Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |

Slides:



Advertisements
Similar presentations
Security Features in Microsoft® Windows® XP James Noyce, Senior Consultant Security Solutions Team, Business Critical Services Microsoft Security Solutions,
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Secure Lync mobile Authentication
Secure SharePoint mobile connectivity
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Module 3 Windows Server 2008 Branch Office Scenario.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Security and Policy Enforcement Mark Gibson Dave Northey
Ing. Ondřej Ševeček MCSM:Directory | MVP:Enterprise Security | Certified Ethical Hacker | MCSE:SharePoint | Smart card.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Internet Security In the 21st Century Presented by Daniel Mills.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | Certified Ethical Hacker | |
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Course 201 – Administration, Content Inspection and SSL VPN
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Hands-On Microsoft Windows Server 2008 Chapter 10 Securing Windows Server 2008.
Windows Server 2008 Chapter 10 Last Update
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Week #7 Objectives: Secure Windows 7 Desktop
Chapter 13 – Network Security
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Microsoft DirectAccess & Work Folders NICHOLAS A. HAY MONROE COUNTY ISD
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 11: Remote Access Fundamentals
Passwords Everywhere GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP:
Module 9: Fundamentals of Securing Network Communication.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Designing Secure SharePoint External Access Ondrej Sevecek | MCM: Directory | MVP: Security |
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEH | | |
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Next Generation Remote Access Always On Seamless and Transparent Bi-Directional Connectivity NOT a VPN!
Module 7: Implementing Security Using Group Policy.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Implementing SSTP VPN and 802.1x with RADIUS on Windows 2012 Ing. Ondřej Ševeček | Product Manager Windows Server | GOPAS a.s. MCM: Directory | MVP: Security.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Ondrej Sevecek | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | Enterprise certification.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Chapter 5 Electronic Commerce | Security Threats - Solution
Configuring Windows Firewall with Advanced Security
Passwords Everywhere Ing. Ondřej Ševeček | GOPAS a.s. |
Chapter 5 Electronic Commerce | Security Threats - Solution
Threat Management Gateway
Security in Networking
Unit 27: Network Operating Systems
Server-to-Client Remote Access and DirectAccess
– Chapter 3 – Device Security (B)
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
INTERNET SECURITY.
Presentation transcript:

Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |

Motto  Thou shalt never assume The Rogue Warrior's Eight Commandment of SpecWar Richard Marcinko US Navy Seal

Current Threats to a Secure Office

Attackers  External  don’t know anything about your environment  can try brute force passwords at most  vulnerability scanning  Internal  most severe threats  know their environment  have already at least some level of access  can steal data they are authorized to read

Protection: External Attackers  Firewalls  Antispam/Antimalware  Software Updates  Account Lockout

Current Internal Threats  Assuming  Physical security  computers  data  Passwords  cracking, keyloggers  Eavesdropping  wired/wireless networks  Spam/malware  directed attacks  Remote Access  from unsecure computers  Data theft by authorized readers  currently one of the most underestimated problem

Current Threats

Vulnerabilities  Examples:  My wife crossing a road  PKI misconfiguration in a bank  Hidden accounts after virus attack  Malicious mail from home vs. from work

Protection: Assumptions  Never assume anything  Be careful  Know your enemy  Don’t do anything you don’t understand

Current Threats to a Secure Office

Environment  Windows 2008 R2 Datacenter  Windows 7 Enterprise  Exchange 2010  SharePoint 2010  Hyper-V  Office 2010  mobile devices with ActiveSync

Current Threats to a Secure Office

Vulnerabilities  Computers easily accessed by a lot of people  employees  maintenance staff  theft from branch offices  Attacks  stealing the whole machine  stealing the data only  Physical access = local administrator

Machines and Network  Servers  rack security  Data storage  Client computers  desktops, notebooks  usually caching data  Peripherals  Remote offices  Wireless and wired networks  AirPCap, USB ethernet switch/netbook

Protection: Physical access  Limit physical access  Place computers/storage into secure locations  +hardware locks, cables  Use notebooks instead of desktops  Use remote desktop/terminal  Encryption

Protection: BitLocker  Disk partition encryption  AES  Provide password on startup  prevents others from becoming an administrator  Use TPM  prevents owner from becoming an administrator  Trusted Platform Module  stores the password on motherboard  checks signatures of BIOS, CMOS, MBR, Boot Sector, loader etc.

Protection: BitLocker  Recovery keys in Active Directory  Windows 7 Enterprise  Gemalto.NET smart-cards  workstations/ntb require S/C to boot  manually enrolled  combined with user logon certificates

Protection: 802.1x  Network Access  Ethernet, WiFi  EAP-TLS  Certificate authentication  computer/user  computer + user  automatic enrollment, AD computer account

Protection: 802.1x Switch Managed Switch PC Printer PC

Current Threats to a Secure Office

Vulnerabilities  Free network access  No network traffic encryption  People ignore warnings  ARP poisoning

Protection: Firewall  Windows Firewall  IP/TCP/UDP/ICMP/AH/ESP inspection  FTP/PPTP/IPSec pass-through  IP/process filters  Network Location Awareness  Blocking client / client traffic

Protection: Eavesdropping  IPSec encryption  IP filters  Network Location Awareness  internal traffic only  Computer certificate authentication  automatically enrolled for AC machine account  AES, SHA-2

Protection: SSL Inspection  Threat Management Gateway  secure remote access  monitor users when “uploading”  Reverse inspection  Exchange, SharePoint, Terminal access  Forward  Antimalware, URL, classification

Internet SSL Publishing TMG LAN Web Server Certificate 443

SSL Certificate prices  Verisign – 1999  300$ year  Thawte – 2003  150$ year  Go Daddy – 2005  30$ year  GlobalSign – 2006  250$ year  StartCom – 2009  free

SSL Assurance  loopback confirmation  Requires just a valid address  No assurance about the target identity

EV browsers BrowserVersion Internet Explorer7.0 Opera9.5 Firefox3 Google Chrome- Apple Safari3.2 Apple iPhone3.0

EV Certificate prices  Verisign – 1999  1500$ year  Thawte – 2003  600$ year  Go Daddy – 2005  100$ year  GlobalSign – 2006  900$ year  StartCom – 2009  50$ year

LANInternet Forward SSL Inspection TMG Certificate443 Certificate443 Certificate443 Certificate443

SSL Inspection (MITM) Web Server Client Certificate Public key Private key Attacker TMG False Certificate Public key Private key

TMG Forward SSL Inspection

No SSL Inspection

TMG CA Not Trusted

Web Server Certificate

TMG CA Trusted on the Client

Protection: Intrusion Prevention  Threat Management Gateway  Intrusion Prevention System  External/Internal/DMZ only

Current Threats to a Secure Office

Vulnerabilities  Keyloggers  software  hardware  Cache / Local Storage  Cracking

Local Password Storage  Full-text passwords  IE autocomplete  password “lockers”  fingerprint readers  service/scheduled-tasks accounts  Password hashes  local user accounts  all domain accounts on Domain Controllers  password caches

Password Cracking  Windows MD4 Hashes  local storage  LAN network capture  PPTP VPN  Offline  Rainbow Tables  severe up to 7 characters (minutes)

Protection: Passwords  Use smart cards  convenient (3-5 characters PIN)  Gemalto.NET without installation  Require strong passwords  admin accounts  Procedures, policies and audit  Never type sensitive passwords on insecure computers  Training

Protection: Comparable Algorithm Strengths (SP800-57) StrengthSymetricRSAECDSASHA 80 bit2TDEARSA 1024ECDSA 160SHA bit3TDEARSA 2048ECDSA 224SHA bitAES-128RSA 3072ECDSA 256SHA bitAES-192RSA 7680ECDSA 384SHA bitAES-256RSA 15360ECDSA 512SHA-512

Protection: Smart Cards AlgoritmusPorovnání 10 znaků heslo US-ASCII70 bit SHA-180 bit RSA bit SHA bit AlgoritmusNáročnostDoba 10 znaků heslo US-ASCII let SHA-11024x lepší let RSA x lepší biliónů let SHA-2562^58x lepší-

Protection: Password Policies  For individual groups/users  Granular Password Policies  Windows 2008 Domain Functional Level and newer  Non-complex password example  login: Ondrej  password: #.LonDo-NN.sea-s0n58  Complex password example  September2011

Current Threats to a Secure Office

Spam threats  No real prevention against spam  Spam created anonymously  no traces/auditing  Directed attacks cannot be automatically recognized

Malware Threats  Virus must be first detected after infection!  Backdoors just download the real infection  does antimalware know what exactly it was?  Reinstallation of the whole password domain!  users tend to use same passwords for more services  Stability and performance

Protection: Spam and malware  Train people  Implement antispam/antimalware  Words/Open Relay Lists etc.  SenderID  Forefront Protection for Exchange  Forefront Protection for SharePoint  Forefront Threat Management Gateway  Forefront Endpoint Protection  + network traffic scanning

Antimalware

Antispam

Current Threats to a Secure Office

Vulnerabilities  Prone to keylogger attacks  when used with passwords  Can be connected from quite anywhere  insecure home computers, internet cafes  Some protocols not secure  PPTP – passwords hashes offline cracking

Client VPN Comparison VPNConnection requirementsSecurity Client Availability Authentic. RDP TCP 3389 server certificate (not required) random keys (D-H) certificate private key (2048bit) Windows XP password smart card RDS/TS Gateway TCP 443 server certificate random keys (D-H) certificate private key (2048bit) Windows XP password smart card PPTPGRE + TCP 1723 depends on password quality vulnerable to offline cracking MS-DOS password smart card L2TP IPSec ESP + UDP 500/4500 server certificate client computer certificate random keys (D-H) certificate private key (2048bit) Windows 98 password smart card SSTP TCP 443 server certificate random keys (D-H) certificate private key (2048bit) Windows Vista password smart card Direct Access IPv6 IPSec tunnel IPv6 over IPv4 tunneling random keys (D-H) certificate private key (2048bit) Windows 7 machine certificate + Kerberos

Protection: Remote Access  Use RDP when possible  sends only keystrokes and mouse  receives only pictures  Use L2TP or SSTP  IPSec or SSL  encrypts the channel with strong random private keys (2048 bit etc.)  IPSec requires and limits connection to those who have client computer certificate  Implement Network Access Protection (NAP)

Protection: Direct Access  IPv6 client / IPv6 gateway  Tunneling over IPv4  6to4, Teredo, ISATAP, IP-HTTPS  NAT64 + DNS64  Unified Access Gateway  Always on  Authentication  machine certificates  user Kerberos authentication

LAN DirectAccess Client DA Server

Current Threats to a Secure Office

Vulnerabilities  Authorized users can  read  print  copy  send s  upload FTP/SSL/VPN

Protection: Authorized users  Procedures  Limit public online access and services  Limit use of removable hardware  Limit use of unapproved software  AppLocker, Software Restriction Policies  Monitor and audit  Journaling  TMG URL logs  Use some Rights Management software  Data Leakage Protection

Current Threats to a Secure Office

What’s missing  User monitoring  RDP, keystrokes, etc.  File/folder encryption  EFS is very limited in features  RMS for more applications  currently only Office  Better smart/card experience  Better certificate restrictions  Alternative logon methods (e.g. SMS)

Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |