Download presentation
Presentation is loading. Please wait.
Published byPercival Cobb Modified over 9 years ago
1
Security Essentials for Desktop System Administrators
2
Civilization Is Made Of People … Civilization is Risk. -- Not Big Brother Civilization is Risk. -- Not Big Brother December 8, 2011Security Essentials for Desktop System Administrators2
3
Dave Barry On Civilization … New Technology Is Invented Largely To Overcome Previous "Advances" New Technology Is Invented Largely To Overcome Previous "Advances" December 8, 2011Security Essentials for Desktop System Administrators3
4
Dave Barry On Civilization … Fields December 8, 2011Security Essentials for Desktop System Administrators4
5
Dave Barry On Civilization … Fields -> Trees December 8, 2011Security Essentials for Desktop System Administrators5
6
Dave Barry On Civilization … Fields -> Trees -> Caves December 8, 2011Security Essentials for Desktop System Administrators6
7
Dave Barry On Civilization … Fields -> Trees -> Caves -> Houses December 8, 2011Security Essentials for Desktop System Administrators7
8
Dave Barry On Civilization … Houses December 8, 2011Security Essentials for Desktop System Administrators8
9
Dave Barry On Civilization … Houses -> Windows December 8, 2011Security Essentials for Desktop System Administrators9
10
Dave Barry On Civilization … Houses -> Windows -> Glass December 8, 2011Security Essentials for Desktop System Administrators10
11
Dave Barry On Civilization … Glass -> Drapes December 8, 2011Security Essentials for Desktop System Administrators11
12
Dave Barry On Civilization … Glass -> Drapes -> Tents December 8, 2011Security Essentials for Desktop System Administrators12
13
Dave Barry On Civilization … Glass -> Drapes -> Tents (in Fields!) December 8, 2011Security Essentials for Desktop System Administrators13
14
Dave Barry On Civilization … Fireplaces December 8, 2011Security Essentials for Desktop System Administrators14
15
Dave Barry On Civilization … Fireplaces -> Microwaves December 8, 2011Security Essentials for Desktop System Administrators15
16
Dave Barry On Civilization … Fireplaces -> Microwaves -> Bean Burritos December 8, 2011Security Essentials for Desktop System Administrators16
17
Dave Barry On Civilization … -> December 8, 2011Security Essentials for Desktop System Administrators17
18
Computer Security … Essentially A People Problem December 8, 2011Security Essentials for Desktop System Administrators18
19
Internet A Basic “People Problem” December 8, 2011Security Essentials for Desktop System Administrators19 Privacy
20
Internet A Slightly More Precise View December 8, 2011Security Essentials for Desktop System Administrators20 Privacy Blog Rants (tl;dr)
21
Bruce Schneier Once the technology is in place, there will always be the temptation to use it... (Secrets and Lies, 2000) Once the technology is in place, there will always be the temptation to use it... (Secrets and Lies, 2000) December 8, 2011Security Essentials for Desktop System Administrators21
22
Technology How Technology Works December 8, 2011Security Essentials for Desktop System Administrators22 Surprising Uses
23
Surprising Technology Use December 8, 2011Security Essentials for Desktop System Administrators23
24
Surprising Technology Non-Use December 8, 2011Security Essentials for Desktop System Administrators24
25
MUDFLAPS SO I HERD U LIEK THEM MUDFLAPS SO I HERD U LIEK THEM Surprising Technology Use December 8, 2011Security Essentials for Desktop System Administrators25
26
Technology Technology And Risk December 8, 2011Security Essentials for Desktop System Administrators26 Surprising Uses Malicious Activity*
27
Technology Technology And Risk December 8, 2011Security Essentials for Desktop System Administrators27 Surprising Uses Malicious Activity* * not to scale
28
Bruce Schneier And it is poor civic hygiene to install technologies that could someday facilitate a police state. And it is poor civic hygiene to install technologies that could someday facilitate a police state. December 8, 2011Security Essentials for Desktop System Administrators28
29
xkcd … December 8, 2011Security Essentials for Desktop System Administrators29
30
… xkcd December 8, 2011Security Essentials for Desktop System Administrators30
31
Dealing With Risk Recognize | Reduce | Recover December 8, 2011Security Essentials for Desktop System Administrators31
32
Dealing With Risk Protect | Detect. | React December 8, 2011Security Essentials for Desktop System Administrators32
33
Recognizing Risks High Bandwidth Enormous Storage Posh.gov Location Nothing Marketable High Bandwidth Enormous Storage Posh.gov Location Nothing Marketable December 8, 2011Security Essentials for Desktop System Administrators33
34
Recognizing Risks High Bandwidth Enormous Storage Posh.gov Location Nothing Marketable* High Bandwidth Enormous Storage Posh.gov Location Nothing Marketable* December 8, 2011Security Essentials for Desktop System Administrators34
35
Recognizing Risks Caching warez Sending SPAM Spreading malware Being/controlling bots Committing/suffering DDoS attacks Caching warez Sending SPAM Spreading malware Being/controlling bots Committing/suffering DDoS attacks December 8, 2011Security Essentials for Desktop System Administrators35
36
Recognizing Risks Destruction Of Data Waste Of Bandwidth Waste Of Time Frustration Destruction Of Data Waste Of Bandwidth Waste Of Time Frustration December 8, 2011Security Essentials for Desktop System Administrators36
37
Recognizing Risks Default admin privs Visiting malicious sites Promiscuous USB sharing Lack of gruntlement Default admin privs Visiting malicious sites Promiscuous USB sharing Lack of gruntlement December 8, 2011Security Essentials for Desktop System Administrators37
38
Newer Threats CarrierIQ / mobile device surveillance QR Code attacks CarrierIQ / mobile device surveillance QR Code attacks December 8, 2011Security Essentials for Desktop System Administrators38
39
Newer Threats DigiNotar Gemnet Stuxnet, Critical Infrastructure attacks Advanced Persistent Threats DigiNotar Gemnet Stuxnet, Critical Infrastructure attacks Advanced Persistent Threats December 8, 2011Security Essentials for Desktop System Administrators39
40
Grace Hopper Life was simple before World War II. After that we had systems. Life was simple before World War II. After that we had systems. December 8, 2011Security Essentials for Desktop System Administrators40
41
TLAs for TCB: ISM? DID! Integrated Security Management (ISM) Defense In Depth (DID) Integrated Security Management (ISM) Defense In Depth (DID) December 8, 2011Security Essentials for Desktop System Administrators41
42
Reducing Risks: DID Perimeter Controls Auto-blocking Mail virus scanning Central Authentication (via LDAP/Kerberos) Perimeter Controls Auto-blocking Mail virus scanning Central Authentication (via LDAP/Kerberos) December 8, 2011Security Essentials for Desktop System Administrators42
43
Reducing Risks: DID Patch and configuration mgmt Critical Vulnerabilities Prompt response via FCIRT Intelligent and informed users General and special enclaves Patch and configuration mgmt Critical Vulnerabilities Prompt response via FCIRT Intelligent and informed users General and special enclaves December 8, 2011Security Essentials for Desktop System Administrators43
44
Recognizing Risks: ISM Computer Security not an add-on Not “one size fits all” Largely common sense Computer Security not an add-on Not “one size fits all” Largely common sense December 8, 2011Security Essentials for Desktop System Administrators44
45
Reducing Risks: ISM Primary passwords off the net Single turn-off point No visible services without Strong Authentication Lab systems scanned for compliance Primary passwords off the net Single turn-off point No visible services without Strong Authentication Lab systems scanned for compliance December 8, 2011Security Essentials for Desktop System Administrators45
46
Recovery: ISM General Computer Security Coordinators (Listed at http://security.fnal.gov/ ) Work with Computer Security Team Disseminate information Deal with incidents General Computer Security Coordinators (Listed at http://security.fnal.gov/ ) Work with Computer Security Team Disseminate information Deal with incidents December 8, 2011Security Essentials for Desktop System Administrators46
47
What About Us Users? Malicious Surprises abound Use reasonable caution Malicious Surprises abound Use reasonable caution December 8, 2011Security Essentials for Desktop System Administrators47
48
Users: We Get Mail You haven’t won $10M Don’t open (most) attachments Best not to click links in mail Disable scripting for mail You haven’t won $10M Don’t open (most) attachments Best not to click links in mail Disable scripting for mail December 8, 2011Security Essentials for Desktop System Administrators48
49
Users: We Get Mail Can you trust the (so-called) sender? Received: from [123.28.41.241] (unknown [123.28.41.241]) by hepa1.fnal.gov (Postfix) with ESMTP id 808F76F247 for ; Thu, 01 Apr 2010 09:41:02 -0500 (CDT) From: Wayne E Baisley To: Wayne E Baisley route: 123.28.32.0/19 descr: VietNam Post and Telecom Corporation (VNPT) address: Lo IIA Lang Quoc te Thang Long, Cau Giay, Ha Noi Can you trust the (so-called) sender? Received: from [123.28.41.241] (unknown [123.28.41.241]) by hepa1.fnal.gov (Postfix) with ESMTP id 808F76F247 for ; Thu, 01 Apr 2010 09:41:02 -0500 (CDT) From: Wayne E Baisley To: Wayne E Baisley route: 123.28.32.0/19 descr: VietNam Post and Telecom Corporation (VNPT) address: Lo IIA Lang Quoc te Thang Long, Cau Giay, Ha Noi December 8, 2011Security Essentials for Desktop System Administrators49
50
Users: Pass the Word Use strong passwords Longer is better Use different passwords Or variants, at least Use strong passwords Longer is better Use different passwords Or variants, at least December 8, 2011Security Essentials for Desktop System Administrators50
51
Access: Hollywood Royko any social engineering attempts December 8, 2011Security Essentials for Desktop System Administrators51
52
Users: Data Decide what data requires protection How to be recovered, if needed Arrange backups with Sysadmins Or do your own backups Occasionally test retrieval Decide what data requires protection How to be recovered, if needed Arrange backups with Sysadmins Or do your own backups Occasionally test retrieval December 8, 2011Security Essentials for Desktop System Administrators52
53
The Incidental Computist Some non-Lab-business Surprising Use is allowed: http://security.fnal.gov/ProperUse.htm (I prefer personal iPhone/iPad/Droid via an external network …) Some non-Lab-business Surprising Use is allowed: http://security.fnal.gov/ProperUse.htm (I prefer personal iPhone/iPad/Droid via an external network …) December 8, 2011Security Essentials for Desktop System Administrators53
54
Activities to Avoid Services like Skype and BitTorrent not forbidden but very easy to misuse! Services like Skype and BitTorrent not forbidden but very easy to misuse! December 8, 2011Security Essentials for Desktop System Administrators54
55
Activities to Avoid Anything that: Is illegal Is prohibited by Lab/DOE policy May embarrass the Lab Interferes with job performance Consumes excessive resources Anything that: Is illegal Is prohibited by Lab/DOE policy May embarrass the Lab Interferes with job performance Consumes excessive resources December 8, 2011Security Essentials for Desktop System Administrators55
56
Which Brings Us To Sysadmins That wrench ain’t gonna swing itself. December 8, 2011Security Essentials for Desktop System Administrators56
57
Sysadmins Get Risk-Roled System manager for security Assist and instruct users to do it right Vigilant observer of your systems (and sometimes users’) behavior System manager for security Assist and instruct users to do it right Vigilant observer of your systems (and sometimes users’) behavior December 8, 2011Security Essentials for Desktop System Administrators57
58
N OISE, n. … The chief product and authenticating sign of civilization. Ambrose Bierce, The Devil’s Dictionary … The chief product and authenticating sign of civilization. Ambrose Bierce, The Devil’s Dictionary December 8, 2011Security Essentials for Desktop System Administrators58
59
Data Privacy Generally, Fermilab respects privacy You are required to do likewise Special cases for Sysadmins during Security Incidents Others must have Directorate approval Generally, Fermilab respects privacy You are required to do likewise Special cases for Sysadmins during Security Incidents Others must have Directorate approval December 8, 2011Security Essentials for Desktop System Administrators59
60
Privacy of Email and Files May not use information in another person’s files seen incidental to any activity (legitimate or not) for any purpose w/o explicit permission of the owner or “reasonable belief the file was meant to be accessed by others.” May not use information in another person’s files seen incidental to any activity (legitimate or not) for any purpose w/o explicit permission of the owner or “reasonable belief the file was meant to be accessed by others.” December 8, 2011Security Essentials for Desktop System Administrators60
61
Offensive Materials Material on computer ≈ Material on desk A line management concern Not a computer security issue per se Material on computer ≈ Material on desk A line management concern Not a computer security issue per se December 8, 2011Security Essentials for Desktop System Administrators61
62
Software Licensing Fermilab is strongly committed to respecting intellectual property rights. Use of unlicensed commercial software is a direct violation of lab policy. Fermilab is strongly committed to respecting intellectual property rights. Use of unlicensed commercial software is a direct violation of lab policy. December 8, 2011Security Essentials for Desktop System Administrators62
63
Patch/Configuration Management Baselines: Linux, Mac, Windows All systems must meet their baseline All systems must be regularly patched Non-essential services off Windows, especially, must run AV Baselines: Linux, Mac, Windows All systems must meet their baseline All systems must be regularly patched Non-essential services off Windows, especially, must run AV December 8, 2011Security Essentials for Desktop System Administrators63
64
Patch/Configuration Management Exceptions/Exemptions: Documented case why OS is “stuck” Patch and manage as securely Exceptions/Exemptions: Documented case why OS is “stuck” Patch and manage as securely December 8, 2011Security Essentials for Desktop System Administrators64
65
Critical Vulnerabilities Active exploits declared critical Pose a clear and present danger Must patch by a given date or be blocked Handled via TIssue events Active exploits declared critical Pose a clear and present danger Must patch by a given date or be blocked Handled via TIssue events December 8, 2011Security Essentials for Desktop System Administrators65
66
Computer Security Incidents Report suspicious events to x2345 or computer_security@fnal.gov Follow FCIRT instructions during incidents Keep infected machines off the network Preserve system for expert investigation Not to be discussed! Report suspicious events to x2345 or computer_security@fnal.gov Follow FCIRT instructions during incidents Keep infected machines off the network Preserve system for expert investigation Not to be discussed! December 8, 2011Security Essentials for Desktop System Administrators66
67
FCIRT Triage initial reports Coordinate investigation Work with local Sysadmins, experts May take control of affected systems Maintain confidentiality Triage initial reports Coordinate investigation Work with local Sysadmins, experts May take control of affected systems Maintain confidentiality December 8, 2011Security Essentials for Desktop System Administrators67
68
Mandatory Sysadmin Registration All Sysadmins must be registered Primary Sysadmin is responsible for configuring and patching http://security.fnal.gov -> “Verify your node registration” All Sysadmins must be registered Primary Sysadmin is responsible for configuring and patching http://security.fnal.gov -> “Verify your node registration” December 8, 2011Security Essentials for Desktop System Administrators68
69
Do Not Want: Prohibited Activities Blatant disregard of computer security Unauthorized or malicious actions Unethical behavior Restricted central services Security & cracker tools http://security.fnal.gov/policies/cpolicy.html Blatant disregard of computer security Unauthorized or malicious actions Unethical behavior Restricted central services Security & cracker tools http://security.fnal.gov/policies/cpolicy.html December 8, 2011Security Essentials for Desktop System Administrators69
70
We Want To Avoid This … December 8, 2011Security Essentials for Desktop System Administrators70
71
Role of Sysadmins Manage your systems sensibly, securely Services comply with Strong Auth rules Report potential incidents to FCIRT Act on relevant bulletins Keep your eyes open Manage your systems sensibly, securely Services comply with Strong Auth rules Report potential incidents to FCIRT Act on relevant bulletins Keep your eyes open December 8, 2011Security Essentials for Desktop System Administrators71
72
We Can Do It … December 8, 2011Security Essentials for Desktop System Administrators72
73
We Can Do It. Statistically. December 8, 2011Security Essentials for Desktop System Administrators73
74
Questions? nightwatch@fnal.gov for questions about security policy computer_security@fnal.gov for reporting security incidents http://security.fnal.gov/ nightwatch@fnal.gov for questions about security policy computer_security@fnal.gov for reporting security incidents http://security.fnal.gov/ December 8, 2011Security Essentials for Desktop System Administrators74
75
Security Essentials for Desktop System Administrators
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.