CERN IT Department CH-1211 Genève 23 Switzerland www.cern.ch/i t Security Overview Luca Canali, CERN Distributed Database Operations Workshop April 20-21.

Slides:



Advertisements
Similar presentations
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Securing Oracle Databases CSS-DSG JTrumbo. Audit Recommendations -Make sure databases are current with patches. -Ensure all current default accounts &
Distance Education Team 2 Security Architectures and Analysis.
Lecture 11 Reliability and Security in IT infrastructure.
(Geneva, Switzerland, September 2014)
Database Security Managing Users and Security Models.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
CERN IT Department CH-1211 Genève 23 Switzerland t Streams new features in 11g Zbigniew Baranowski.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Vulnerabilities. flaws in systems that allow them to be exploited provide means for attackers to compromise hosts, servers and networks.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
CERN - IT Department CH-1211 Genève 23 Switzerland t Monitoring the ATLAS Distributed Data Management System Ricardo Rocha (CERN) on behalf.
Information Systems Security Computer System Life Cycle Security.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
CERN’s Computer Security Challenge
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
CERN IT Department CH-1211 Genève 23 Switzerland t Internet Services Job Monitoring for the LHC experiments Irina Sidorova (CERN, JINR) on.
Security at NCAR David Mitchell February 20th, 2007.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
CERN - IT Department CH-1211 Genève 23 Switzerland t DB Development Tools Benthic SQL Developer Application Express WLCG Service Reliability.
Database weekly reports Zbigniew Baranowski Carlos Fernando Gamboa.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Note1 (Admi1) Overview of administering security.
Database Role Activity. DB Role and Privileges Worksheet.
CERN IT Department CH-1211 Genève 23 Switzerland t Application security (behind Oracle roles and profiles) Miguel Anjo 8 th July 2008 Database.
CERN - IT Department CH-1211 Genève 23 Switzerland t Oracle Real Application Clusters (RAC) Techniques for implementing & running robust.
Microsoft Management Seminar Series SMS 2003 Change Management.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
CERN IT Department CH-1211 Genève 23 Switzerland t DM Database Monitoring Tools Database Developers' Workshop CERN, July 8 th, 2008 Dawid.
CERN IT Department CH-1211 Genève 23 Switzerland t DBA Experience in a multiple RAC environment DM Technical Meeting, Feb 2008 Miguel Anjo.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
CERN - IT Department CH-1211 Genève 23 Switzerland t High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN,
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
CERN IT Department CH-1211 Genève 23 Switzerland t Streams Service Review Distributed Database Workshop CERN, 27 th November 2009 Eva Dafonte.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
Importance of Physical Security Common Security Mistakes 1.Security Awareness 2.Incident Response 3.Poor Password Management 4.Bad administrative.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Site Services and Policies Summary Dirk Düllmann, CERN IT More details at
6 Copyright © 2007, Oracle. All rights reserved. Managing Security and Metadata.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Oracle structures on database applications development
Critical Security Controls
Unit 1.6 Systems security Lesson 3
Determined Human Adversaries: Mitigations
The Dirty Business of Auditing
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Determined Human Adversaries: Mitigations
16. Account Monitoring and Control
6. Application Software Security
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

CERN IT Department CH-1211 Genève 23 Switzerland t Security Overview Luca Canali, CERN Distributed Database Operations Workshop April , Barcelona

CERN IT Department CH-1211 Genève 23 Switzerland t Outline Review of database security –Sharing experiences –Coordinate homogeneous effort across 3D community Main areas of interest –Threats to DB-centric applications –Actions to mitigate risks –Procedures and policies

CERN IT Department CH-1211 Genève 23 Switzerland t DB Security Threats Databases and DB applications are vulnerable at various levels, notably: –DB-specific security bugs –Application-related vulnerabilities –User-related vulnerabilities –External vulnerabilities (network, OS, etc) Risks: –Unauthorized access, defacing, worms, downtime, serious damage –Negative press exposure –Data theft

CERN IT Department CH-1211 Genève 23 Switzerland t DB Security Bugs 1/3 DB-specific bugs are addressed by Oracle’s CPU patches –Many fixes are for internal packages who suffer SQL injection or other major vulnerabilities –CPU patches expose the vulnerabilities to the community -> exploit come out on the internet –CPU patches come with a score for the vulnerability –The most dreaded are vulnerabilities that can be remotely exploited –Incidents like SQL slammer worm may happen again

CERN IT Department CH-1211 Genève 23 Switzerland t DB Security Bugs 2/3 Our experience –Apply CPU patches asap (after a validation period of about 3 weeks) –Users’ privileges are limited to the necessary set (no ‘any’ operations to users) –Read only accounts are treated as the read-write accounts for access security (privilege escalation is a big risk) –Read regularly blogs and security mailing lists for new threats, exploits, etc –Coordination within IT with the security team and between DBAs

CERN IT Department CH-1211 Genève 23 Switzerland t DB Security Bugs 3/3 Our experience –Many packages in Oracle are ‘grated to public’, we revoke at installation some that are know to have (or have had) security flaws revoke execute on sys.lt from public; revoke execute on dbms_cdc_subscribe from public; revoke execute on dbms_cdc_isubscribe from public; revoke execute on sys.utl_tcp from public; revoke execute on sys.utl_http from public; revoke execute on sys.utl_smtp from public; revoke execute on sys.dbms_export_extension from public;

CERN IT Department CH-1211 Genève 23 Switzerland t Application Related Vulnerabilities 1/2 Applications’ vulnerabilities open the way to DB access –SQL injection is a typical example –Other vulnerabilities of the app server can give an attacker full control on DB connection –A simple mistake on the application code can open the way for attacker to execute arbitrary SQL at least on one schema

CERN IT Department CH-1211 Genève 23 Switzerland t Application Related Vulnerabilities 2/2 Our experience –During validation phase we look at possible vulnerabilities –Recent example: suggested use of bind variables against SQL injection –Other example: protect the application with NICE credentials (see DB monitoring) –For our own ‘DBA applications’: we take care not to expose passwords –Overall it’s the developers’ responsibility to secure the application but DBAs can provide useful feedback

CERN IT Department CH-1211 Genève 23 Switzerland t Users’ Generated Vulnerabilities 1/2 Users can fail to protect the DB access –They may open easy way for an attacker to enter the DB –Social engineering is also a threat –Overall a collaborative environment is more prone to security holes

CERN IT Department CH-1211 Genève 23 Switzerland t Users’ Generated Vulnerabilities 2/2 Our experience –We use a password scanner to warn users of weak passwords + we force password complexity (and account expiration) –We keep track of account owners –Accounts and passwords can leak on the internet and search engines –Tnsnames can also leak to google –CVS is another potential pitfall –Wikis and monitoring tool should take care not to expose too much information on the setup –Overall it’s the users’ responsibility, DBAs can put in place tools and awareness of risks to help

CERN IT Department CH-1211 Genève 23 Switzerland t External Vulnerabilities The OS and network need to be protected too: –Other (non-Oracle) vulnerabilities can be used to enter the DB –If an attacker can break into the server, the DB is owned too

CERN IT Department CH-1211 Genève 23 Switzerland t External Vulnerabilities Our experience –Firewall access to DB server –Add local iptable firewall –Use non-default listener port –Regularly apply OS patches as provided by Linux support –Patches are applied in a rolling way, on scheduled maintenance

CERN IT Department CH-1211 Genève 23 Switzerland t Challenges of a distributed environment In a distributed environment if one target is broken into, the others may be at risk Our experience –None so far, fortunately! –CERT IT security team and service managers will work together in case of security issues

CERN IT Department CH-1211 Genève 23 Switzerland t Digression on CPU Patches Are CPU patches adding security to the system? –It is found that several Oracle users do not apply CPU patches at all –They rely on securing the DB with firewalls and/or hoping for the best! –Old method of ‘securing’ the DB, where one would also find weak password

CERN IT Department CH-1211 Genève 23 Switzerland t Digression on CPU Patches The answer in my opinion is yes, but only if the CPU patches are applied in a timely manner –After CPUs are out, details on the vulnerability come out too from security experts –It makes easy for non-experts to build exploits –One can also simply look at the patch files and find vulnerable pieces of code –Example CPU Apr09 has a sql injection vulnerability in a procedure inside dbms_aqadm_sys that can be easily seen just comparing old and new code! –Another example, CPU APR09 exposes that Oracle has a high score vulnerability on the resource manager

CERN IT Department CH-1211 Genève 23 Switzerland t Auditing –In auditing logs there is a large amount of information that can be used for security purposes –Identify unauthorized logons or attempts –OS and DB auditing can be used together –DB auditing can produce a lot of information and have a high performance impact –Our experience: to use auditing it’s necessary to have a ‘clean up job’ too or the audit table will fill up quickly. –Custom scripts and EM functionality have already some processing of audit logs at CERN

CERN IT Department CH-1211 Genève 23 Switzerland t AUDITMON project AUDITMON –A project that has been recently started, collaboration IT-DM, IT-DES –A tool to automate the analysis of logon auditing –Will be customized for each experiment –Will make use of a common repository of audit data –Will work with rules (2 sets: one to move audit data to the repository and one to process data)

CERN IT Department CH-1211 Genève 23 Switzerland t Other Areas of Oracle Security Security policies and actions can grow to be highly sophisticated, depending on the industry. It’s worth mentioning: –Encryption of Oracle*net traffic –Encryption of Oracle data and/or backups –DDL auditing –DML auditing –DB privilege usage auditing –Fine grained data access –Auditing of DBA actions –Penetration testing

CERN IT Department CH-1211 Genève 23 Switzerland t Summary DB security status is no different from other applications areas Multiple threats and security risks are identified Keeping the infrastructure secure is an ongoing process (and a ‘moving target’ too) In a distributed environment sharing experiences is a must