INF526: Secure Systems Administration Policy Driven Administration Principles of Protection Generation of Security Requirements Prof. Clifford Neuman Lecture.

Slides:



Advertisements
Similar presentations
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Advertisements

Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
System and Network Security Practices COEN 351 E-Commerce Security.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Clinic Security and Policy Enforcement in Windows Server 2008.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Securing Microsoft® Exchange Server 2010
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Designing Active Directory for Security
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 7: Fundamentals of Administering Windows Server 2008.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
Chapter 2 Securing Network Server and User Workstations.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 7: Implementing Security Using Group Policy.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
Module 10: Windows Firewall and Caching Fundamentals.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
The NIST Special Publications for Security Management By: Waylon Coulter.
INF526: Secure Systems Administration Composition of Systems And Security Domains Prof. Clifford Neuman Lecture 3 3 June 2016 OHE100C.
INF526: Secure Systems Administration Course Introduction Prof. Clifford Neuman Lecture 1 24 May 2016 OHE100C.
INF526: Secure Systems Administration Team Status Exercise 1 Prof. Clifford Neuman Lecture 5 17 June 2016 OHE100C.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
INF526: Secure Systems Administration Student Presentations And Review for Final Prof. Clifford Neuman Lecture July 2016 OHE100C.
Dr. Ir. Yeffry Handoko Putra
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Enabling Secure Internet Access with TMG
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Securing the Network Perimeter with ISA 2004
INF526: Secure Systems Administration
Session 11 Other Assurance Services
CSC 480 Software Engineering
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
NTC 326Competitive Success/snaptutorial.com
NTC 326 Education for Service-- snaptutorial.com
NTC 324 RANK Education for Service-- ntc324rank.com.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Unit 27: Network Operating Systems
Chapter 27: System Security
Networks Software.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
IS4680 Security Auditing for Compliance
Microsoft Virtual Academy
Contact Center Security Strategies
Increase and Improve your PC management with Windows Intune
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Microsoft Virtual Academy
Introduction to Networking Security
Presentation transcript:

INF526: Secure Systems Administration Policy Driven Administration Principles of Protection Generation of Security Requirements Prof. Clifford Neuman Lecture 1 24 May 2016 OHE100C

Initial Homework Assignment (due by midnight (11:59+1PM) on Thursday June 2 nd ) Submit as to System Structure for Banking Case Study Consider the description of the banking system to be used for the first exercise – as discussed in class on 5/24. –Enumerate the classes of data –Enumerate the classes of users –Identify the protection domains –Enumerate the systems (hardware) –Enumerate the systems (software components) This write-up is expected to be about 3 pages in length (could be more or less) –It will be shared later with your group members to begin discussion for the group architecture. 1

Initial Reading Assignment (due before 5/27 class) (ANON) Anonymous. (2002). Maximum Linux Security: A Hackers Guide to Protecting Your Linux Server and Workstation. SAMS Publishing. –Chapters 1, 2, 3, 4 Added readings to follow the lecture (not due before) –Generally accepted Principles and Practices – NIST –Guidance in writing a security policy 2

Your Oganizations Security Policy First step – Establish an Organization Security Policy –Generally accepted Principles and Practices – NIST –Guidance in writing a security policy First question for security auditors It will guide you in creating categories of data and user 3

Your Oganization’s Security Policy First step – Establish an Organization Security Policy –Generally accepted Principles and Practices – NIST Principles –Computer Security Supports the Mission of the Organization –Computer Security is an Integral Element of Sound Management –Computer Security Should Be Cost-Effective –Systems Owners Have Security Responsibilities Outside Their Own Organizations –Computer Security Responsibilities and Accountability Should Be Made Explicit. –Computer Security Requires a Comprehensive and Integrated Approach –Computer Security Should Be Periodically Reassessed –Computer Security is Constrained by Societal Factors 4

Three Scenarios used as Examples These are the basis of the exercises thoroughout the semester. –Banking –Retail –Criminal Enterprise These were chosen because there are differences in the goals (interpretation of the principles) and thus they provide a good way to discuss the principals, policies, and procedures that underly administration. 5

Banking Your organization must: –Maintain a database of account holders –A database of account balances –Enable web access by customers who: Can update their personal information Check their account balance Transfer funds to another account (by number) View transactions on their account Submit an image of a check for deposit –(check should be viewable, but you do not need to scan it or process it) Access is needed –Via web from the open internet –Outbound confirming transactions –All other interactions may be limited by information flow policies to internal machines. 6

Retail Your organization must: –Maintain a database of customers –A database of products and prices –A database of customer orders – and status –Support the update of prices in the system –Support inquires by customers of order status –Allow customers to place orders –Accept payment information from customers for submission to a credit card processor –Enable web access by customers who: Can place orders Check order status Cancel orders –Enable access by employees To set prices Perform customer service functions Access is needed –Via web from the open internet for customer facing functions –For employees 7

Criminal Enterprises Chosen because of differences in the high level principles. –Not because I expect you to implement these kinds of systems in your future endeavors. –But you may be called upon to break some of these systems if later employed by government organizations. Your organization must: –Accept Bitcoin as payment (not really, but it must accept something that stands in for bitcoin) –Manage an inventory of stolen account identifiers with passwords –Control access to such information –Prevent collection of evidence or intelligence by third parties. –Note, do not deal in any illegal goods, but use dummy information to stand in for such goods. Also, do not use terms associated with such illegals goods or information in communications, make up new names for this dummy information. 8

Ungraded Lab Work for next Week Install free version of vmplayer or virtualbox on your own machine Configure some version / dist of Linux as a guest OS. Run two instances simultaneously Configure to allow network communication between the two VMs. Install a web server on one of the VMs. Configure Dynamic DNS (e.g. no-ip.com) to enable connection to the server from the internet. 16

Guidance for VMs If running windows, use virtualbox or vmware player. Workstation 12 Player is licensed for commercial use and is enabled to run restricted virtual machines. If you simply want to learn more about virtual machines or run virtual machines at home in a non-commercial environment you may use Workstation 12 Player at no cost. Download Workstation 12 Player for personal use. - See more at: –I have found it less problematic to install the 32 bit version even on a 64 bit machine. –If under linux, virtualbox may be easier to install. 16

Selecting a Linux Distribution Distributions are available that are optimized for many functions. – You should install LTS (long term support) versions, rather than the latest experimental versions. Apply all updates to your selected software. 16

Your Oganization’s Security Policy Guidance in writing a security policy First question for security auditors It will guide you in creating categories of data and user and the kinds of access authorized It provides specific guidance for security requirements necessary to meet the principles just discussed. It will define responsibilities It will provide the basis for evaluating your organizations ability to meet the principals discussed earlier. 12

Security Requirement's Information Access –Mandatory Policies –Discretionary Policies Requirements on Security Technology Personnel Security –Including training Physical Security Monitoring and Audit Vendor Requirements Accreditation 16

Information Access Decide on multiple data classes –Public data –Customer data –Corporate data –Highly sensitive data Access to each class of data –Can you support mandatory policies –Otherwise what discretionary policies apply. Domain boundaries –Based on users and locations 16

Technological Requirements: Information Access Identity Management –Factors / Basis for Authentication –Enrollment, Exception Handling –Other policy conditions Containment –Firewalls, VLANs –Encryption Policy –Decision points –Specification point (or administration) –Enforcement point 16

Points of Policy 16 By Axiomatics - Axiomatics, CC BY 3.0,

Network Administration Creation of network protection domains –Firewalls –VLANs –VPNs for access –Ipsec Define required characteristics –Where is encryption required –This is policy and administrations 17

Personnel Security Requirements on credentials and vetting processes for employees with access to different domains. –Relates to identity management –More as a precursor IM about who the user is, PS about vetting and physical access and issuance of ID’s. 16

Physical Security Virtual containment of data to domains is useless if access to protected machines can be achieved by failures of physical security. Define controls on placement of hardware and protection of cables, etc. 16

Monitoring and Audit This is how you will know that you have been attacked. It is critical to consider these technologies when designing your deployment. The monitoring function is part of administrations. –Responding to alerts –False positive vs false negatives –Volume of alerts and what is of interest. 16

Vendor Requirements Concern with supply chain subversion, and physical access by vendors on site. –Apply personnel security constraints to vendors. –Restrict access by vendors and visitors. 16