cis 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 implementing secure...

12
. CIS 3500 1 Secure Systems Design and Deployment Chapter #12: Architecture and Design Chapter Objectives n Learn to implement secure systems design for a given scenario n Understand the importance of secure staging development concepts Implementing Secure Protocols 2 System Design n System design has a great effect on the security n Errors in system design are very difficult to correct later, and almost impossible once a system is in production n Design phase of a project will go a long way in establishing a system that can be secured using security controls Implementing Secure Protocols 3 Hardware n Hardware – servers, workstations, and mobile devices can represent a weakness or vulnerability in security n You can easily replace hardware if it is lost or stolen, you can’t retrieve the information from the lost or stolen hardware n Safeguard against complete loss of data through backups, but this does little in the way of protecting it from disclosure n You can implement encryption but these measures also have drawbacks in scalability and key distribution Implementing Secure Protocols 4

Upload: others

Post on 22-May-2020

35 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 1

Secure Systems Design and Deployment

Chapter #12:

Architecture and Design

Chapter Objectives

n Learn to implement secure systems design for a given

scenario

n Understand the importance of secure staging development

concepts

Implementing Secure Protocols2

System Design

n System design has a great effect on the security

n Errors in system design are very difficult to correct later,

and almost impossible once a system is in production

n Design phase of a project will go a long way in establishing

a system that can be secured using security controls

Implementing Secure Protocols3

Hardware

n Hardware – servers, workstations, and mobile devices can

represent a weakness or vulnerability in security

n You can easily replace hardware if it is lost or stolen, you

can’t retrieve the information from the lost or stolen hardware

n Safeguard against complete loss of data through backups, but

this does little in the way of protecting it from disclosure

n You can implement encryption but these measures also have

drawbacks in scalability and key distribution

Implementing Secure Protocols4

Page 2: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 2

Firmware Security

n Firmware is a source of program code for the system

n Most systems will trust the firmware of a trusted system

n Monitoring and managing firmware security is a time-

intensive task because there are only a few tools to do that

n This makes physical security of the system and its

peripheral hardware important

Implementing Secure Protocols5

FDE/SED

n Full disk encryption (FDE) and self-encrypting disks (SEDs)

implement cryptographic protection on hard disk drives

n Portable machines, such as laptops, have a physical

security weakness in that they are relatively easy to steal

n Use of modern cryptography, coupled with hardware

protection, makes this vector of attack much more difficult

n Encrypting the entire hard disk drive can provide good

protection

Implementing Secure Protocols6

TPM

n The Trusted Platform Module (TPM) is a hardware solution

that assists with key generation

n When the encryption keys are stored in the TPM, they are

not accessible via normal software channels and are

separated from the hard drive or other data locations

n This makes the TPM a more secure solution than storing the

keys on the machine’s normal storage

Implementing Secure Protocols7

HSM

n A hardware security module (HSM) is a device used to

manage or store encryption keys

n It can also assist with encryption, hashing, or the

application of digital signatures

n They are peripheral devices, connected via USB or a

network connection

n HSMs have tamper protection mechanisms to prevent

physical access to the secrets they protect

Implementing Secure Protocols8

Page 3: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 3

BIOS

n Basic Input/Output System (BIOS) is the firmware that a

computer uses between the actual hardware and the OS

n BIOS is typically stored on nonvolatile flash memory

n The purpose is to initialize and test the interfaces to any actual

hardware in a system

n Once the system is running, the BIOS functions to translate

low-level access to the CPU, memory, and hardware

n This facilitates multiple hardware manufacturers and differing

configurations against a single OS installImplementing Secure Protocols9

UEFI

n Unified Extensible Firmware Interface (UEFI) is the current

replacement for BIOS

n UEFI has more security designed into it, including

provisions for secure booting

n From a system design aspect, UEFI offers advantages in

newer hardware support, and from a security point of view,

secure boot has some specific advantages

n All new systems are UEFI based

Implementing Secure Protocols10

Secure Boot and Attestation

n An OS has myriad drivers and other add-ons that hook into it and

provide specific added functionality

n These additional programs need to be vetted before installation; this

pathway can provide a means for attacks

n Attacks can occur at boot time, at a level below antivirus software, so

they can be very difficult to detect and defeat

n Secure Boot is a mode that only allows signed drivers and OS loaders

to be invoked –needs to be enabled

n Secure Boot enables the attestation that the drivers and OS loaders

have not changed since they were approvedImplementing Secure Protocols11

Supply Chain

n Hardware and firmware security is ultimately dependent

upon the manufacturer - safe and identified supply chain

n Can be very tricky, because even when purchasing

equipment from a highly trusted vendor, you don’t know

where they got the components

n You may have very strict rules concerning country of origin

Implementing Secure Protocols12

Page 4: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 4

Hardware Root of Trust

n A hardware root of trust is a concept that if one has a trusted source

of specific security functions, this layer can be used to promote

security to higher layers of a system

n Roots of trust are inherently trusted, they must be secure by design

n Many roots of trust are implemented in hardware that is isolated from

the OS and the rest of the system

n TPM chips in computers and Apple’s Secure Enclave coprocessor in its

iPhones and iPads

n Apple also uses a signed Boot ROM mechanism for all software

loadingImplementing Secure Protocols13

EMI/EMP

n Electromagnetic interference (EMI) is an electrical disturbance

that affects an electrical circuit

n An electromagnetic pulse (EMP) is a burst in an electronic

device as a result of a current pulse from electromagnetic

radiation

n It can produce damaging current and voltage surges in today’s

sensitive electronics

n Source can be equipment on the same circuit, solar flares, and

nuclear bursts high in the atmosphereImplementing Secure Protocols14

Operating Systems

n Operating systems are complex programs

n Mechanism to connect to other programs and hardware

resources

n Determining the correct settings and implementing them

correctly is an important step in securing a host system

Implementing Secure Protocols15

Types

n Many different systems have an operating system

n Network devices, servers and workstations, kiosks and

appliances

Implementing Secure Protocols16

Page 5: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 5

Network Devices

n Network operating system to provide configuration and

computation portion of networking

n Cisco has the largest footprint with its IOS

n Other vendors such as Juniper have Junos, which is built off

of a stripped Linux core

n Software-defined networking (SDN) will become more

important and mainstream because it will become a major

part of day-to-day operations

Implementing Secure Protocols17

Server OS

n Server operating systems bridge the gap between the

server hardware and the applications

n Microsoft Windows Server, many flavors of Linux, and an

ever-increasing number of virtual machine/hypervisor

environments

n Windows Server with its Active Directory technology and

built-in Hyper-V capability has assumed a commanding lead

in market share

Implementing Secure Protocols18

Workstations

n The workstation OS exists to provide a functional working

space, typically a graphical interface

n Windows, Mac OS X, Linux versions

Implementing Secure Protocols19

Appliance

n Appliances are stand-alone devices, wired into the network

and designed to perform a specific function on

n For reasons of economics, portability, and functionality, the

vast majority of appliances OSs are built using a Linux-

based OS

n These are customized distributions - patching becomes a

vendor problem

n Enterprise class intrusion detection, loss prevention, backup

Implementing Secure Protocols20

Page 6: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 6

Kiosk

n Kiosks are stand-alone machines, typically operating a

browser instance on top of a Windows OS

n Locked to a website that allows all of the functionality

desired

n Interactive information sites, menus, and so on

n The OS on a kiosk needs to be locked down to minimal

functionality so that users can’t make any configuration

changes

Implementing Secure Protocols21

Mobile OS

n Mobile Oss: Apple’s iOS and Google’s Android OS

n Optimized device capability and desired set of functionality

n Internet and functionality spread to mobile devices

n Smartphones to tablets, today’s mobile system is a

computer

Implementing Secure Protocols22

Patch Management

n Every OS requires software updates

n Through downloads from web sites or built-in utilities

n Hotfix - small software update designed to address a

specific problem

n Patch - more formal, larger software update that can

address several or many software problems, enhancements

n Service pack - large collection of patches and hotfixes rolled

into a single, rather large package

Implementing Secure Protocols23

Disabling Unnecessary Ports and Services

n Identify the specific needs of a system for its proper

operation and only enable items that are necessary

n Disabling unnecessary ports and services prevents their use

by unauthorized users

n Improves system throughput and increases securit

n Systems have ports and connections that need to be

disabled if not in use

n 65,536 ports

Implementing Secure Protocols24

Page 7: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 7

Least Functionality

n Least functionality similar to the principle of least privilege

on systems

n A system should do what it is supposed to do and not more

n Any additional functionality is an added attack surface

Implementing Secure Protocols25

Secure Configurations

n OS developers and manufacturers cannot possibly anticipate

the many different configurations and variations that users will

require from their products

n They provide a “default” installation which contains the base

OS and some more commonly desirable options

n End users are responsible for securing their own systems

n Hardening is the process of securing an OS and it is intended

to make the system more resistant to attacks

n The process is not trivialImplementing Secure Protocols26

Secure Configurations

n The base installation shall come from a trusted source, and

is verified as correct by using hash values

n Machines are connected only to a trusted network during

the installation, hardening, and update processes

n The base installation includes all current patches and

updates for both the OS and applications

n Backup images are taken after hardening and updates to

facilitate system restoration to a known state

Implementing Secure Protocols27

Trusted Operating System

n A tru s te d o p e ra t in g sy s te m is o n e th a t is d e s ig n e d to a llo w m u lt ile v e l se cu r ity in its

o p e ra t io n

n T ru s te d O S s a re e x p e n s iv e to c re a te a n d m a in ta in b e ca u se a n y ch a n g e m u s t u n d e rg o

a re ce rt if ic a t io n p ro ce ss

n C o m m o n C r ite r ia fo r In fo rm a tio n T e ch n o lo g y S e cu r ity E v a lu a t io n (a b b re v ia te d a s

C o m m o n C r ite r ia , o r C C ) , a h a rm o n ize d se cu r ity c r ite r ia re co g n iz e d b y m a n y n a t io n s ,

in c lu d in g th e U n ite d S ta te s , C a n a d a , G re a t B r ita in , a n d m o s t o f th e E U co u n tr ie s

n V e rs io n s o f W in d o w s , L in u x , m a in fra m e O S s , a n d sp e c ia lty O S s h a v e b e e n q u a lif ie d

to v a r io u s C o m m o n C r ite r ia le v e ls .

n T ru s te d O S s a re m o s t co m m o n ly u se d b y g o v e rn m e n t a g e n c ie s a n d co n tra c to rs th a t

re q u ire th is le v e l o f p ro te c t io n

Implementing Secure Protocols28

Page 8: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 8

Application Whitelisting/Blacklisting

n Application blacklisting - which applications should not be allowed

to run on the machine

n Application whitelisting – it is a list of allowed applications

n Advantages and disadvantages:

n b la c k l i s t in g i s d i f f i c u l t t o u s e a g a in s t d y n a m ic t h r e a t s

n w h it e l i s t in g i s e a s ie r t o e m p lo y — h a s h v a lu e s c a n b e u s e d t o e n s u r e

t h e e x e c u t a b le s a r e n o t c o r r u p t e d

n t h e c h a l le n g e in w h i t e l i s t in g i s t h e n u m b e r o f p o t e n t ia l a p p l i c a t io n s

t h a t a r e r u n o n a m a c h in e - m u l t ip u r p o s e m a c h in e s , i t c a n b e m o r e

c o m p l ic a t e d

Implementing Secure Protocols29

Disable Default Accounts/Passwords

n Default accounts with default passwords

n Defaults represent a significant security vulnerabilities

n Disable default accounts/passwords

n This is a simple task that you must do for any new system

n If you cannot disable the default account then change the

password to a very long password that offers strong

resistance to brute force attacks

n Guest, Admin, root, default shares

Implementing Secure Protocols30

Peripherals

n Many of these devices have embedded computers in them

n This has led to hacking of peripherals

n From wireless keyboards and mice, to printers, to displays

and storage devices, they have all become sources of risk

Implementing Secure Protocols31

Wireless Keyboards

n Wireless keyboards operate via a short-range wireless signal

n They connect through USB Bluetooth connector creating a

small personal area network (PAN), or a 2.4-GHz dongle

n Wireless keyboards can be paired with wireless mice

n Signals to and from the peripherals are subject to interception

n Keystrokes can be recorded – keylogging; can be very difficult

to detect

Implementing Secure Protocols32

Page 9: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 9

Wireless Mice

n Wireless mice are similar to wireless keyboards

n Mousejacking attack – man-in-the-middle attack on the

wireless interface and control the mouse and or intercept

the traffic

n Some of the major manufacturers, like Logitech, took this

effort for their mainstream product line, but a lot of mice

that are older were never patched

n The vulnerability still exists

Implementing Secure Protocols33

Displays

n Computer displays are primarily connected to machines

n But for conferences and other group settings, there are a

wide array of devices today that can enable a display via a

wireless network

n The risk of using these is simple: who else within range of

the wireless signal can watch what you are beaming to the

display in the conference room

n Transmitting sensitive data to the screen

Implementing Secure Protocols34

Wi-Fi-Enabled MicroSD Cards

n Wi-Fi-enabled MicroSD cards eliminate the need to move the

card from device to move the data

n Primarily designed for digital cameras

n They work by having a tiny computer embedded in the card

running a stripped-down version of Linux

n One of the major vendors in this space uses a stripped-down

version of BusyBox and has no security at all

n In an enterprise network they introduce a wide variety of

unpatched vulnerabilitiesImplementing Secure Protocols35

Printers/MFDs

n Printers have CPUs and a lot of memory

n Modern printers now come standard with a bidirectional channel, so

that you can send a print job to the printer and it can send back

information as to job status, printer status, and other items

n Multifunction devices (MFDs) are like printers on steroids.

n They combine printing, scanning, and faxing all into a single device

n Multiple people connect and share a fairly expensive high-speed

device

n Hackers have demonstrated malware passed by a printer to another

computer that shares the printer - passed the proof-of-concept phaseImplementing Secure Protocols36

Page 10: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 10

External Storage Devices

n Network-attached storage (NAS) devices – external storage

devices

n Simple Linux-based appliances, with multiple hard drives in

a RAID arrangement

n With the rise of ransomware, these devices can spread

infections to any and all devices that connect to the

network – precautions should be taken

n If not necessary, always-on should be avoided

Implementing Secure Protocols37

Digital Cameras

n Digital cameras are sophisticated computing platforms

n Capture images, perform image analysis, connect over

networks, and send files across the globe directly

n The capabilities are vast, and the ability to move significant

data quantities is built in for up to live 4K video streaming

n Data streams are encrypted, as the typical use would

require an encrypted channel

Implementing Secure Protocols38

Sandboxing

n Sandboxing refers to the quarantine or isolation

n Standard practice for programs with an increased risk

limiting the interaction with the CPU and other processes

n Virtualization can be used as a form of sandboxing with

respect to an entire system

Implementing Secure Protocols39

Environment

n Most organizations have multiple, separate computing

environments

n Isolation between development, test, staging, and production

n Prevent security incidents arising from untested code

n The hardware is segregated and access control lists prevent

users from accessing more than one environment at a time

n Moving code between environments requires a special account

minimizing issues of cross-contamination

Implementing Secure Protocols40

Page 11: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 11

Development

n The development environment is sized, configured, and set

up for developers

n Hardware does not have to be scalable

n Development platform does need to use the same OS

n After code is successfully developed, it is moved to a test

system

Implementing Secure Protocols41

Test

n The test environment fairly closely mimics the production

environment — same versions of software, patch levels,

permissions, file structures

n The purpose is to test a system fully prior to deployment

n The test environment may not scale like production, but it

will look exactly like production

n System-specific settings need to be tested in an

environment identical to that in which they will be run

Implementing Secure Protocols42

Staging

n The staging environment is optional

n After passing testing, the system moves into staging, from where it

can be deployed to the different production systems

n It serves as a sandbox after testing, so the test system can test the

next set, while the current set is deployed across the enterprise

n One method of deployment is a staged deployment, where software is

deployed to part of the enterprise and then a pause occurs to watch

for unseen problems - if none occur, the deployment continues

n This prevents the total loss of production to a failed update

Implementing Secure Protocols43

Production

n The production environment is where the systems work

with real data, doing the business that the system is

intended to perform

n This is an environment where, by design, very few changes

occur, and those that do must first be approved and tested

via the system’s change management process

Implementing Secure Protocols44

Page 12: CIS 3500 1rowdysites.msudenver.edu/~fustos/cis3500/pdf/chapter12.pdf · 9 Implementing Secure Protocols UEFI n Unified Extensible Firmware Interface (UEFI) is the current replacement

.

CIS 3500 12

Secure Baseline

n Baselining is the process of establishing software’s base security state

n Asecure baseline allows the software to run safely and securely

n Software and hardware can be tied intimately when it comes to

security, so you must consider them together

n After administrators have finished patching, securing, and preparing a

system, they create an initial baseline establishing a known safe

configuration

n Once you have completed the process, you can configure any similar

systems with the same baseline

n Uniform software baselines are critical in large-scale operationsImplementing Secure Protocols45

Integrity Measurement

n I n t e g r i t y m e a s u r e m e n t i s t h e m e a s u r in g a n d id e n t i f i c a t io n o f c h a n g e s t o a

s y s t e m a w a y f r o m a n e x p e c t e d v a lu e

n E . g . c h a n g in g o f d a t a , m e a s u r e m e n t o f t h e s y s t e m b o o t p r o c e s s a n d

a t t e s t a t io n o f t r u s t

n T a k e a k n o w n v a lu e , p e r f o r m a s t o r a g e o f a h a s h o r o t h e r k e y e d v a lu e ,

a n d t h e n , a t t im e o f c o n c e r n , r e c a lc u la t e a n d c o m p a r e

n I n t h e c a s e o f a T P M - m e d ia t e d s y s t e m t h e c h ip w i l l c a lc u la t e h a s h e s a n d

s t o r e t h e m in a P la t f o r m C o n f ig u r a t io n s R e g is t e r ( P R C ) – a n d c a n b e r e a d

la t e r a n d c o m p a r e d t o a k n o w n , o r e x p e c t e d v a lu e

n C e r t a in B I O S s , U E F I s , a n d b o o t lo a d e r s c a n w o r k w i t h t h e T P M c h ip

e s t a b l i s h in g a t r u s t c h a in d u r in g s y s t e m b o o t Implementing Secure Protocols46

Stay Alert!

There is no 100 percent secure system, and

there is nothing that is foolproof!