Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network.

Slides:



Advertisements
Similar presentations
Security Update Server Registration, Active scanning and Windows patching.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Information Security Policies and Standards
Chapter 12 Network Security.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Security Guidelines and Management
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Note1 (Admi1) Overview of administering security.
Chapter 2 Securing Network Server and User Workstations.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Security fundamentals Topic 10 Securing the network perimeter.
Retina Network Security Scanner
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Chapter 12 Operating System Security. Possible for a system to be compromised during the installation process before it can install the latest patches.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security fundamentals
Chapter 7. Identifying Assets and Activities to Be Protected
Critical Security Controls
CompTIA Server+ Certification (Exam SK0-004)
Wireless Network Security
Security in Networking
I have many checklists: how do I get started with cyber security?
IS4680 Security Auditing for Compliance
12 STEPS TO A GDPR AWARE NETWORK
6. Application Software Security
Presentation transcript:

Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network

Background Sogeti USA –Sogeti USA LLC, part of the Sogeti Group, provides information technology services to businesses and public sector organizations. MicroSolved,Inc. –MicroSolved, Inc. provides information security services and consulting to Sogeti USA customers.

Today’s Agenda Common issues that cause an organization to fail penetration tests Some suggestions on how an organization may improve their security posture

Note: All ideas mentioned in this presentation also apply to any wireless or modem (dialup) systems as well.

> Policy Issues

Problems with Policies and Processes Inconsistent application of policies throughout the organization Poorly designed policies and standards Example: Password are not required for all forms of network and application access

Proper Use Of Policies and Processes Policies and Processes are developed in accordance with industry standard best practices, and/or an appropriate regulatory guideline Policies are broad enough to establish the expected behavior in the user population Policies are consistently applied across the organization

Example: A proper password policy –Passwords are required for all forms of network and application access –Password strength is mandated to meet a specific level (IE: 7 Chars, Alpha-Num, w/special characters and mixed case) –Password rotation is large enough to prevent password reuse issues –Administrative/root access is strongly protected, requiring a token

Another Policy Issue: Poor Domain Trust Choices Who trusts who? –Weak trust structure Types of trust Some domains have less security than others Development Production

Example: Development Production Good Domain Trust Choices Who trusts who? –Unidirectional trust Allows work to be done Protects Production domain

Process Issues: Information Leakage Problems Who’s saying what? –Example of Usenet leakage "Gary Smith" wrote in message I have a data communication application that uses TAPI 2.x for doing async modem protocols. This application has been in use for three years. I have discovered a problem, and can recreate it where data is lost somewhere between the modem and my application but it only happens on Windows 2000 machines. If I run it on a Windows NT 4.0 machine, it works fine...

Process Solution: Combating Information Leakage Who’s saying what? Have technical staff members use and Usenet posting addresses not associated with the organization Make sure users know not to post corporate identifiers online Monitor the Internet for information leakage problems and address them ASAP

> Problems with Patching

Poor Patch Management Systems are not current on patches/hotfixes Patches are not consistently applied throughout the organization Patches are more than security, they also may provide: –Stability –New Features –New Ways to Prevent Illicit Access Patch problems can hurt you!

Patching Details Matter Sometimes, patches have to be applied in a specific order or manner –Failing to do so, may actually INCREASE your vulnerability!

Proper Patch Management Patch levels are monitored on a regular basis using manual processes or automated vulnerability assessments Patches are tested in a isolated environment before being applied to production systems and devices Patches apply to operating systems, applications and even hardware devices Policies and standards clearly define the mechanisms and frameworks for acquiring, testing and deploying patches, fixes and version upgrades

> Configuration Downfalls

Configuration Issues Poorly configured perimeter implementations –Example: Firewall rules are not granular or allow too much access Internal network does not meet industry standard best practices –Example: Unnecessary services offer footholds for attackers Systems are not adequately hardened –Example: Access controls allow easy access to confidential data

Proper Perimeters Access controls systems (ie: firewalls, router, etc.) start with a deny all attitude Services are added with specific granularity as required for business Internet visible systems are physically and logically segregated from production networks Intrusion detection tools allow for easy anomaly and danger identification Systems are carefully monitored via log files or agents using a manual or automated process Alternate forms of access (ie: remote management, VPN, RAS, etc.) terminate in a DMZ or segregated segment

Proper Network Configuration Domain trusts are properly applied and implemented Unneeded services are not running on network connected systems and devices Proper egress controls assist in preventing malware spreading and attacks against other networks IDS is deployed to assist with problem detection and troubleshooting The network is monitored for changes in performance and traffic levels which could indicate a security or other type of issue

Proper System Configuration Systems are hardened in accordance with a baseline –Examples: SANS configurations, CIS baselines Systems are up to date on patches and fixes Unneeded services have been disabled All systems use anti-virus software with regular automatic updates Personal firewalls are deployed where appropriate, at a minimum on all laptops and notebooks Access controls have been appropriately applied to each device and its file system Users are aware of existing policies and guidelines

Keeping it All Together You have a complex environment Not all users will behave as expected Patches and fixes come fast and furious How do you keep all these variables under control? REGULAR ASSESSMENT & MONITORING

How To Fail A Penetration Test 1.Implement poor policies and processes No policies and processes also count! 2.Mismanage patches and fixes 3.Misconfigure your perimeter, network and/or systems 4.Take a number, attackers will be right with you…

more information Sogeti USA Chris Rice Or Scott Teeters Thank You