1 Information Security Vision Network Planning Task Force 9/29/2003 Deke Kassabian and Dave Millar.

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

WSUS Presented by: Nada Abdullah Ahmed.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
How topology decisions affect speed/availability/security/cost/etc. Network Topology.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 10/31/05 NETWORK PLANNING TASK FORCE Information Security.
Firewall Configuration Strategies
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
1 Information Security Vision Part II Network Planning Task Force 10/8/2003 Deke Kassabian and Dave Millar.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Computer Networks IGCSE ICT Section 4.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Firewall Slides by John Rouda
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
EDUCAUSE Security 2006 Internet John Brown University.
Securing a Wireless Network
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
CERN’s Computer Security Challenge
Proposed mid-term Security Strategies for CERN Prepared by ad-hoc working group members: Lionel Cons, Francois Fluckiger, Denise Heagerty, Jan Iven, Jean-Michel.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Honeypot and Intrusion Detection System
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Simplifying the Configuration of Student Laptops — StirlingVPNSetup Simon Booth University of Stirling Laptop Forum 27th June 2006.
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Resnet Enhancements and Directions Part 1, Bruce Campbell, Information Systems and Technology.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 10 Securing the network perimeter.
NetTech Solutions Protecting the Computer Lesson 10.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Security fundamentals
Chapter 7. Identifying Assets and Activities to Be Protected
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Information Security Vision
Firewalls.
Unit 27: Network Operating Systems
Information Security Session October 24, 2005
Firewalls Routers, Switches, Hubs VPNs
Network hardening Chapter 14.
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

1 Information Security Vision Network Planning Task Force 9/29/2003 Deke Kassabian and Dave Millar

2 Our Common Problem ■Productivity Loss ■Slammer worm interrupts Internet connectivity campus-wide for several hours and in a few locations on campus for longer. ■1000+ windows machines compromised in four weeks by Blaster worm. ■Managing hundreds of disconnections: run a trace, disable the port, contact the owner, get box fixed, get port re-enabled. ■1,000 infected attachments a day.

3 Estimated cost of Blaster/Welchia ITEMEST. COST 1200 compromised machines -Manage detection and notification -Format and rebuild machines -Remove Blaster from machines 15-25% 9,000 Vulnerable machines (patched twice) -20 campus-wide scans, 14 mass notifications of vulnerability -4,500 Patch automatically (twice) -4,500 Patch manually (twice) 2-3% 1-2% 30-40% Total $287,000 Lost productivity of faculty/staff machines disconnected ?

4 Security Vision: Defense in Depth ■Prevent ■Patch management tools & services ■Training & education ■Anti-virus filtering on mail servers ■Firewalls/Router filtering ■Virtual Private Network ■Personal firewalls ■Secure out-of-the box ■Campus-wide vulnerability scanning ■Detect ■Intrusion detection ■Respond ■Find a better way to locate compromised and vulnerable DHCP and wireless devices.

5 Patch Management ■Managed vs. Unmanaged ■Managed – LSP runs a Windows Domain Controller; all desktops and workstations are configured to participate in the domain, all users authenticate to the central Domain Controller. LSP has Administrator rights on all machines in the domain, and can manage domain workstations and desktops remotely – i.e. pushing out patches and service packs, applying group policies, etc. ■Unmanaged – Users run their Windows desktop or workstation “stand-alone.” The only way that patches can be applied is if the owner or LSP sits down physically at each desktop/workstation. ■Windows Update ■Window Update client points to Microsoft’s Windows Update site. ■Operates in one of three modes: manual, semi-automatic and completely automatic. ■SUS – Software Update Server ■Allows you to point Windows Update client on your desktops and workstations to your own “mirror” of Microsoft’s Windows Update site. Allows you to test MS patches before deploying them. ■Can run either in managed domain or unmanaged workgroup ■SMS – Systems Management Server ■Administrator downloads patch, creates installation routine, creates query to find machines that need patch, deploys patch to machines from the result of query. ■Commercial products, e.g. HFNetChk Pro, PatchLink, BigFix ■Simplified management ■Handles application hotfixes as well as operating system

6 Four Patch Management Options OptionFor which environment? ProsCons Windows Update Managed or unmanaged Free No messy hardware to manage No provision for testing patches – you’re at Microsoft’s mercy. Too risky for servers, but OK for some desktops and workstations. SUSManaged or unmanaged Free software? Allows you to test patches before deploying Must manage your own SUS server(s) Testing patches takes time Critical updates only today. Service packs are still coming in future version. Won’t support Office Update until SUS 2.0 (February, 2004?) SMSManagedPowerful, remote management, monitoring tool. More demanding and complex to manage Only appropriate for managed machines. Commercial tools, e.g. HFNetChk Pro Managed or unmanaged Support Windows and Office update Some products handle patches for applications like IIS, SQL server, etc,; service packs and feature updates -- not just Windows OS hotfixes. Price

7 Critical Challenge: Patching Student machines ■ Distributing patches through SUS requires either that each desktop/workstation join a Microsoft domain, or at least make a registry change on each “managed” machine. ■ Obviously we don’t own student, machines. We will have an easier time figuring out how to manage patches on staff and faculty machines than students’. # of Windows machines # infected% infected Student-owned % Penn-owned %

8 Patch Management Recommendation ■Establish a policy requiring that by 7/1/04, all campus PennNet- connected Windows systems: servers, desktops and workstations, have all critical updates applied within three business days ■ ………………………………………………………………existing staff ■Create a new ISC service: “Patch Management Services” tasked to: ■Work with campus LSPs to identify and share best patch management practices ■Evaluate and license patch management tools ■Create a campus SUS service, testing Microsoft patches against benchmark platforms. ■Support LSPs implementing their own SUS services ■Provide security patch documentation and conduct training for campus LSPs ■Estimated Costs ■Staff…………………………………………………………………….$100,000/yr ■Hardware for campus SUS service…………………...$10,000 every 2-3 yrs. ■Campus license for commercial patch management software ■ Software – 1000 seats……………… ……..…$6/seat/yr

9 Security: Defense in Depth ■Prevent ■Patch management tools & services ■Training & education ■Virus filtering on mail servers ■Firewalls/Router filtering ■Virtual Private Network ■Personal firewalls ■Secure out-of-the box ■Campus-wide vulnerability scanning ■Detect ■Intrusion detection ■Respond ■Find a better way to locate compromised and vulnerable DHCP and wireless devices.

10 Virus Filtering ■Typical Windows virus spreads via ■ messages ■Network file transfer ■Network file server shares ■Web traffic ■Other direct attacks over networks ■Removable storage (floppies, CDs, etc) ■Good anti-virus software on Windows desktops can address all of these.

11 Mail Server Virus Filtering ■ Separate from Spam filtering ■ Usually involves checking for virus signatures in messages ■ Can be implemented on the mail server directly or on a separate server (local or external ASP). ■ Can help to slow virus spread for Windows desktops without adequate virus protection and OS patches

12 POBOX Virus Filtering ■ Proposing use of an outside virus filtering service, separate from our local server- based Spam control tools ■ Mail destined for POBOX users will take a detour through the service provider for filtering of virus messages

13 Campus-Wide Virus Filtering for ? ■Two possible implementations, building on the POBOX approach: ■Replicate the POBOX configuration on other mail servers, but take advantage of the existing business relationship and established pricing ■Create a new mail forwarding service, and have mail to users of that service pass through an outside virus filtering

14 Campus-Wide Virus Filtering for ? Per server virus filtering -- Pros -- Involves no change in address to take advantage of virus filtering -- Cons -- Distributes complexity Likely will not achieve best pricing Campus-wide virus filtering based on a new service Probably easier to implement Likely to be much more cost effective Virus filtering only available for messages using the new format

15 Security: Defense in Depth ■Prevent ■Patch management tools & services ■Training & education ■Anti-virus filtering on mail servers ■Firewalls/Router filtering ■Virtual Private Network ■Personal firewalls ■Secure out-of-the box ■Campus-wide vulnerability scanning ■Detect ■Intrusion detection ■Respond ■Find a better way to locate compromised and vulnerable DHCP and wireless devices.

16 Simple Building Network Router switch Switch switch

17 Simple Building Network, Firewall for all of subnet Router switch Switch switch Pros: ° More coverage from one FW device Cons: ° Blunt instrument, may subject too many things to one set of rules ° Problematic for network management

18 Simple Building Network, with firewall for servers Router switch Switch switch Pros: ° Excellent server- or service- specific protection possible Cons: ° None

19 Simple Building Network, Firewall for one workgroup Router switch Switch switch Pros: ° Group-specific control and protection Cons: ° Can still be a blunt instrument ° Still problematic for network management

20 Simple Building Network,using VLAN Firewall Router switch Switch switch Pros: ° Very flexible in terms of participation ° Addresses net management problem Cons: ° Add complexity and cost

21 Perimeter Firewall: Current Situation Pros: ° Provides limited protection from common attacks Cons: ° Collateral damage ° No provision for legitimate access to risky services.

22 Campus VPN Service Pros: ° Allows us to block the most troublesome services and permit legitimate use. Cons: ° Complexity and cost ° Traffic is not encrypted on PennNet. ° Given the transient nature of PennNet this will at best stave off attacks for a few days

23 Local VPN Service Pros: ° Allows Schools and Centers to implement more restrictive firewall policies. ° Unencrypted traffic need not travel over PennNet. Cons: ° Complexity and cost

24 Where to put a perimeter firewall? Router switch Router Internet Router switch Router switch Router

25 Minimal perimeter filtering in edge routers Router switch Router Internet Router switch Router switch Router

26 Minimal perimeter filtering in internal routers Router switch Router Internet Router switch Router switch Router

27 Campus firewall is not a panacea UniversityDate Netbios ports blocked # Windows machines # infected % infected Penn9/11/200311,0001,10010% Large state university 7/28/200312,0001,50013% Ivy League peer1/2/200218,0003,14617%

28 Personal firewalls Router switch Switch switch

29 Firewalls Recommendations & Estimated Costs Time- frame TargetRecommendations Long- term Servers, desktops and workstations Evaluate a network design and migration strategy that better balances availability against security, and capable of supporting more flexible use of internal and external router filtering/firewall technology… under evaluation Near- term Servers, desktops and workstations Provide a basic level of network security by implementing router filter rules on external interfaces after campus consultation and on internal interfaces at the request of Schools/Centers Hardware/software for internal filtering… $20,000/bldg every 3 years Near- term Servers, desktops and workstations Enable Schools and Centers to implement tighter local security policies: -Publish support for VLANs…………… …………………….N&T Documentation -Select a campus firewall and VPN standard, avoiding a campus VPN “Tower of Babel”, buying time to patch systems, and enabling Schools and Centers to better implement local firewalls and VPN gateways…………………………under evaluation Near- term Desktops and workstations Evaluate and recommend a personal firewall software product for targeted users and do a pilot evaluation. Software license for users…………………..………$ $5000 for 3 years

30 Security: Defense in Depth ■Prevent ■Patch management tools & services ■Training & education ■Anti-virus filtering on mail servers ■Firewalls/Router filtering ■Virtual Private Network ■Personal firewalls ■Secure out-of-the box ■Campus-wide vulnerability scanning ■Detect ■Intrusion detection ■Respond ■Find a better way to locate compromised and vulnerable DHCP and wireless devices.

31 Secure out-of-the box ■ When someone buys a new Dell or IBM machine in the Fall Truckload sale, it is very easy for them to complete the system install without creating an Administrator password. This has led to hundreds of compromised machines within days of going on PennNet. ■ Recommendation: Work with Dell, IBM and Microsoft to create more secure default images for newly purchased Penn machines ………………...…negotiated price < $25/image

32 Security: Defense in Depth ■Prevent ■Patch management tools & services ■Training & education ■Anti-virus filtering on mail servers ■Firewalls/Router filtering ■Virtual Private Network ■Personal firewalls ■Secure out-of-the box ■Campus-wide vulnerability scanning ■Detect ■Intrusion detection ■Respond ■Find a better way to locate compromised and vulnerable DHCP and wireless devices.

33 RPC DCOM Scan results

34 Campus-Wide Vulnerability Scanning ■ Vulnerability scanning has been a very useful tool in helping to manage the patching process University-wide. ■ Focused, campus-wide scans for single vulnerabilities campus- wide can be done quickly (i.e. in 45 minutes or so). This is very helpful to defend against a particular worm. ■ Broader, campus-wide scans for top twenty vulnerabilities take longer – more like 3-4 weeks. This is very helpful for “good hygiene” to ensure that we stay patched as new machines come onto PennNet over time. Goal: 1-3 weeks/campus-wide scan. ■ Finding contact information for the owners of thousands of DHCP (wired and wireless) is difficult and time-consuming. ■ The effectiveness of campus-wide scans is limited to the extent that laptops come and go at different locations on PennNet. We probably miss many vulnerable laptops if they’re “off-line” at the time we scan.

35 Vulnerability Scanning Recommendations ■ Develop more efficient methods of locating the owners of DHCP (wired and wireless) devices. See “Respond” section below.

36 Security: Defense in Depth ■Prevent ■Patch management tools & services ■Training & education ■Anti-virus filtering on mail servers ■Firewalls/Router filtering ■Virtual Private Network ■Personal firewalls ■Secure out-of-the box ■Campus-wide vulnerability scanning ■Detect ■Intrusion detection ■Respond ■Find a better way to locate compromised and vulnerable DHCP and wireless devices.

37 How do worms spread? ■ 60% of the time attack Penn systems ■ 40% of the time: attack external systems

38 How did we learn about Blaster/Welchia infected machines? ■ Outsiders automatically send personal firewall logs to central services like MyNetWatchman, who in turn the report to us. ■ Penn people have automated extracts from their firewall logs and us the results. ■ We are automatically scanning our firewall logs and extracting the results every four hours. ■ Strengths: simple approach, inexpensive ■ Weaknesses: limited coverage, relies on Penn people’s willingness to continue to devote the time.

39 How could we improve our detection capability? IDS Box

40 How could we improve our detection capability? OptionsProsCons IDS box connects to local switches ■ Inexpensive ■ Limited visibility IDS box connects to internal routers ■ Broader visibility ■ More expensive equipment – e.g. fiber taps. IDS box connects to edge routers ■ Complete visibility of outbound attacks ■ Technically challenging given our redundant internet connectivity. ■ Most expensive Use edge router flow logs ■ Limited visibility of outbound attacks ■ Less expensive, challenging than IDS on edge routers.

41 Targeted Intrusion Detection Recommendations & Estimated Costs Near-termCreate policy establishing authority of ISC, Schools and Centers to conduct intrusion detection addressing privacy, log retention and related issues………… no incremental cost Near-termDeploy and manage six-ten switch-connected IDS boxes to quickly identify compromised campus systems. Hardware………………………$15,000-$20,000 every 2-3 years Staff to configure, manage, analyze IDS systems and follow up on intrusion reports………………….…$100,000/yr Long-termEvaluate and determine best method to provide router flow logs for intrusion detection……………………………..under evaluation Long-termEvaluate a network design and migration strategy that better balances availability against security, and capable of supporting broader intrusion detection ………… under evaluation

42 Security Vision: Defense in Depth ■Prevent ■Patch management tools & services ■Training & education ■Anti-virus filtering on mail servers ■Firewalls/Router filtering ■Virtual Private Network ■Personal firewalls ■Secure out-of-the box ■Campus-wide vulnerability scanning ■Detect ■Intrusion detection ■Respond ■Find a better way to locate compromised and vulnerable machines as well as targets of copyright complaints.

43 How do we find problem machines? ■ Problem machine is reported either by the RIAA, intrusion detection or campus vulnerability scan. ■ If static IP – look it up in assignments. ■ If DHCP – ask NOC for a port trace which translates the DHCP address to a physical location.

44 Current situation ■ Unable to respond to problems with wireless machines on parts of campus. Can’t very well disable the port :-( ■ Had to just drop cases of infected machines because of short DHCP lease lengths. ■ Requested 1149 port traces and 126 disconnects in calendar year 2003 (~$45,000). Trend is up (requested 270 this week alone). ■ Had to hold off requesting some disconnects because it would have been unmanageable.

45 Incident Response Recommendations & Estimated Costs Near-termProvide tools to better support quick lookup of host and DNS contacts……………… …….under evaluation Near-termTargeted deployment of PennKey authenticated network access in, for example, College Houses, GreekNet, Library… $2,000 - $5,000/bldg Long-termFull deployment of PennKey authenticated network access on campus Hardware/Software (one-time)………… $1,000,000 Near-termResearch ways of ensuring security of newly connected machines: Vulnerability scan of machines as they connect to PennNet Ability to block infected/vulnerable machines based on MAC address Hardware/Software…………...………..under evaluation Staff………………………………………under evaluation

46 Summary of Recommendations & Estimated Costs Near-termEstablish a policy requiring that by 7/1/04, all campus PennNet-connected Windows systems: servers, desktops and workstations, have all critical updates applied within three business days………………………………………………………………………………………………………….existing staff Near-termCreate a new ISC service: “Patch Management Services” Staff……………………………………………………………..………………………………….$100,000/yr Hardware for campus SUS service………………………………………………...$10,000 every 2-3 yrs. Campus license for commercial patch management software……………………………….…$6/seat/yr Near-termVirus filtering……………………………………………………………………………..………….$5-$6/account/year Long-termEvaluate a network design and migration strategy that better balances availability against security, and capable of supporting more flexible use of internal and external router filtering/firewall technology… under evaluation Near-termProvide a basic level of network security by implementing router filter rules on external interfaces after campus consultation and on internal interfaces at the request of Schools/Centers Hardware/software for internal filtering… $20,000/bldg every 3 years Near-termEnable Schools and Centers to implement tighter local security policies: -Publish support for VLANs…………… ………………………………..……………….N&T Documentation -Select a campus firewall and VPN standard, avoiding a campus VPN “Tower of Babel”, buying time to patch systems, and enabling Schools and Centers to better implement local firewalls and VPN gateways………………………………………………………………………………….………...…under evaluation Near-termEvaluate and recommend a personal firewall software product for targeted users and do a pilot evaluation. Software license for users…………………..……………………………………$ $5000 for 3 years

47 Summary of Recommendations & Estimated Costs Near-termWork with Dell, IBM and Microsoft to create more secure default images for newly purchased Penn machines ………………...…………………………………………………………………………negotiated price < $25/image Near-termCreate policy establishing authority of ISC, Schools and Centers to conduct intrusion detection addressing privacy, log retention and related issues………… no incremental cost Near-termDeploy and manage six-ten switch-connected IDS boxes to quickly identify compromised campus systems. Hardware…………………………………………………………………………$15,000-$20,000 every 2-3 years Staff to configure, manage, analyze IDS systems and follow up on intrusion reports…………………………………………………………………………$100,000/yr Long-termEvaluate and determine best method to provide router flow logs for intrusion detection………………………………………………………………………………………………..under evaluation Long-termEvaluate a network design and migration strategy that better balances availability against security, and capable of supporting broader intrusion detection… under evaluation Near-termProvide tools to better support quick lookup of Host and DNS contacts………..………….…….under evaluation Near-termTargeted deployment of PennKey authenticated network access in, for example, College Houses, GreekNet, Library… $2,000 - $5,000/bldg. Long-termFull deployment of PennKey authenticated network access on campus Hardware/Software (one-time)……………………………………………………………… $1,000,000 Near-termImplement two additional functions in PennKey network authentication of DHCP connections: Vulnerability scan of machines as they connect to PennNet Ability to block infected/vulnerable machines based on MAC address Hardware/Software…………...………………………………………………..………………..…..under evaluation Staff……………………………………………………………………………………………………under evaluation