Security fundamentals Topic 2 Establishing and maintaining baseline security.

Slides:



Advertisements
Similar presentations
File Server Organization and Best Practices IT Partners June, 02, 2010.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Chapter 7 HARDENING SERVERS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Computer Security: Principles and Practice
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Maintaining and Updating Windows Server 2008
Network security policy: best practices
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Module 8: Implementing Administrative Templates and Audit Policy.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Hands-On Microsoft Windows Server 2008
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Module 14: Configuring Server Security Compliance
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Overview Managing a DHCP Database Monitoring DHCP
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 10 Securing the network perimeter.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Module 10: Implementing Administrative Templates and Audit Policy.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Maintaining and Updating Windows Server 2008 Lesson 8.
Security fundamentals
CS457 Introduction to Information Security Systems
Securing Network Servers
Working at a Small-to-Medium Business or ISP – Chapter 8
Configuring Windows Firewall with Advanced Security
CompTIA Server+ Certification (Exam SK0-004)
HARDENING CLIENT COMPUTERS
Securing the Network Perimeter with ISA 2004
Chapter 4: Security Baselines
Configuring and Troubleshooting Routing and Remote Access
Module 8: Securing Network Traffic by Using IPSec and Certificates
LAND RECORDS INFORMATION SYSTEMS DIVISION
Firewalls.
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
IS4680 Security Auditing for Compliance
12 STEPS TO A GDPR AWARE NETWORK
Operating System Security
Bethesda Cybersecurity Club
Module 8: Securing Network Traffic by Using IPSec and Certificates
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Security fundamentals Topic 2 Establishing and maintaining baseline security

Agenda Trusted computing base Evaluation and certification Security baselines Security templates and scripts Maintaining a baseline

Trusted computing base Represents the most secure computing environment that the organisation can provide Includes all the protection mechanisms used to secure computing devices and infrastructure Contains security baselines for specific computer systems Baseline is the initial configuration that security is built on Monitor the differences between your initial baseline and the current configuration and investigate causes

Trusted computing base goals Ensures that only authorised people have access They use systems in the manner intended Data remains confidential

Trusted computing base components Includes all elements of the computing environment Hardware – computers, peripherals and network devices Firmware – BIOS chips Software – operating system, application and custom Procedures – administrative regulations, access control, backup schedules, training requirements

Creating a trusted computing base Inventory all elements of computer security Document all elements of computer security Monitor and account for changes Make changes and configuration management Protect from new threats

Threats to a trusted computing base External threats: Originate from outside the trusted computing base (not necessarily outside the organisation) From attackers, natural disasters, insufficient enforcement Internal threats: Problems with the trusted computing base Inadequate monitoring (for changes and deviations) Noncompliance with procedures Poor design Failure to update the trusted computing base

Evaluation and certification Compliance with formal standards for security TCSEC – Trusted Computer System Evaluation Criteria – Orange Book set of standards for commercial operating systems – Several levels of security – C2 is the highest level for commercial systems ITSEC – Information Technology Security Evaluation Criteria – Similar standards to TCSEC

Evaluation and certification Compliance with formal standards for security Common criteria – CCITSE Common Criteria for Information Technology Security Evaluation – ISO standard – Set of processes for evaluating security features and capabilities – The security rating of a product evaluated in one country is recognised in other countries ISO – Information security standard – Generic security policy that describes general security settings but not system specific configurations

Security baselines A detailed description of how to configure and administer a device or systems so that it provides the best possible security – What hardware to use and BIOS settings – Procedures for physically securing a computer – Media to use for installing an OS or service, installation options and post installation configuration – Rules regarding content to be used – Procedures for reviewing the installation, monitoring and making changes to the configuration – Rules for who can access a server and authentication methods implemented – Documentation and record keeping requirements

Security baseline guidelines Guidelines for file systems Use NTFS not FAT and use permission assignments for access control Principle of least privilege Only minimal permissions required to perform a specific task Avoid Full Control and the Everyone group Put users into groups and assign permissions to the group Use permission inheritance- general permissions at a higher level and exceptions at a lower level Assign permissions for local and network access Encrypt files that must be kept private

Security baseline guidelines Guidelines for services/daemons Every running service is a potential entry point Enable only services that are required Default configurations are not the most secure Restrict the actions that can be performed by the service by running the system in a custom user account and not as administrator or root Consider which services start automatically Apply security updates Secure files and configurations used by the service/daemon

Security baseline guidelines Guidelines for critical applications Only use critical business applications Typically , database and accounting Apply security updates Secure files and configurations used by the service Install only required components Grant appropriate access levels

Security baseline guidelines Guidelines for other applications Remove all unnecessary applications – reduce the surface area of attack PS or task manager to list running processes Ensure users don’t install unauthorised programs (standard user accounts) Prevent users from accessing system and program files on the hard drive

Security baseline guidelines Guidelines for network communications Disable unnecessary protocols Network access – Restrict open ports – Enable packet filters – Require authentication to access network or network resources – IPSec to secure communications and require computers authenticate with each other Encrypt network traffic – IPSec to encrypt for privacy – SSH (Secure Shell) – SSL (Secure Sockets Layer)

Security templates System security settings fall into the following categories: Account policies: User accounts – password requirements, account lockouts, who can perform tasks Local policies: How the system is audited, who can access logs, user rights assignment, and other settings Event log: Who can access event logs, how event logs are sorted and retained Restricted groups: Which users are members of which groups System services: Specify start up behaviour and permissions for services Registry: Sets permissions to access the registry File systems: Set permissions to access specific files and folders

Scripts Automated alternative to using security templates – Windows Scripting Host (WSH) – Shell scripts – Perl scripts – C scripts

Maintaining a security baseline Existing security benchmarks Remain informed about current threats and vulnerabilities – CERT/CC advisories – Mailing lists (eg SecurityFocus™, Bugtraq) – Hardware/software vendor websites Update security baselines to reflect new emerging security requirements

Securing against known vulnerabilities Apply security updates: Hotfixes: fast release for one or more issues, perhaps less testing of hotfix Security Rollup Packages: several critical hotfixes with more testing Service Packs: all fixes available and included in previous service packs – extensive testing

Securing against known vulnerabilities Acquiring security updates Verify the authenticity of the update – is it really from the vendor? Check digital certificates – guarantees it is from the author and that it hasn’t been modified Checksums: hash MD5 computation to check integrity Cryptographically sign the hash (eg with Pretty Good Privacy (PGP))

Summary What a trusted computing base is Security evaluation and certification criteria available What security baselines are Security templates and scripts that help automate security application Practises for maintaining our baselines