system hardening Act of modifying a system to make it more secure Protecting against internal and external threats Usually a balance between security.

Slides:



Advertisements
Similar presentations
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Advertisements

Lesson 17: Configuring Security Policies
System Center Configuration Manager Push Software By, Teresa Behm.
System Security Scanning and Discovery Chapter 14.
Netprog: daemons and inetd1 Daemons & inetd Refs: Chapter 13.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Lesson 18: Configuring Application Restriction Policies
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
COEN 252: Computer Forensics Router Investigation.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
Instructor: Michael Teske BI222.  Lab follow up  Current events  Linux/Unix best practices  Project Management.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Hands-On Microsoft Windows Server 2008
1 Web Server Administration Chapter 9 Extending the Web Environment.
SELinux US/Fedora/13/html/Security-Enhanced_Linux/
1 Linux Basics for Networking. 2 Module - Linux Basics for Networking ♦ Overview This module focuses on the basics of networking using Redhat Enterprise.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Network Services CSCI N321 – System and Network Administration Copyright © 2000, 2007 by Scott Orr and the Trustees of Indiana University.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
1 Implementation of Security-Enhanced Linux Yue Cui Xiang Sha Li Song CMSC 691X Project 2—Summer 02.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
New SA Training Topic 6: Service Management Our organization takes advantage of many service type to provide functionality to users and ease management.
Chapter 10: Rights, User, and Group Administration.
Core System Services. INIT Daemon The init process is the patron of all processes. first process that gets started in any Linux/ UNIX -based system.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Linux Overview Why Linux ? Not-so-ancient history –Torvalds, Linus Torvalds, 002 the Helsinki University, as a student, low budget, work home –rapid and.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 7: Implementing Security Using Group Policy.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Linux Operations and Administration
SCSC 455 Computer Security Chapter 3 User Security.
Linux Operations and Administration
Security-Enhanced Linux Eric Harney CPSC 481. What is SELinux? ● Developed by NSA – Released in 2000 ● Adds additional security capabilities to Linux.
system hardening Act of modifying a system to make it more secure Protecting against internal and external threats Usually a balance between security.
Unit – 5 FTP Server. FTP Introduction One of the oldest and most commonly used protocols The original specification for the File Transfer Protocol was.
Module 8 Implementing Security Using Group Policy.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Unit 2 Personal Cyber Security and Social Engineering Part 2.
system hardening Act of modifying a system to make it more secure Protecting against internal and external threats Usually a balance between security.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Chap-I Network and System Configuration in Linux
ITIS 3110 System Hardening.
Linux Security Presenter: Dolev Farhi |
Module Overview Installing and Configuring a Network Policy Server
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
Chapter 11: Managing Users
IS3440 Linux Security Unit 3 User Account Management
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Network Services CSCI N321 – System and Network Administration
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Lesson 16-Windows NT Security Issues
Network Services.
Operating System Security
Daemons & inetd Refs: Chapter 12.
Convergence IT Services Pvt. Ltd
Presentation transcript:

system hardening Act of modifying a system to make it more secure Protecting against internal and external threats Usually a balance between security and usability Where balance is achieved is different for every organization

hardening practices Removing unneeded privileges, applications, or services Updating installed packages on a regular basis Maintaining user lists with up-to-date information Providing an audit trail to detect changes in files and behaviors

nsa security guides The NSA publishes security guides for various operating systems and applications Linux guide is written for Red Hat Enterprise Linux 5 Guide can be adapted for other Linux distributions

nsa security guides Guides are just a reference Never follow them without understanding what you are doing Many of the security recommendations may not make sense in your environment

nsa security guides uration_guides/index.shtml uration_guides/index.shtml

vulnerability databases Vulnerability databases are an important resource for determining if your software needs to be patched Often contain mitigation information as well as available update paths

vulnerability databases Interesting article: Database_Hacked Database_Hacked

inetd inetd is the Internet “super-server” A super-server listens to network ports and starts the appropriate server when a connection is received Configuration is in /etc/inetd.conf

/etc/inetd.conf One service per line Lines can be commented out by preceding with a # 7 tab-delimited fields service-name socket-type Protocol wait|nowait User server-program server-args “The wait/nowait entry specifies whether the server that is invoked...will take over the socket...and thus whether inetd should wait for the server to exit before listening for new service requests.” (man inetd)

/etc/inetd.conf service-name socket-type protocol wait | nowait user server-program server-args ftp stream tcp nowait root /usr/libexec/ftpd ftpd -l #ntalk dgram udp wat root /usr/libexec/ntalkd ntalkd telnet stream tcp6 nowait root /usr/libexec/telnetd telnetd

xinetd Secure replacement for inetd Configuration is stored in /etc/xinetd.conf and /etc/xinetd.d/ Most services have their own file in the configuration directory Allows services to be added when a package is installed

xinetd Configuration files allow both enabled and disabled keyword Convention is to only use disabled keyword On Red Hat-like systems chkconfig can control xinetd services

/etc/xinetd.d/tftp service tftp { socket_type = dgram protocol = udp wait = yes user = root server = /usr/sbin/in.tftpd server_args = -s /tftpboot disable = yes }

disabling services Red HatDebian Standard Service chkconfigupdate-rc.d inetd -update-inetd xinetd chkconfigedit manually

sudo sudo is a command that allows a normal user to perform actions as root or another user More flexible than su which is all or nothing Authenticates user with their password su requires user to know root or other user’s password

sudo All root-level work should be done using sudo Allows tracking of what users were using root privileges for Configuration is in /etc/sudoers sudoers should be edited with visudo checked after editing with visudo –c

/etc/sudoers #%group hostlist=(runas) cmd %wheel ALL=(ALL) ALL #user hostlist=(runas) cmd rgharaib ALL=(ALL) /etc/init.d/maui [a-z]* rgharaib ALL=(ALL) /sw/torque/bin/pbsnodes -[co] [a-z0-9]* rgharaib ALL=(ALL) /opt/xcat/bin/rpower b[0-9]* [a-z]* rgharaib ALL=(ALL) /usr/bin/ssh ananke reboot rgharaib ALL=(ALL) /usr/bin/ssh aether reboot Xyz ALL=(ALL) ALL Userid Xyz can run on any server as any target user for any command Xyz ALL=(root) vi Userid Xyz can run on any server as root for the vi command

selinux Security-Enhanced Linux adds access-control mechanisms to the Linux kernel Most common mechanism is Mandatory Access Control (MAC) Developed primarily by the NSA

selinux All files are assigned a security context policies exist for every application detailing the security contexts they can access

selinux in red hat Red Hat includes decent SELinux support out of the box Can be enabled by editing /etc/selinux/config Usually type should be targeted and mode should be enforcing

selinux Having SELinux enabled may break some necessary functionality Booleans can be used to change SELinux behavior getsebool -a will show available booleans setsebool can modify them

auditd Audit daemon that tracks security operations on a system SELinux problems are logged to the audit daemon Can be configured to meet federal, DoD or other requirements Logs written to /var/log/audit/

selinux + auditd audit2allow will generate a SELinux ruleset from denied actions recorded by auditd Simple mechanism to update SELinux policies for your environment

monitoring changes Host-based intrusion detection systems Designed to detect changes to files on the system Normally used in extremely paranoid environments AIDE (Advanced Intrusion Detection Environment) is one example

aide Works by creating a database containing hashes of important files on the filesystem Periodically verifies that file hashes have not changed Must be turned off to update anything Database must be rebuilt after an update

logging Centralized log management is key Once logs are centralized, you need a way to condense them into something useful logwatch is one such tool

logwatch Tool to generate summary of system logs Can generate one containing all systems or an for each system Split into different components that check for certain patterns Easy to write new components

configuration management Tools and concepts that help maintain systems consistency Administrators use tools to write policies and apply them to multiple systems Policies are verified periodically and any changes on the local system can be backed out Some tools allow administrators to roll back changes that were pushed out via configuration management

configuration management Large organizations and organizations concerned about security can benefit from configuration management Example tools are cfengine and puppet Will have a complete module on configuration management