Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Chapter 1  Introduction 1 Chapter 1: Introduction.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 24 Slide 1 Critical Systems Validation 2.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
SEC835 Database and Web application security Information Security Architecture.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Problem Determination Your mind is your most important tool!
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
University of Toronto Department of Computer Science © Steve Easterbrook. This presentation is available free for non-commercial use with attribution.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
Security - Why Bother? Your projects in this class are not likely to be used for some critical infrastructure or real-world sensitive data. Why should.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
Information Security What is Information Security?
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Computer Security By Duncan Hall.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
Plans for D7.7 The Security Report on the Final Project Release Linda Cornwall, RAL.
Computer Security Sample security policy Dr Alexei Vernitski.
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
For more course tutorials visit
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
CS457 Introduction to Information Security Systems
SE-1021 Software Engineering II
Secure Software Confidentiality Integrity Data Security Authentication
Data Protection Session
Wireless Network Security
Putting It All Together
Putting It All Together
Grid Services Security Vulnerability and Risk Analysis
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
How to Mitigate the Consequences What are the Countermeasures?
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005

24-Feb-05Security Vulnerability - Linda Cornwall2 Introduction Where are we? Why do we need to act? What are we protecting and preventing happening by addressing vulnerabilities? How to approach it Discussion

24-Feb-05Security Vulnerability - Linda Cornwall3 Where are we? In DataGrid and EGEE a lot has been done on Security Functionality –Requirements –Design –Implementation –Deployment Is the grid secure? –We know some vulnerabilities are there, some are being fixed by developers, some are waiting to be exploited by hackers

24-Feb-05Security Vulnerability - Linda Cornwall4 Why do we need to act? We could be considered highly negligent if we continue to role out Grid deployment without dealing with vulnerabilities It will be really embarrassing if when LHC comes on line we get a serious attack on the grid system which prevents data being stored or processed Hackers Conference HOPE mentioned Grids –unfriendly people without credentials are becoming aware of us 1000s of users in 10’s CAs –we cannot guarantee that every person with a correctly issued certificate is trustworthy

24-Feb-05Security Vulnerability - Linda Cornwall5 What are we protecting? Firstly, we need to protect the system Ensure the system is available and working Cannot be disrupted by an authorized user –On purpose –By mistake Cannot be disrupted by a hacker

24-Feb-05Security Vulnerability - Linda Cornwall6 Protect others from our system Prevent our system being used to crack a certificate by brute force Prevent denial of service attacks from our system Ensure it’s not used to store and distribute illegal material If we don’t take care to address these issues we could find ourselves in serious trouble, it would be more than embarrassing, we may be considered criminally negligent for setting up these systems without sufficient protection

24-Feb-05Security Vulnerability - Linda Cornwall7 Protect Data We need to ensure that data is stored in a reliable manner We need to ensure that data cannot get accessed by those who should not access it –Especially confidential data

24-Feb-05Security Vulnerability - Linda Cornwall8 Protect the user We need to protect the user from being accused of doing something they did not do We need to protect the user from doing something they did not intend to do –Large bills –Possibly more in the future

24-Feb-05Security Vulnerability - Linda Cornwall9 3 way approach Checklists –One for Middleware –One for Deployment Vulnerability logging –Logging knowledge of specific vulnerabilities Anti use cases –Use cases that should be prevented

24-Feb-05Security Vulnerability - Linda Cornwall10 Checklists My document contains checklists for Middleware and Deployment The middleware list is more developed Some may seem obvious – I don’t apologise for this, if they are so simple and taken care of a tick is all that is needed I don’t claim they complete – anyone is free to suggested additions or changes They are intended to indicate what to check –not formal –not much detail – not re-writing secure programming text books!

24-Feb-05Security Vulnerability - Linda Cornwall11 Checklists – (cont) Middleware developers check against the middleware list to help reduce vulnerability Note that these checklists are not a substitute for requirements

24-Feb-05Security Vulnerability - Linda Cornwall12 Middleware Checklist For middleware so far I have around 116 checks in 22 categories including –Design –Input checking –Middleware Access to the system –File Handling –Logging –Testing Tried to class them –SV – Specific vulnerability –VIR – Vulnerability Impact Reduction –VRR – Vulnerability Risk Reduction –ADL - Activity Detection and Logging

24-Feb-05Security Vulnerability - Linda Cornwall13 Middleware Design DES-02 Design for robustness –Design such that if one part of the system is mis- configured or fails the whole system doesn’t fail –Means 1 hacked site does not cause the whole to fail –VIR – Vulnerability Impact Reduction DES-03 Principle of least privilege –Consider what privileges the executing software should have – try and minimize –Impact of a vulnerability is less –VIR

24-Feb-05Security Vulnerability - Linda Cornwall14 Communications COM-01 Use Established protocols –Less likely to have a vulnerability if you do not invent your own! –VRR – Vulnerability Risk Reduction COM-05 Encrypt sensitive information –Obvious! –SV – Specific Vulnerability

24-Feb-05Security Vulnerability - Linda Cornwall15 Input Checking INP-01 Validate all input INP-02 Validate at each connection –You cannot assume your own client is used, even if your client validates the input! INP-07 Check for input that links to input from elsewhere –Don’t allow this to be a way of bypassing the checking

24-Feb-05Security Vulnerability - Linda Cornwall16 Logging Logging is important to ensure that any abnormal activity is detected. LOG-02 Log access to resources LOG-03 Log usage of resources LOG-05 Traceable logging –Ensure users credentials are logged All ADL – activity detection and logging

24-Feb-05Security Vulnerability - Linda Cornwall17 Deployment and Configuration So far about 35 checks, e.g. VER-02 Apply all critical patches CRD-01 Password protect all private keys CRD-02 Private keys must not be shared Will add more, open to suggestions, some will come as a result of the specific vulnerability logging

24-Feb-05Security Vulnerability - Linda Cornwall18 Tables Each development team is encouraged to use the list –After a bit of improvement For each item on the checklist to check, –Rel – tick if relevant, if not do nothing –Checked, tick if carried out –Result – if O.K. nothing more. –Otherwise Refer to a description of the problem, whether or not it’s been tackled. –Comment – if only 3-4 words are enough.

24-Feb-05Security Vulnerability - Linda Cornwall19 Known Vulnerabilities We should produce a ‘known vulnerability’ log Collect information from people like sysadmins and loose cannons, as well as developers We must keep such a list away from public consumption –At least until we have a fix We must encourage people to address the known vulnerabilities

24-Feb-05Security Vulnerability - Linda Cornwall20 Vulnerability logging Location – where the problem is Vulnerability – brief description of the problem Exploitation – whether it has been exploited and who could exploit it –No credentials, authenticated only, authorized user, or a sysadmin Analysis –Configuration problem? Middleware problem? Risk –What might happen if it isn’t fixed

24-Feb-05Security Vulnerability - Linda Cornwall21 Vulnerability logging (cont) Proposed solution Bugs submitted Checklist reference –If a check in one of the lists would pick it up Checklist proposal –Something to add to the list to improve detection of potential vulnerabilities in the future (if appropriate) Severity? –Possibly a scale of 1 to 10? –E.g. far worse if an un-authenticated user can delete the whole database, than if in rare circumstances an authorized user can see data belonging to a different group.

24-Feb-05Security Vulnerability - Linda Cornwall22 (Anti) Use Cases Suggest we have Anti Use cases, I.e. things that should not be allowed e.g. –Certificate cracking –Launch of a denial of service attack on the grid Describe what mechanisms prevent these Try and achieve them! Fix if we do achieve them!

24-Feb-05Security Vulnerability - Linda Cornwall23 Summary Produce a checklist of things we should take care of to remove or reduce the risk of there being a vulnerability –One for middleware –One for deployment Check against this list to find specific vulnerability or reduce risk of vulnerability –Developers check their middleware Produce a list of known vulnerabilities Consider (anti) use cases Fix vulnerabilities –Use knowledge of specific vulnerabilities to improve the checklists I suspect it’s not possible to fix all vulnerabilities quickly Keep information on specific vulnerability away from public consumption until they are fixed Hopefully the software and deployment will get better with time

24-Feb-05Security Vulnerability - Linda Cornwall24 Relation to Risk Analysis This is not a risk analysis, but a way getting rid of some of the vulnerabilities to get rid of risk When analysing specific vulnerabilities should consider the risk –Could also mention e.g. specific LCG risk no. Could refer checks on checklists to relevant risk Most of the risks in the risk analysis may be reduced by using the checklist

24-Feb-05Security Vulnerability - Linda Cornwall25 Checklist Discussion (1) Is the Concept of a checklist useful? Is it along the right lines? –Do you think it should be more formal? –Categories? Classification? anything you think I should add –Not just my list – more I’m starting it and driving it and encouraging people to contribute to and use it

24-Feb-05Security Vulnerability - Linda Cornwall26 Checklist Discussion (2) Should we have separate per language checklist documents? –There is some XML stuff in the Grid Incident Description and Exchange document written by Yuri Is it useful to have a detailed social engineering chapter ?

24-Feb-05Security Vulnerability - Linda Cornwall27 Vulnerability Logging discussion Is what I suggest logging sensible? How should we manage this? Important to keep the information outside the public domain until it is fixed Database, with limited access? list – with moderated membership?