Securing Exchange, IIS, and SQL Infrastructures

Slides:



Advertisements
Similar presentations
Securing Network – Wireless – and Connected Infrastructures
Advertisements

Paula Kiernan Senior Consultant Ward Solutions
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Implementing Application and Data Security Fred Baumhardt Senior Consultant – Security and Architecture Microsoft Consulting Services - UK.
SEC 470 Using ISA Server for Application Layer Firewalling Frederico Baumhardt Senior Consultant – Infrastructure and Security Microsoft UK.
SEC 318 Guerilla Security – Securing Exchange 2000 and 2003 Infrastructures Fred Baumhardt and Rab Thynne Senior and Partner Strategy Consultant Microsoft.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Firewalls and Intrusion Detection Systems
Chapter 7 HARDENING SERVERS.
Microsoft Security Resources. URL’s for this talk All URL’s mentioned in this talk can be found here: All URL’s mentioned in this talk can be found here:
Implementing Application and Data Security Presenter Name Job Title Company.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Implementing Exchange Server Security Ward Solutions.
Sec 311 Securing SharePoint Infrastructure and Technologies Fred Baumhardt Sandeep Modhvadia Microsoft UK – Technology Services.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Technical Overview of Security Fred Baumhardt Lead Security Technology Architect Microsoft EMEA or MSN
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
Module 14: Configuring Server Security Compliance
Chapter 6 of the Executive Guide manual Technology.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Database as a networked server DB at the centre of the network Network Access Map for DB environment Tracking of tools and apps Remove unnecessary network.
Module 11: Designing Security for Network Perimeters.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security fundamentals Topic 10 Securing the network perimeter.
Module 7: Implementing Security Using Group Policy.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Role Of Network IDS in Network Perimeter Defense.
Implementing Application and Data Security Brjann Brekkan Senior System Engineer Microsoft.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Security fundamentals
Click to edit Master subtitle style
.
Configuring Windows Firewall with Advanced Security
Securing the Network Perimeter with ISA 2004
Implementing a Secure ISA Server
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Unit 27: Network Operating Systems
Lecture 3: Secure Network Architecture
Implementing Client Security on Windows 2000 and Windows XP Level 150
Network hardening Chapter 14.
Designing IIS Security (IIS – Internet Information Service)
Server Security Technologies
Presentation transcript:

Securing Exchange, IIS, and SQL Infrastructures Fred Baumhardt Infrastructure Solutions Consulting Microsoft Security Solutions, Feb 4th, 2003

Session Overview Microsoft Defence-in-depth Model Strategic Multi-Product Defence Implementing End to End Exchange Security Implementing End to End IIS Security SQL Security

Defense-in-Depth MANAGEMENT Perimeter Defences: Packet Filtering, Stateful Inspection of Packets, Intrusion Detection Network Defences: VLAN Access Control Lists, Internal Firewall, Auditing, Intrusion Detection Host Defences: Server Hardening, Host Intrusion Detection, IPSec Filtering, Auditing Application Defences: AV, Content Scanning, Layer 7 (URL) Switching Source, Secure IIS, Secure Exchange Data and Resources: Databases, Network Services and Applications, File Shares Data & Resources Application Defences Host Defences Network Defences Perimeter Defences Assume Prior Layers Fail MANAGEMENT

Strategic Defence Know what’s in your Datacenter Segment your Networks Most attacks, worms, can be defeated by network protection – to buy time for patches Internal IDS to clean up client VLANs IPSec Policies to contain breakouts Plan your management -incident response Application Inspection internal firewalls

Strategic Defence Cont. Reduce Attack Surface Disable unnecessary software and services Use MBSA – IISLockdown etc Use a third party vulnerability scanner Configure AD group policy and use role based security templates Restricted Groups Restricted Services Restricted Registry and File ACLs

The Total Trust Network Modern networks are generally one large TCP/IP space segmented by firewalls to the Internet Trust is implicit in all organisation TCP/IP was not designed for security THIS HAS TO STOP – Network Segmentation is now critical

Secure Your Networking Internet Redundant Routers First Tier Firewalls URL Filtering for OWA RPC Termination for Outlook ISA Firewalls NIC teams/2 switches VLAN Intrusion Detection Intrusion Detection Intrusion Detection VLAN Front-end VLAN DC + Infrastructure VLAN Backend Switches Implement VLANs and Control Inter-VLAN Traffic like Firewalls do .

An Alternate DMZ Approach A Flat DMZ Design to push intelligent inspection outwards ISA layer 7 switching (OWA) or RPC filtration (Outlook) No Firewalls between front-end and backend servers Front-end and backend servers authenticate clients IPSec if required between front-end and backend TCP 443: HTTPS Or TCP 443: HTTPS Internet TCP 80: HTTP Stateful Packet Filtering Firewall Application Filtering Firewall (ISA Server) Exchange Server

Exchange Specific Issues Exchange Client Selection crucial Exchange Supporting Infrastructure Security Top 10 Action Points to secure Exchange

Selecting an Exchange Client Experience Complexity Security POP3/IMAP4 via SSL with SMTP Basic Medium/ High Medium OWA via SSL with ISA Moderate Low Full VPN – L2TPw/IPSEC PPTPv2 High Secure RPC with ISA Medium/ Low

Security from Internet Clients Every time you connect into a network you extend the security perimeter VPN and to a lesser extent RPC Publishing both require care at the client Harden your clients on the Internet or hackers will attack clients and ride the VPN Require RPC encryption for Outlook Client Based IDS systems

Internal Security Don’t assume Internet is the only threat Assume internal people want to attack you – more than external people Defensive Tactics include: Client Network Segmentation Encryption of Client Traffic – e.g. require RPC Review of public folder/client permissions Third party – AV – IDS – Auditing Server Role – Security templates from Ops guide Extend the security scope to all infrastructure Exchange relies on: AD – DNS – SMTP Relay etc

Top 10 Ways to Get Exchange Secure Implement the Security Operations Guides for Windows and Exchange http://msdn.microsoft.com/practices Use MBSA to identify missing patches Implement IISLockdown based on role Secure Infrastructure Assets Use the EDSLock script to restrict groups .

Top 10 Ways To Get Exchange Secure Get adequate antivirus protection for servers and desktops Use perimeter SMTP scanning Automate Patch Management Use SSL, IPsec, and MAPI encryption where appropriate Plan your response to an intrusion/worm before it happens

IIS Security Basics Turn it off where not required Use IISLockdown tool – be aware of its impact on applications Use a layer 7 proxy like ISA Server Use W2K Security Operations templates and guides to lock down IIS by OU – and role

Legacy Firewalls and Data Attacks Internal Network Normal Firewall – Checks Rules - OK Internal Web Server Internal Exchange Server Virus Author Internet Internet Virus or attack inside data passes Overflow Attacker Reverse Proxy Used to accelerate the performance of your web site. Instead of your Web server responding to every requests of Internet clients, the ISA Server will respond with cached content if available. How ISA Reverse Cache works: Joe clicks on the a url for www.ms.com/ISA in his web browser The Internet via DNS servers will interpret the URL name and forward the request to the Servers that respond to “www.ms.com” The ISA Server is impersonating the Web Server and responds to requests for web content for www.ms.com. Since the ISA Server does not have the content cached locally, it will forward the request to the Web Server and then return the content to the user. This content is now cached locally so that the next request for the same content will be served from the ISA Server, rather than the Web Server. Normal Firewalls only check rules like source , destination and port – NOT DATA ITSELF Data passes through firewall unchecked and hits internal IIS box essentially intact – attacks pass through

Countering Application Level Attacks Internal Network Internal Web Server Internal Exchange Server ISA Checks Data inside traffic Virus Author Internet Internet Virus or attack inside data is blocked – alert is raised ISA Filters Overflow Attacker Reverse Proxy Used to accelerate the performance of your web site. Instead of your Web server responding to every requests of Internet clients, the ISA Server will respond with cached content if available. How ISA Reverse Cache works: Joe clicks on the a url for www.ms.com/ISA in his web browser The Internet via DNS servers will interpret the URL name and forward the request to the Servers that respond to “www.ms.com” The ISA Server is impersonating the Web Server and responds to requests for web content for www.ms.com. Since the ISA Server does not have the content cached locally, it will forward the request to the Web Server and then return the content to the user. This content is now cached locally so that the next request for the same content will be served from the ISA Server, rather than the Web Server. Security devices evolve to inspect data Application Filters that know what to look for: Web – Stop Overflows – check syntax of commands Intrusion Detection – scans for patterns of attack Force Internal Traffic to be Inspected by Internal Firewalls

ISA Server and IIS URLScan – syntax and http level checking of acceptable verbs – URLs, and characters Layer 7 URL blocking – EG mail.corp.com/exchange OK – mail.corp.com/£$%^^^£$” - Dropped HTTPS Termination – inspection and re-encryption – inspect the un-inspectable Defeats all known URL based overflows – itself is not susceptible as it has no IIS SMTP Scanner for IIS SMTP mail

SQL Server Security Understand the application Don’t let all machines talk to SQL – SEGMENT YOUR LAN Usually application servers talk to DB – not clients directly Know where MSDE is installed – include in your management plan Replace MSDE with managed SQL servers where possible

SQL and Slammer Bug should have never been there !!! Patches should be made easier and faster to deploy However……. Infrastructure defences could have prevented slammer: VLAN off SQL – nothing to infect Internal Firewalls – block ports to slammer External Firewalls – DMZ machines sending without being asked – should only reply App inspecting filters – FW blocks traffic IDS – recognises and sends RST – alerts admin

Understand Issues and Mitigate SQL in mixed mode has no lockout Can be brute forced so use Windows auth. SQL runs as local admin by default SA will have equivalent to machine admin Thus don’t run it on DC SQL and MSDE listen on known ports So change them where you can SA can go across multiple databases Plan your security model carefully Multiple instances give true account isolation

SQL Powered Applications Look at application end-to-end From client to app server to db Encrypt all network transports Avoid dependence only on client side validation – have SQL check the data as well/instead Client authentication – how does it get data to and from SQL Injection – always pass data to stored procedures – never queries