Essentials of Security Steve Lamb Technical Security Advisor

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Security Risk Management Eduardo Rivadeneira IT pro Microsoft Mexico.
Module 5: Configuring Access for Remote Clients and Networks.
Paula Kiernan Senior Consultant Ward Solutions
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Securing your data Security with Microsoft Infrastructure and Internet Explorer Matt Kestian Strategic Security Advisor | National Security Team | Microsoft.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 7 HARDENING SERVERS.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Implementing Server Security on Windows 2000 and Windows Server 2003 Steve Lamb Technical Security Advisor
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Secure SQL Server configuration Pat Larkin Ward Solutions
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
A Holistic Approach to Malware Defense Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Storage Security and Management: Security Framework
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
BUSINESS B1 Information Security.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Module 11: Designing Security for Network Perimeters.
Security fundamentals Topic 10 Securing the network perimeter.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Module 2: Designing Network Security
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
IS3220 Information Technology Infrastructure Security
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Security Configuration Wizard - how to make your systems only do the things you need them to! Steve Lamb IT Pro Evangelist for Security Technologies
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Security fundamentals
Critical Security Controls
Configuring Windows Firewall with Advanced Security
Securing the Network Perimeter with ISA 2004
{ Security Technologies}
How to Mitigate the Consequences What are the Countermeasures?
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
Security in the Real World – Plenary Day One
Using Software Restriction Policies
Presentation transcript:

Essentials of Security Steve Lamb Technical Security Advisor

Session Prerequisites Hands-on experience installing, configuring, administering, and planning the deployment of Windows 2000 Server or Windows Server 2003 Knowledge of Active Directory and Group Policy concepts Level 200

Business Case Security Risk Management Discipline Defense in Depth Security Incident Response Best Practices 10 Immutable Laws of Security

Impact of Security Breaches Loss of Revenue Damage to Reputation Loss or Compromise of Data Damage to Investor Confidence Legal Consequences Interruption of Business Processes Damage to Customer Confidence

The cost of implementing security measures is not trivial; however, it is a fraction of the cost of mitigating security compromises The cost of implementing security measures is not trivial; however, it is a fraction of the cost of mitigating security compromises

Benefits of Investing in Security Reduced downtime and costs associated with non-availability of systems and applications Reduced labor costs associated with inefficient security update deployment Reduced data loss due to viruses or information security breaches Increased protection of intellectual property

Security Risk Management Discipline Business Case Security Risk Management Discipline Defense in Depth Security Incident Response Best Practices 10 Immutable Laws of Security

Security Risk Management Discipline (SRMD) Processes Assessment Assess and valuate assets Identify security risks and threats Analyze and prioritize security risks Security risk tracking, planning, and scheduling Development and Implementation Develop security remediation Test security remediation Capture security knowledge Operation Reassess assets and security risks Stabilize and deploy new or changed countermeasures

Assessment: Assess and Valuate Assets Asset Priorities (Scale of 1 to 10) – Example * * For example purposes only – not prescriptive guidance

Types of threats Examples S Spoofing Forge messages Replay authentication packets T Tampering Alter data during transmission Change data in files R Repudiation Delete a critical file and deny it Purchase a product and later deny it I Information disclosure Expose information in error messages Expose code on Web sites D Denial of service Flood a network with SYN packets Flood a network with forged ICMP packets E Elevation of privilege Exploit buffer overruns to gain system privileges Obtain administrator privileges illegitimately Assessment: Identify Security Risks and Threats – STRIDE

Assessment: Analyze and Prioritize Security Risks – DREAD DREAD Damage Reproducibility Exploitability Affected Users Discoverability Risk Exposure = Asset Priority x Threat Rank Example Worksheet

Assessment: Security Risk Tracking, Planning, and Scheduling Types of threats Examples Spoofing Forge messages Replay authentication packets Tampering Alter data during transmission Change data in files Repudiation Delete a critical file and deny it Purchase a product and later deny it Information disclosure Expose information in error messages Expose code on Web sites Denial of service Flood a network with SYN packets Flood a network with forged ICMP packets Elevation of privilege Exploit buffer overruns to gain system privileges Obtain administrator privileges illegitimately Detailed Security Action Plans Example Worksheets

Development and Implementation Configuration management Patch management System monitoring System auditing Operational policies Operational procedures Detailed Security Action Plans Testing Lab Knowledge Documented for Future Use Security Remediation Strategy Production Environment Production Environment

Operation: Reassess Assets and Security Risks New Web Site Internet Services Reassess risks when there is a significant change in assets, operation, or structure Assess risks continually Testing Lab Documented Knowledge Production Environment

Operation: Stabilize and Deploy New or Changed Countermeasures System Administration Team System Administration Team New or Changed Countermeasures New or Changed Countermeasures Network Administration Team Network Administration Team Security Administration Team Security Administration Team Production Environment Production Environment

Defense in Depth Business Case Security Risk Management Discipline Defense in Depth Security Incident Response Best Practices 10 Immutable Laws of Security

The Defense-in-Depth Model Using a layered approach: Using a layered approach: Increases an attacker’s risk of detection Reduces an attacker’s chance of success OS hardening, authentication, patch management, HIDS Firewalls, Network Access Quarantine Control Guards, locks, tracking devices Network segments, IPSec, NIDS Application hardening, antivirus ACLs, encryption, EFS Security documents, user education Policies, Procedures, & Awareness Physical Security Perimeter Internal Network Host Application Data

Description of the Policies, Procedures, and Awareness Layer I think I will use my first name as a password. Hey, I need to configure a firewall. Which ports should I block? I think I will wedge the computer room door open. Much easier. They have blocked my favorite Web site. Lucky I have a modem.

Policies, Procedures, and Awareness Layer Compromise Say, I run a network too. How do you configure your firewalls? I can never think of a good password. What do you use? Hi, do you know where the computer room is? Hey, nice modem. What's the number of that line?

Policies, Procedures, and Awareness Layer Protection Firewall Configuration Procedure Physical Access Security Policy User Information Secrecy Policy Device Request Procedure Employee security training helps users support the security policy Employee security training helps users support the security policy

Description of the Physical Security Layer All of the assets within an organization’s IT infrastructure must be physically secured All of the assets within an organization’s IT infrastructure must be physically secured

Physical Security Layer Compromise Install Malicious Code Damage Hardware View, Change, or Remove Files Remove Hardware

Physical Security Layer Protection Lock doors and install alarms Employ security personnel Enforce access procedures Monitor access Limit data input devices Use remote access tools to enhance security

Description of the Perimeter Layer Business Partner Internet Services LAN Main Office LAN Internet Services Branch Office Wireless Network LAN Network perimeters can include connections to: The Internet Branch offices Business partners Remote users Wireless networks Internet applications The Internet Branch offices Business partners Remote users Wireless networks Internet applications Remote User Internet

Perimeter Layer Compromise Business Partner Internet Services LAN Main Office LAN Internet Services Remote User Internet Branch Office Wireless Network LAN Network perimeter compromise may result in a successful: Attack on corporate network Attack on remote users Attack from business partners Attack from a branch office Attack on Internet services Attack from the Internet Attack on corporate network Attack on remote users Attack from business partners Attack from a branch office Attack on Internet services Attack from the Internet

Perimeter Layer Protection Business Partner Internet Services LAN Main Office LAN Internet Services Branch Office Wireless Network LAN Remote User Internet Network perimeter protection includes: Firewalls Blocking communication ports Port and IP address translation Virtual private networks (VPNs) Tunneling protocols VPN quarantine Firewalls Blocking communication ports Port and IP address translation Virtual private networks (VPNs) Tunneling protocols VPN quarantine

Description of the Internal Network Layer Sales Wireless Network Marketing Finance Human Resources

Internal Network Layer Compromise Unauthorized Access to Systems Access All Network Traffic Unauthorized Access to Wireless Networks Unexpected Communication Ports Sniff Packets from the Network

Internal Network Layer Protection Require mutual authentication Segment the network Encrypt network communications Restrict traffic even when it is segmented Sign network packets Implement IPSec port filters to restrict traffic to servers

Description of the Host Layer Contains individual computer systems on the network Often have specific roles or functions The term “host” is used to refer to both clients and servers

Host Layer Compromise Exploit Unsecured Operating System Configuration Exploit Operating System Weakness Unmonitored Access Distribute Viruses

Host Layer Protection Harden client and server operating systems Disable unnecessary services Keep security patches and service packs up to date Monitor and audit access and attempted access Install and maintain antivirus software Use firewalls

Windows XP SP2 Advanced Security Technologies Network protection Memory protection Safer handling More secure browsing Improved computer maintenance Get more information on Windows XP Service Pack 2 at Network protection Memory protection Safer handling More secure browsing Improved computer maintenance Get more information on Windows XP Service Pack 2 at

Description of the Application Layer Layer includes both client and server network applications Functionality must be maintained Client Applications Examples: Microsoft Outlook, Microsoft Office Suite Server Applications Examples: Web Servers, Exchange Server, SQL Server

Application Layer Compromise Loss of application functionality Execution of malicious code Extreme use of application – DoS attack Undesirable use of application

Application Layer Protection Enable only required services and functionality Secure internally developed applications Install security updates for all applications Install and update antivirus software Run applications with least privilege necessary Use latest security practices when developing new applications

Description of the Data Layer Documents Directory Files Application Files

Data Layer Compromise Documents Directory Files Application Files View, Change, or Remove Information Interrogate Directory Files Replace or Modify Application Files

Data Layer Protection Encrypt files with EFS Use a combination of access control lists and encryption Move files from the default location Perform regular backups of data Protect documents and with Windows Rights Management Services Use NTFS for file and folder-level security

Security Incident Response Business Case Security Risk Management Discipline Defense in Depth Security Incident Response Best Practices 10 Immutable Laws of Security

Incident-Response Checklist Identify the attack Communicate the attack Contain the attack Implement preventive measures Document the attack Recognize that an attack is under way

Containing the Effects of the Attack Shut down affected servers Remove affected computers from the network Block inbound and outbound network traffic Take precautionary measures to protect computers not yet compromised Preserve the evidence

Best Practices Business Case Security Risk Management Discipline Defense in Depth Security Incident Response Best Practices 10 Immutable Laws of Security

Security Best Practices Follow the defense-in-depth model Strive for systems that are secure by design Apply the principle of least privilege Learn from experience Use monitoring and auditing Train users to be aware of security issues Develop and test incident-response plans and procedures

Security Checklist Create security policy and procedure documents Subscribe to security alert s Keep up to date with patch management Maintain regular backup and restore procedures Think like an attacker

10 Immutable Laws of Security Business Case Security Risk Management Discipline Defense in Depth Security Incident Response Best Practices 10 Immutable Laws of Security

The 10 Immutable Laws of Security, Part 1 1 If an attacker can persuade you to run his program on your computer, it is not your computer anymore 2 If an attacker can alter the operating system on your computer, it is not your computer anymore 3 If an attacker has unrestricted physical access to your computer, it is not your computer anymore 4 If you allow an attacker to upload programs to your Web site, it is not your Web site any more 5Weak passwords prevail over strong security

The 10 Immutable Laws of Security, Part A computer is only as secure as the administrator is trustworthy 7 Encrypted data is only as secure as the decryption key 8 Out-of-date antivirus software is only marginally better than no antivirus software at all 9 Absolute anonymity is not practical in real life nor on the Web 10Technology is not a panacea

Session Summary Business Case Security Risk Management Discipline Defense in Depth Security Incident Response Best Practices 10 Immutable Laws of Security

Next Steps Find additional security training events: Sign up for security communications: default.mspx default.mspx Get additional security tools and content:

Event Information What’s Next? Technical Roadshow Post Event Website Available from Monday 18 th April Please complete your Evaluation Form!

© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.