Security Baselines Chapter 13.

Slides:



Advertisements
Similar presentations
FIREWALLS Chapter 11.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Chapter 11 Firewalls.
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 7 HARDENING SERVERS.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
SECURITY BASELINES -Sangita Prabhu.
Chapter 7: Using Windows Servers to Share Information.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Chapter 13 – Network Security
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
1 Version 3.0 Module 11 TCP Application and Transport.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Chapter 2 Securing Network Server and User Workstations.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Security fundamentals
Working at a Small-to-Medium Business or ISP – Chapter 8
Securing the Network Perimeter with ISA 2004
Chapter 4: Security Baselines
Lesson 16-Windows NT Security Issues
Configuring Internet-related services
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Security Baselines Chapter 13

Learning Objectives Gain an understanding of OS/NOS vulnerabilities and hardening practices Understand the operation of a file system and how to secure a file system Explore common network hardening practices, including firmware updates and configuration best practices continued…

Learning Objectives Identify network services commonly exploited by attackers and learn best practices for writing access control lists Explore vulnerabilities regarding network services such as Web, FTP, DNS, DHCP, Mail, File/Print Servers and Data Repositories as well as best practices in securing such services

Operating System (OS) Performs basic tasks Recognizes input from keyboard Sends output to display screen Keeps track of files and directories on the disk Controls peripheral devices (disk drives, printers)

Network Operating System (NOS) Includes special functions for connecting computers and devices into a LAN Some have built-in networking functions

OS/NOS Hardening Process of modifying an OS’s default configuration to make it more secure to outside threats May include removal of unnecessary programs and services May include application of patches to system kernel to limit vulnerability

OS/NOS Hardening

Actions that Can Disrupt Functionality of a System Attacks Malfunctions Errors

Best Practices for System Hardening Remove unused applications, services, and unused or unnecessary file shares Implement and enforce strong password policies; remove or disable expired or unneeded accounts Limit number of administrative accounts Set account lockout policies to discourage password cracking continued…

Best Practices for System Hardening Keep track of latest security updates and hot fixes Maintain logging of all user account and administrative activity Back up the system periodically Keep external log of each critical system Maintain records of backups and upgrades

File Systems Store data that enable communication between an application and its supporting disk drives Setting privileges and access controls protect information stored on the computer Common privileges: read, write (modify), lock, append, and execute Group users by common needs Additional rights can be granted to a single user in a group Principle of least privilege

Creating Needed User Groups System administrator configures operating system to recognize certain user groups Individual users are assigned to appropriate groups

Configuring Access Controls System administrator configures access controls for all protected files, directories, devices, and other objects

Common Practices for Setting File and Data Privileges Disable write and execute privileges for all executable and binary files Restrict access of OS source files, configuration files, and their directories For UNIX systems: No world-writable files unless specifically required Mount files systems as read only and nosuid continued…

Common Practices for Setting File and Data Privileges For NT systems No permissions allowing “Everyone” group to modify files Assign access permission of immutable to all kernel files Establish all log files as “append only” Prevent users from installing, removing, or editing scripts Pay attention to access control inheritance when defining categories of files and users

Installing and Configuring File Encryption Capabilities File encryption is useful if the OS Lacks adequate access controls to maintain confidentiality Does not support access control lists Encryption is resource-consuming; carefully weigh benefits

Systematic Approach for Addressing Updates Establish procedures for monitoring security-related information Evaluate updates for applicability Plan installation of applicable updates Install updates using a documented plan Deploy new systems with latest software

Network Hardening Crucial to have a network with availability as well as adequate security

Firmware Updates Made available by vendors as vulnerabilities and malfunctions are discovered with previous versions

Configuration Routing functions Firewall systems Designed to route packets efficiently and reliably, but not securely Not to be used to implement a security policy Firewall systems Should govern security of information flow in and out of the network Provide a policy enforcement mechanism at a security domain boundary

Assigning Network Addresses for Interfaces on a Firewall Device For the Internet Obtain IP addresses from ISP that connects to the firewall For internal networks Obtain IP addresses from within the organization, typically from RFC 1918 specification

Establishing Routing Configuration Should be performed in an environment isolated from the production network Should specify what connectivity is to be permitted with the specific statements and deny all other connectivity Derived from network topology; should not be used to implement aspects of a security policy

Best Practices for Configuring Router and Firewall Systems Keep copy of current configurations of network devices in safe location Never allow IP-directed broadcasts through the system Configure devices with meaningful names Use a description for each interface Specify bandwidth on the interfaces continued…

Best Practices for Configuring Router and Firewall Systems Configure a loopback address Handle SNMP with care Avoid common names for password and naming schemes Deploy logging about interface status, events, and debugging Restrict data traffic to required ports and protocols only

Access Control List (ACL) Set of data that informs a computer’s OS which permissions (access rights) each user or group has to a specific system object Control flow of packets through a device based on certain parameters and information contained within a packet Implement a certain type of security policy, but not considered a policy by themselves Implement packet filtering

Packet Filtering Process of deciding disposition of each packet that can pass through a router Provides basic protection mechanism for a routing firewall device through inspection of packet contents Can be based on intrinsic or extrinsic information pertaining to a data packet

Best Practices for Designing Filtering Rules for New Networks Add “deny all” rule to articulate the security policy more completely Design antispoofing rules and place them at top of the ACL Identify protocols, ports, and source and destination addresses that need to be serviced continued…

Best Practices for Designing Filtering Rules for New Networks Configure filtering rule set of the ACL by protocol and by port Collapse matching protocols rows and consecutive ports rows together into one new row that specifies a range Place all permission rules between antispoofing rules and “deny all” rule at the end of the rule set

Enabling and Disabling of Services and Protocols Many services can be easily targeted by attackers unless disabled by system administrators Evaluate every service for need and risks; remove unnecessary ones Evaluate and install required services in a manner to lower potential risk

Commonly Exploited Services Remote Procedure Call (RPC) Network File System (NFS) Web services Simple Mail Transfer Protocol (SMTP) Bootstrap Protocol DoS attacks are successful when unnecessary services are running on network devices

Commonly Exploited Services on Cisco Platforms Cisco Discovery Protocol (CDP) TCP small servers UDPT small servers Finger HTTP server Bootp server Configuration autoloading IP source Proxy ARP continued…

Commonly Exploited Services on Cisco Platforms IP-directed broadcast Classless routing behavior IP unreachable notifications IP mask relay IP redirects NTP service Simple Network Management Protocol Domain Name Service

Application Hardening Process of making applications software secure by ensuring that the software contains security enabling technology: Sign in capabilities for authenticated network connections Ability to run properly in secured configurations

Applications that Need Hardening Web servers E-mail servers FTP servers DNS servers NNTP servers File and print servers DHCP servers Data repositories Directory services

Web Servers Associated with more attacks and vulnerabilities than any type of server Designed to make information accessible, rather than to protect it

High Level Best Practices for Securing Web Servers Isolate a Web server on a DMZ Configure a Web server for access privileges Identify and enable Web server-specific logging tools Consider security implications Configure authentication and encryption

Isolating a Web Server on a DMZ

E-mail Servers Serious risks associated with ability to receive e-mail from the outside world Attachments with malicious contents E-mails with abnormal MIME headers Scripts embedded into HTML-enabled mail

Protecting Against E-mail Vulnerabilities Use latest software updates and patches on e-mail server Deploy dedicated e-mail relay (gateway) server between internal network and Internet Deploy virus-scanning tools on the server Use attachment-checking mechanisms on the server Use HTML Active Content removal

FTP Servers File Transfer Protocol Used to transfer files between a workstation and an FTP server

Vulnerabilities Associated with FTP Protecting against bouncebacks Restricting areas Protecting usernames and passwords Port stealing Other documented vulnerabilities

DNS Servers Domain Name Service (DNS) Collective name for system of servers that translate names into addresses in a process transparent to the end user

Vulnerabilities Associated with DNS Inaccurate data on IP address ownership Customer registry communication DNS spoofing and cache poisoning Out-of-date root.hints file Recursive queries Denial-of-service attacks

NNTP Servers Network News Transfer Protocol (NNTP) Delivers news articles to users on the Internet Stores articles in a central database; users choose only items of interest Makes few demands on structure, content, or storage of news articles NNTP servers can index and cross reference messages, and allow for notification of expiration

NNTP Servers Similar vulnerabilities to other network services Effective methods of preventing attacks Use proper authentication mechanisms Disable unneeded services Apply relevant software and OS patches

File and Print Servers Store many of an organization’s most valuable and confidential information resources

Protecting Against File and Print Server Vulnerabilities Offer only essential network and OS services on a server Configure servers for user authentication Configure server operating systems Manage logging and other data collection mechanisms Configure servers for file backups

DHCP Servers Dynamic Host Configuration Protocol (DHCP) Software that assigns dynamic IP addresses to devices on a network Reduces administrative burden No security provisions

Preventing Attacks on DHCP Servers Assign permanent addresses Collect Media Access Control (MAC) addresses of all computers on network and bind them to corresponding IP addresses Use dynamic addressing, but monitor log files Use intrusion detection tools continued…

Preventing Attacks on DHCP Servers Configure DHCP server to force stations with new MAC addresses on the network to register with the DHCP server Implement latest software and patches

Data Repositories Store data for archiving and user access Contain an organization’s most valuable assets in terms of information Should be carefully protected

Directory Services Lightweight Directory Access Protocol (LDAP) Industry standard protocol for providing networking directory services for the TCP/IP model Can store and locate information about entities and other network resources Based on simple, treelike hierarchy called a Directory Information Tree (DIT)

Directory Service-Oriented Threats Unauthorized access to data by monitoring or spoofing authorized users’ operations Unauthorized access to resources by physically taking over authenticated connections and sessions Unauthorized modification or deletion of data or configuration parameters Spoofing of directory services Excessive use of resources

Nondirectory Service-Oriented Threats Common network-based attacks against LDAP servers to compromise availability of resources Attacks against hosts by physically accessing the resources Attacks against back-end databases that provide directory services

Security of LDAP Is Dependent on… Authentication Anonymous Simple Simple Authentication and Security Layer (SASL) for LDAPv3 Authorization

Principles of Security to Protect Databases Authentication of users and applications Administration policies and procedures Initial configuration Auditing Backup and recovery procedures

Chapter Summary Role of operating and file systems as they relate to security of information resources stored on computer systems Operating system vulnerabilities Use of OS hardening practices to prevent attacks and system failures continued…

Chapter Summary Vulnerabilities associated with common services installed on computer systems (WWW services, FTP, DNS) and best practices in protecting against threats to these services Maintenance and upgrade of computer systems