Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits.

Slides:



Advertisements
Similar presentations
IP ADDRESS MANAGEMENT [IPAM]
Advertisements

TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Lesson 17: Configuring Security Policies
Security+ Guide to Network Security Fundamentals, Fourth Edition
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Department Of Computer Engineering
Network security policy: best practices
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Security Guidelines and Management
Module 8: Implementing Administrative Templates and Audit Policy.
10-Conducting Security Audits. Privilege Auditing Person’s access level over an object – User should be given minimal amount of privilege necessary to.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Hands-On Microsoft Windows Server 2008
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Overview Managing a DHCP Database Monitoring DHCP
Chapter 10 Conducting Security Audits. Objectives Define privilege audits Describe how usage audits can protect security List the methodologies used for.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
.  Define privilege audits  Describe how usage audits can protect security  List the methodologies used for monitoring to detect security-related.
Chapter 2 Securing Network Server and User Workstations.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Cryptography and Network Security Sixth Edition by William Stallings.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Module 10: Implementing Administrative Templates and Audit Policy.
Understand Audit Policies LESSON Security Fundamentals.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Role Of Network IDS in Network Perimeter Defense.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Planning File and Print Services Lesson 5. File Services Role The File Services role and the other storage- related features included with Windows Server.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
Working at a Small-to-Medium Business or ISP – Chapter 8
Security Methods and Practice CET4884
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Examining a Windows NT Infrastructure (2)
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits

Security+ Guide to Network Security Fundamentals, Third Edition Objectives Define privilege audits Describe how usage audits can protect security List the methodologies used for monitoring to detect security-related anomalies Describe the different monitoring tools 2

Security+ Guide to Network Security Fundamentals, Third Edition Privilege Auditing _________ methodical ________ and ________ of something that ___________________ of findings A _________ can be considered a _____________ __________________________ ____________________________ (PoLP)  Users should be given only the _____________________ necessary to perform his or her job function ____________________________  Reviewing a _____________________________________  Requires knowledge of privilege management, how privileges are assigned, and how to audit these security settings More to come on each of these…. 3

Security+ Guide to Network Security Fundamentals, Third Edition Privilege Management ___________________________  The process of ___________________________ to objects Roles of owners and custodians are generally well-established  Where those roles fit into the organization often depends upon how the organization is structured The ______________ for privilege management can be either ______________ ______________________________ 4

Security+ Guide to Network Security Fundamentals, Third Edition Privilege Management (continued) In a _______________ structure  ____________ is _____________________ of assigning or revoking privileges  All custodians are part of that unit A _____________ organizational structure for privilege management  Delegates the authority for assigning or revoking privileges _____________________________ __________________________ 5

Security+ Guide to Network Security Fundamentals, Third Edition Assigning Privileges The foundation for assigning privileges is dictated by the existing access control model Recall that there are four major access control models:  Mandatory Access Control (MAC)  Discretionary Access Control (DAC)  Role Based Access Control (RBAC)  Rule Based Access Control (RBAC) 6

Security+ Guide to Network Security Fundamentals, Third Edition Auditing System Security Settings Auditing system security settings for user privileges involves:  A regular _______________________  Using ______________________  Implementing ______________________ More to come on each of these 7

Security+ Guide to Network Security Fundamentals, Third Edition Auditing System Security Settings (continued)- User access and rights review: It is important to periodically review user access ______________________ Most organizations have a _____________ that mandates regular reviews Reviewing user access rights for logging into the network can be performed on the _____________________ Reviewing user permissions over objects can be viewed on the _______________ 8

Security+ Guide to Network Security Fundamentals, Third Edition9

Auditing System Security Settings (continued)- Group Policies Instead of setting the same configuration baseline on each computer, a ______________ can be created Security template  A method to ___________________________________ On a Microsoft Windows computer, one method to deploy security templates is to use ___________  A feature that provides __________________________ ____________________ of computers and remote users who are using Active Directory (AD) 10

Security+ Guide to Network Security Fundamentals, Third Edition Auditing System Security Settings (continued)- Group Policies The ____________________________ within group policies are known as Group Policy Objects (______).  GPOs are a ______________________________ that can be applied to user objects or AD computers Settings are manipulated using administrative template files that are included within the GPO 11

Security+ Guide to Network Security Fundamentals, Third Edition Auditing System Security Settings (continued)- Storage and retention policies Information lifecycle management (______)  A set of strategies for ____________________________ ________ computer storage systems in order to _________ ILM strategies are typically recorded in storage and retention ___________________  Outline the requirements for data storage _____________________ 1 st step in developing storage and retention policies  Assigns a ____________________________________ ___________ and regulation requirements to __________ Example on next slide… 12

Security+ Guide to Network Security Fundamentals, Third Edition Auditing System Security Settings (continued)- Storage and retention policies 13

Security+ Guide to Network Security Fundamentals, Third Edition Auditing System Security Settings (continued)- Storage and retention policies Grouping data into _________ often requires the assistance of the users who save and retrieve the data on a regular basis The 2 nd step is to ______________________ __________________________________ Occasional _____________ of storage and retention policies is important 14

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing ____________________  Audits what objects a user has ____________________  Involves an examination of _____________________ ______________________ and how frequently Sometimes access privileges can be very ________ Usage auditing can help _____________________ ____________________  Permissions given to a higher level “parent” will also be ___________________________  Adds to the complexity of access privileges  See example on next slide 15

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing (continued) 16

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing (continued) Inheritance becomes more complicated with ______ GPO inheritance  Allows administrators to set a ____________________ ______________________ in the Microsoft AD Other administrators can apply more specific policies at a lower level  That apply only to subsets of users or computers GPOs that are _________________________ are processed _______________  Followed by the order that policies were linked to a container object 17

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Log Management A ______ is a record of events that occur Logs are composed of ____________________  Each entry contains _____________________________ that has occurred Logs – from both hardware and software systems- have been used primarily for _______________ problems __________________________  The process for ________________________________ ___________________ of computer security log data 18

Usage Auditing involves Log Management (continued) Security _____________________  Antivirus software  Remote Access Software  Automated patch update service Security __________________________  Network intrusion detection systems (NIDS) and host and network intrusion prevention systems (HIPS/NIPS)  Domain Name System (DNS)  Authentication servers  Proxy servers  Firewalls- more info a few slides down… Security+ Guide to Network Security Fundamentals19

Security+ Guide to Network Security Fundamentals, Third Edition20

Security+ Guide to Network Security Fundamentals, Third Edition21 Usage Auditing involves Log Management (continued)

Security+ Guide to Network Security Fundamentals, Third Edition22 Usage Auditing involves Log Management (continued)

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Log Management (continued) Types of items that should be examined in a _________________ include:  IP addresses that are being rejected and dropped  Probes to ports that have no application services running on them  Source-routed packets  Suspicious outbound connections  Unsuccessful logins 23

Security+ Guide to Network Security Fundamentals, Third Edition24 Usage Auditing involves Log Management (continued)

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Log Management (continued) Operating System (OS) logs  Two common types of security related OS logs: 1. _____________________________ 2. ____________________________ ___________________  An occurrence within a software system that is communicated to users or other programs ___________ _______________________ 1. System events  _____________________ that are performed by the ________________________ 25

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Log Management (continued) System events that are commonly recorded include:  _________________________________  ____________________ information 2. Logs based on audit records  The second common type of security-related operating system logs  Audit records that are commonly recorded include: _____________________________ ______________________________ 26

Security+ Guide to Network Security Fundamentals, Third Edition27

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Log Management (continued) Log management _______________:  A routine review and analysis of logs helps to __________________, policy violations, fraudulent activity, and _________________ shortly after they have occurred  Logs can also be used in providing information for ___________________________  Logs may be useful for ___________________ __________, supporting the organization’s internal investigations, and identifying operational trends and long-term problems 28

Security+ Guide to Network Security Fundamentals, Third Edition29

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Log Management (continued) It is recommended that organizations enact the following log management solutions:  Enact ______________________  Establish __________________ and procedures for log management  Maintain a ____________________ infrastructure  Prioritize log management throughout the organization  Use __________________________  Provide adequate support 30

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Change Management ___________________________  Refers to a methodology for ____________ and ___________________________, often manually  Seeks to approach changes _____________ and provide the necessary __________________ of the changes Two major types of changes regarding security that are routinely documented  Any change in _______________________  _______________ classification 31

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Change Management (continued) Change management team (CMT)  Created to ________________________  Any proposed change must first be approved by the CMT The team might be typically composed of:  Representatives from all areas of IT (servers, network, enterprise server, etc.)  Network security  Upper-level management 32

Security+ Guide to Network Security Fundamentals, Third Edition Usage Auditing involves Change Management (continued) The duties of the CMT include:  Review proposed changes  Ensure that the risk and impact of the planned change is clearly understood  Recommend approval, disapproval, deferral, or withdrawal of a requested change  Communicate proposed and approved changes to co-workers 33

Security+ Guide to Network Security Fundamentals, Third Edition Monitoring Methodologies and Tools There are several types of instruments that can be used on systems and networks to _______________________________ Monitoring involves ___________________, ________________________________ Monitoring methodologies include _________ ____________________ and ______________________ monitoring More to come on each of these… 34

Security+ Guide to Network Security Fundamentals, Third Edition Methodologies for Monitoring Anomaly-based monitoring  Designed for detecting ________________  _______________________ A ___________________ – considered “normal” for that network- against which ______________________ __________________  Whenever there is a ____________________ from this baseline, an alarm is raised Advantage  ___________ the anomalies ______________ 35

Security+ Guide to Network Security Fundamentals, Third Edition Methodologies for Monitoring (continued) Anomaly-based monitoring (continued) ________________________  Alarms that are raised when there is _________ _______________________ Normal behavior can change easily and even quickly  Anomaly-based monitoring is _____________ __________________________ 36

Security+ Guide to Network Security Fundamentals, Third Edition Methodologies for Monitoring (continued) Signature-based monitoring  Compares activities against a _________________  Requires access to an ____________________________ Current behavior must then be compared against a collection of signatures Weaknesses  The signature databases must be __________________  As the number of signatures grows the behaviors must be ___________________________________________ of signatures 37

Security+ Guide to Network Security Fundamentals, Third Edition Methodologies for Monitoring (continued) Behavior-based monitoring  Designed to be ______________________ instead of reactive  Uses the “normal” ____________________ as the standard  Continuously analyzes the behavior of processes and programs on a system Alerts the user if it detects any _________________ Advantage  _________________ to update signature files or compile a baseline of statistical behavior 38

Security+ Guide to Network Security Fundamentals, Third Edition Methodologies for Monitoring (continued) 39

Security+ Guide to Network Security Fundamentals, Third Edition Three Monitoring Tools 1. Performance baselines and monitors  __________________________ A reference set of data established to _____________ _____________________ for a system or systems  Data is accumulated through the ___________ _________________ and networks through _____________________________  _____________ is compared with the baseline data to determine how closely the norm is being met and if any adjustments need to be made 40

Security+ Guide to Network Security Fundamentals, Third Edition Three Monitoring Tools (continued) 2.______________________  A low-level system program that uses a __________________ designed to monitor and ______________________ on a desktop system, server, or even a PDA or cell phone Some system monitors have a Web-based interface System monitors generally have a fully customizable notification system 41

Security+ Guide to Network Security Fundamentals, Third Edition Three Monitoring Tools (continued) 3. ___________________________  Also called a ____________________  ____________________________________ its contents  Can fully decode application-layer network protocols  The different parts of the protocol can be analyzed for any suspicious behavior 42

Security+ Guide to Network Security Fundamentals, Third Edition Summary A “privilege” can be considered a subject’s access level over an object Auditing system security settings for user privileges involves a regular review of user access and rights Information lifecycle management (ILM) is a set of strategies for administering, maintaining, and managing computer storage systems in order to retain data Usage auditing involves an examination of which subjects are accessing specific objects and how frequently 43

Security+ Guide to Network Security Fundamentals, Third Edition Summary (continued) Logs related to computer security have become particularly important Change management refers to a methodology for making changes and keeping track of those changes, often manually Monitoring involves examining network traffic, activity, transactions, or behavior in order to detect security-related anomalies 44