 Computer Security Chapter 3 User Security.
Privilege Management Chapter 22.
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
19 Copyright © 2008, Oracle. All rights reserved. Security.
AFA CyberCamp Module 4. Day One Cyber Safety Day Two Windows System Administration Day Three Intermediate Windows Security Day Four Intro to Linux and.
Chapter 6 – Users, Groups, and Permissions
Chapter 5 : Designing Windows Server-Level Security Processes
Chapter 11: Managing Users
Configuring and Troubleshooting Routing and Remote Access
Chapter 2 User Management
CompTIA Security+ Study Guide (SY0-401)
Linux Users and Groups Management
IS4550 Security Policies and Implementation
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Single Sign-on with Kerberos
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
IS3440 Linux Security Unit 7 Securing the Linux Kernel
COP 4343 Unix System Administration
Operating System Security
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Module 13 System and User Security
Adding New Users.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

IS3440 Linux Security Unit 3 User Account Management

Class Agenda 3/30/16 Covers Chapter 4 Learning Objectives Quiz 1 Discussion on Lab Activities. Lab will be perform in class. Break Times as per School Regulations.

Learning Objective Explain user account management and the principle of least privilege to protect and secure the system and its data.

Key Concepts Policies for user accounts Boundaries for the user, system, and root accounts Group accounts for managing the security process Pluggable Authentication Modules (PAM) Special user privileges for accessing files, including the executable files

EXPLORE: CONCEPTS

Defining the User Account Policy Who needs access and why? How long does a user need access? Where will the user access the computer system from? What are the tasks the user needs to perform?

Some Security Startegies Establishing a user account policy Enforcing password policies and mandatory password change on a Linux system and setting expiration dates for temporary users Granting special privileges by using sudo command

Best Practices for Account Management Create a password policy in /etc/login.defs file. Lock user accounts that will not need access for a long period of time. Set account expiration for temporary accounts. Remove user and service accounts that are no longer being used. Monitor account usage and login attempts.

System, Service, and Regular User Accounts System Account Service Account Regular Account Created when the operating system is installed Created automatically when installing a service using a package management program Created by root or an account with privileged access Users and groups < 100 Users and groups < 500 Users and groups > 500 Login directory typically set to /sbin/nologin or a system command, such as /sbin/shutdown Login directory mostly set to /sbin/nologin but may also be set to a typical login shell, such as /bin/bash Login directory set to /bin/bash

Password configuration file Users were configured in /etc/passwd Groups were configured in /etc/group“ This are readable text file. Shadow password suite developed. "/etc/shadow and /etc/gshadow“ Is encrypted

EXPLORE: PROCESSES

Establishing a User Account Policy 9/19/2018 Establishing a User Account Policy 1. Open the /etc/login.defs file. 2. Set the Password Change directive. 3. Set the Warn directive. 4. Set the password minimum length. 5. Enable login failure logging. 6. Enable successful login logging. 7. Enable the su command. 8. Save and exit. Here are the commands used for this process: Open the /etc/login.defs file. Su –c ‘vi /etc/login.defs Set the Password Change directive. PASS_MAX_DAYS 60 Set the Warn directive. PASS_WARN_AGE 14 Set the password minimum length. PASS_MIN_LEN 8 Enable login failure logging. FAILLOG_ENAB Enable successful login logging. LOG_OK_LOGINS Enable the su command. SYSLOG_SU_ENAB Save and exit. (c) ITT Educational Services, Inc.

Managing Password Change and Expiration Dates The following change commands are used to enforce password change and expire accounts: The command to enable user “jdoe” to change password at next login: [root@is418 ~]# chage -d 0 jdoe The command to expire the user account “jane” on May 31, 2011: [root@is418 ~]# chage -E “05/31/2011” jane

Using sudo Command 1 As a root user, issue the following command: [root@is418 ~]# visudo 2 Enable ALL privileges to user “jdoe” by using the following command: jdoe ALL=(ALL) ALL 3 Login as “jdoe” and use the following sudo command: [jdoe@is418 ~]# sudo useradd maryj

EXPLORE: ROLES

Network User Verification Tools Network Information Service (NIS) Lightweight Directory Access Protocol (LDAP). NIS- It transmits data, including password hashes, over the network without encryption." Not encrypted and not secured

Lightweight Directory Access Protocol (LDAP). LDAP-May be the more secure choice Used to authenticate users on Microsoft and Apple operating systems Supports Secure Sockets Layer (SSL) and Transport Layer Security (TLS). encryption Linux implementation is known as OpenLDAP

Linux System Administrator Creates user accounts Enforces user account and password policy Establishes user account policy

Files with Access Control List (ACL) Permissions 9/19/2018 Files with Access Control List (ACL) Permissions ACL grants special permissions that are not part of the regular file permissions. These files are used to provide a user or group special access to a file or executable without changing the file permissions. Permissions can be granted to a user (u), a group (g), and others (o). Permissions are typically read, write, and execute. Types of permissions example: A file may have the following permissions: -rw-rw---- root.root /etc/secret_file.txt The first ‘-’ means this is a file not a directory. The next three characters ‘rw-’ means the owner has read and write permissions but cannot execute these permissions as denoted by the ‘-’ symbol. The next set ‘rw-’ represents the group owner has read and write permissions. The next set ‘---’ means others have no permissions at all to the file. The next set ‘root.root” is the user owner and the group owner, user_owner.group_owner, which is root for the user owner and root for the group owner in this file. If we have a user who needs permissions to read the secret_file.txt file but does not need to change the file permissions, an ACL can be set to grant permission to a specific user or group to read the file. Scenario example: The user Jane needs special access to read the mail logs. By default, only the root account can do this. Jane doesn’t need any other privileges, so we can assign an ACL privilege for her to read the /var/log/maillog file by using the following command: Su –c ‘setfacl -m u:jane:r /var/log/maillog’ setfacl is the command to configure ACL permission The –m switch is to ‘modify’ ‘u:jane’ specifies user Jane. If this was a group, we would use g:group_name. :r specifies ‘read’ permissions’ /var/log/maillog is the file path we are granting permissions for Jane To, verify the permissions are granted to user Jane, use the following command: getfacl /var/log/maillog (c) ITT Educational Services, Inc.

9/19/2018 EXPLORE: CONTEXTS (c) ITT Educational Services, Inc.

9/19/2018 Group Account Groups provide a way to better manage accounts in the following ways: Permissions can be given to a group rather than individuals. Employees can be added or deleted from predefined groups. Groups improve the maintainability of user accounts. For example, 500 plus users in a finance department needing special privileges to accounting files can be managed in groups. (c) ITT Educational Services, Inc.

EXPLORE: RATIONALE

Pluggable Authentication Modules PAM is used primarily to regulate access to administrative tools and commands. It works as an additional layer of security for users. You can further configure a PAM configuration file to limit access to certain services or commands to specified users

Using PAM An application can use its own authentication file in the /etc/pam.d directory. PAM can be used to: Allow access to specific application only during certain times of the day Deny user logins based on files and restrict the user of the su command to only certain groups or users Disconnect a user after ‘x’ number of login attempts

PolicyKit can provide one more layer of protection The PolicyKit is method for customizing access for regular users, focused on GUI tools The PolicyKit assumes privileged tools associated with two distinct processes: policies and mechanisms

Summary In this presentation, the following concepts were covered: System, service, and regular user accounts, group accounts, and user account policy Best practices for account management Process of establishing a user account policy, managing password change, and using sudo command Files with ACL permissions and the roles and responsibilities of a Linux system administrator Use of PAM

Lab 3.2-Apply Hardened User Account Management & Security Controls Discussions and Lab Lab 3.2-Apply Hardened User Account Management & Security Controls