INF526: Secure Systems Administration Composition of Systems And Security Domains Prof. Clifford Neuman Lecture 3 3 June 2016 OHE100C.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Ljubomir Ivaniš CPU d.o.o.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Cloud computing Tahani aljehani.
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Windows 2003 and 802.1x Secure Wireless Deployments.
VM Role (PaaS)Virtual Machine (IaaS) StorageNon-Persistent StoragePersistent Storage Easily add additional storage DeploymentBuild VHD offsite and upload.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Additional SugarCRM details for complete, functional, and portable deployment.
Clinic Security and Policy Enforcement in Windows Server 2008.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Block1 Wrapping Your Nugget Around Distributed Processing.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Server Virtualization
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Security Vulnerabilities in A Virtual Environment
Module 7: Implementing Security Using Group Policy.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Module 10: Windows Firewall and Caching Fundamentals.
Zvezdan Pavković. Storage Non-Persistent Storage Persistent Storage Easily add additional storage. Networking Internal and Input Endpoints configured.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Computer Security Sample security policy Dr Alexei Vernitski.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
INF526: Secure Systems Administration Team Status Exercise 1 Prof. Clifford Neuman Lecture 5 17 June 2016 OHE100C.
INF526: Secure Systems Administration Policy Driven Administration Principles of Protection Generation of Security Requirements Prof. Clifford Neuman Lecture.
INF526: Secure Systems Administration Student Presentations And Review for Final Prof. Clifford Neuman Lecture July 2016 OHE100C.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
VMware ESX and ESXi Module 3.
Session 11 Other Assurance Services
Unit 27: Network Operating Systems
Managing Services with VMM and App Controller
PLANNING A SECURE BASELINE INSTALLATION
Service Template Creation from the Ground Up
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Designing IIS Security (IIS – Internet Information Service)
06 | SQL Server and the Cloud
Presentation transcript:

INF526: Secure Systems Administration Composition of Systems And Security Domains Prof. Clifford Neuman Lecture 3 3 June 2016 OHE100C

Review of Homework Assignment System Structure for Banking Case Study Consider the description of the banking system to be used for the first exercise – as discussed in class on 5/24. –Enumerate the classes of data –Enumerate the classes of users –Identify the protection domains –Enumerate the systems (hardware) –Enumerate the systems (software components) 1

Group Exercise One Decide on the software components to be deployed to implement software requirements on next slide. –Custom development should be simple scripts. –Use packages for database and other components. Decide on the VM’s to be created to run those software components. –You can run more than one software component within a VM if you choose. –Decide on the methods you will use to contain access to those software components, and to the information managed by those components. Configure communication between VM’s and to the outside Install packages Write scripts and demonstrate basic flow through system. Report on progress as group by on Wednesday. 2

Banking Your organization must: –Maintain a database of account holders –A database of account balances –Enable web access by customers who: Can update their personal information Check their account balance Transfer funds to another account (by number) View transactions on their account Submit an image of a check for deposit –(check should be viewable, but you do not need to scan it or process it) Access is needed –Via web from the open internet –Outbound confirming transactions –All other interactions may be limited by information flow policies to internal machines. 3

Retail Your organization must: –Maintain a database of customers –A database of products and prices –A database of customer orders – and status –Support the update of prices in the system –Support inquires by customers of order status –Allow customers to place orders –Accept payment information from customers for submission to a credit card processor –Enable web access by customers who: Can place orders Check order status Cancel orders –Enable access by employees To set prices Perform customer service functions Access is needed –Via web from the open internet for customer facing functions –For employees 4

Criminal Enterprises Chosen because of differences in the high level principles. –Not because I expect you to implement these kinds of systems in your future endeavors. –But you may be called upon to break some of these systems if later employed by government organizations. Your organization must: –Accept Bitcoin as payment (not really, but it must accept something that stands in for bitcoin) –Manage an inventory of stolen account identifiers with passwords –Control access to such information –Prevent collection of evidence or intelligence by third parties. –Note, do not deal in any illegal goods, but use dummy information to stand in for such goods. Also, do not use terms associated with such illegals goods or information in communications, make up new names for this dummy information. 5

Discussion with Lab Startup Install free version of vmplayer or virtualbox on your own machine Configure some dist of Linux as a guest OS. Run two instances simultaneously Configure to allow network communication between the two VMs. Install a web server on one of the VMs. Configure Dynamic DNS (e.g. no-ip.com) to enable connection to the server from the internet. 16

What are you Securing The System as a Whole –Comprised of Software Components –Components have access to information –The Composition Problem System must be evaluated as a whole Can only reason about complete encapsulation –In which case you are reasoning about the effectiveness of containment. –Guard example –Firewall example 7

Banking Example Discuss Assignment Already Discussed Data What has access to the data –Software components –Users – through software components running with identity of particular users or groups –Software components run on systems Ideally in their own protection domain But systems have administrator/root access –What does this mean for your containment architecture? 8

From Last week Network Administration Creation of network protection domains –Firewalls –VLANs –VPNs for access –Ipsec Define required characteristics –Where is encryption required 9

Containment Technologies Network Containment –Firewalls –Virtual Lans (VLANS) –Virtual Private Networks (VPNs) –Encryption SSL, TLS, IPSec, and IPv6 Security End to End –Application encapsulation –Trusted Computing Key Management –Guards Network Administration 10

Containment Technologies Containment Within a Computer –OS Enforced Access Control MAC or DAC –Application Enforced Access Control Database access policies Web access policies (e.g..htaccess) –Specific Technologies Virtual Memory or Segment Architectures Reference Monitory / Access Control User mode vs System Mode Trusted Computing System Administration 11

Containment Technologies System Containment –Encryption Based –Guards –Object Encryption 12

Protection Domain The set of objects and operations on those objects that may be performed by a process. If access is dynamic, then the concept is amorphous. –Generally, if two processes share the same access to objects, we think of them as being in the same protection domain. –An object, or collection of information, will usually be part of more than one protection domain. –Granularity usually not smaller than that of a process (at a particular point in time) since the process is the only entity capable of accessing data. 13

Controlling Access to Data by Protection Domains General Containment –System Boundaries Data exists in memory (V or NonV, Primary or Secondary) of a system. It can only be accessed from outside that system with: –Physical Access to the peripheral –Assistance by a process running on that system Does this apply to NAS? Does this apply to cloud storage? 14

Processes and Concentric Protection Domains Process Boundaries –Managed by OS –Limits access by processes to their own memory –Limits access to storage according to permissions (DAC,MAC) –May assign labels to data based on processes protection domain (labels) System has full access, Administrator might have full access –MAC and Trusted computing can control admin access 15

Network Containment When data is sent across a network –It should be considered accessible by all computer on the network segments traversed –Unless that data is encrypted When a process on a system can communicate with a process in the network. –It should be considered subvertable by any process with which it communicates. –A subverted process can not control access to information within its protection domain. Network Containment –Controls the segments of which data can traverse (outbound) –Controls communication (inbound) that is capable of subverting a process or accessing data. 16

Host Administration Guidance Create multiple protection domains –Don’t run anything as root (or as little as possible) Configure access to resources carefully 17

Network Administration Guidance Use firewalls to contain access –Distributed Host Based may be okay and more effective for some environments – embedded even better. Disallow by default –Open a flow only when defined by application and system architecture. VLAn’s good, but unless enforced by network hardware or encryption, subverted hosts can circumvent. 18

Administering Encryption Encryption can provide containment independent of the integrity of the systems connected physically to the stored or transmitted data. –Reduces protection of data to protection of the key –Still circumventable when access to plaintext exists. Key Management issues –Can leverage trusted hardware Smartcards, Secure Elements, TPM’s, Intel’s Trusted Execution Technology (TXT) –Often too complex to manage at level of authorized users 19