isaca hardening presentation...

33
Part 1: What is it and Why do we need it Platform Hardening

Upload: hoangcong

Post on 12-May-2019

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

Part 1: What is it and Why do we need it

Platform Hardening

Page 2: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

CONTACTS

Michael Gough –CISSP, CISA

Senior Risk Analyst - Comptroller of Public Accounts

Author –‘SkypeMe!’and ‘Video Conferencing overIP’by Syngress Press

Contributor to the Center for Internet SecurityBenchmarks.

Page 3: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

AGENDA

Part 1 –What is Platform Hardening and Whydo we have to do it

Part 2 –What do we need to do and How do weneed to prepare to Harden systems

Part 3 –How to Harden (Win, *NIX, Cisco,Handhelds)

Page 4: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHAT

Is Platform Hardening?

Page 5: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHAT IS A PLATFORM?

A Platform consist of all components that are a part of and can beconfigured on any type of, or group of Information Systems including but notlimited to the following components:

BIOS

Hardware included in or on the system

The booting or Base Operating System (Bos)

Any Virtual Operating System (Vos)

Any Guest operating system

Any applications

Any middleware

Any databases

Any storage device

Network that connects it all (firewalls, routers, switches, VoIP)

Any security applications installed on the completed system

And of course…ALL configuration settings (auditing, options, etc.)

Page 6: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

PLATFORMS

Page 7: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

TYPICAL NETWORK

Page 8: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHAT IS HARDENING?

Bret Hartman, CTO at RSA says it is“appropriate (security) settings and removingunused code,”

Hardening is a goal of deploying a system in themost secure state as possible, yet maintainfunctionality and reducing as many threatvectors as possible.

Page 9: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHAT IS HARDENING?

Hardening is the process of securely deploying systems. Hardening is the practice of ‘least privilege’ Hardening is not just the operating system Hardening includes:

Understanding what you actually need to run on the system !!! DOCUMENTATION !!! (Policy, Standards & Guidelines) Operating systems Virtual servers Coding Application settings Database setup & configuration Network devices Portable devices Etc., etc. etc…

Page 10: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHAT IS PLATFORM HARDENING?

Platforms are depended upon to deliver data in asecure, reliable fashion. There must be assurancethat data integrity, confidentiality and availabilityare maintained.

One of the required steps to attain this assuranceis to ensure that the platforms are installed andmaintained in a manner that preventsunauthorized access, unauthorized use, anddisruptions in service.

* From UT Medical Branch

Page 11: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

DEFINITIONS

Hardened System

(H) Is the final state we are trying to achieve

Baseline OS Hardening

(BOS) Is the Baseline Operating System hardening.CIS Benchmark ‘Baseline’settings.

Application / System Function Hardening

(AF) Is any hardening of applications that may reside on topof the operating system, such as Apache, IIS, Oracle orspecific functions, such as File/Print, DNS/DHCP, etc.

Page 12: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

DEFINITIONS

Base Hardening Base Hardening = Baseline Operating System hardening +

Application or System Function hardening

(B)= (BOS) + (AF)

Custom Hardening (C) Is any additional hardening applied to the system, such

as ‘Specialized Security Limited Functionality’settings, DMZsettings, addition system service settings (KIOSK, BastionHost, etc), custom OS specific security controls(TCPWrappers, Bastille, etc.)

Page 13: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

DEFINITIONS

Virtual System (Needs Host OS)

(V) Is the Virtual Machine hardening

Virtual OS Hardening (Bare Metal OS)

(VOS) Is the Virtual Server hardening - VM Ware ESXi

Page 14: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

HARDENING FORMULA

Putting System Hardening into a mathematicalformula:

H = Hardened System

B = Base Hardening

C = Custom Hardening

So…

H = B+C

Page 15: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

HARDENING FORMULA

Also stated:

Hardened System or Secure Deployment

Custom Hardening

Baseline OSHardening

Application /Function

Hardening

Page 16: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

HARDENING FORMULA

Also stated as layered security:

Hardened System or Secure Deployment

Custom Hardening

Baseline OSHardening

Application /Function

Hardening

Virtual Server Hardening

Baseline OS Hardening

Page 17: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

HARDENING VIRTUAL SYSTEMS

For Virtual Operating System:

H = Hardened System

Vos = Virtual OS Hardening

B = Base Hardening

C = Custom Hardening

So…

H = Vos+B+C

Page 18: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

HARDENING FORMULA

Also stated as layered security:

Hardened System or Secure Deployment

Custom Hardening

Baseline OSHardening

Application /Function

Hardening

Virtual OS Hardening

Page 19: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHY ?

Do we need to harden

Page 20: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHY DO WE NEED TO HARDEN?

Any Information System that is visible to the public, such as a web server or mailserver, must be "hardened" to minimize the risk of successful attacks against it.

Hardening is the process of preparing an operating system for use as a firewall orother public server by removing as many vulnerabilities as possible(1).

The following areas need careful attention when hardening an operating system:

File System Security User Account Security Logging and Auditing Removing Unnecessary Services Running Essential Services with Unprivileged Accounts Physical Security Network Protocol Vulnerabilities Other related security settings and configuration

(1) Technology Training Limited (UK)

Page 21: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

TIME BASED SECURITY

In Winn Schwartau’s words the concept is this:

Pt > Dt + Rt

Protection (Pt), Detection (Dt) and Reaction (Rt).

“The amount of time offered by the Protection device or system‘P-sub-t’, must be greater than the amount of time it takes todetect the attack ‘Dsub-t’, plus the amount of time it takes toreact to the detection, ‘R-sub-t’.

Page 22: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

MOBIUS DEFENSE?

Pete Herzog

Defense-in-Depth is the delaying versus theprevention of the advance of an attacker

Isn’t this just Time Based Security ?

Page 23: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

HARDENING & TIME BASED SECURITY

Platform Hardening falls under the or Protection(Pt) category.

The goal of Platform Hardening is to improve theprotection of our assets to provide more time todetect and react to a security incident.

A good hardening process improves the ability toaudit our systems and the platforms they reside on

Page 24: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHY SHOULD WE CARE?

Our own Policies, Standards & Guidelines Audits SANS Top 20 CSI / FBI Security Survey PCI TAC / TGC FISMA - NIST IRS 1075 Best Practice… Minimize attack vectors

Page 25: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

WHY SHOULD WE CARE?

We have and use more and more complexapplications and features.

More and more coding and more and moresystems and applications facing the Internet

.NET, Java, PHP

Windows services

*NIX daemons

All those security settings and configuration

Page 26: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

SANS TOP 20 VULNERABILITIES:

S2 –Windows Services

RPC, Services, Registry

S3 –UNIX Services

Brute-force attacks against remote services such as SSH, FTP,and telnet are still the most common form of attack tocompromise servers facing the Internet

H.1b Excessive User Rights and Unauthorized software

Local Admin, root, sa, etc…

H3. Unencrypted Laptops and Removable Media

USB ports still active –really???

Page 27: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

SANS TOP 20 CRITICAL SECURITY CONTROLS:

CAG: Critical Control 3:

Secure Configurations for Hardware and Software onLaptops, Workstations, and Servers

CAG: Critical Control 4:

Secure Configurations for Network Devices such asFirewalls, Routers, and Switches

CAG: Critical Control 7:

Application Software Security

Page 28: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

CSI/FBI SECURITY SURVEY 2008:

The Exploits…

Many of these could beprevented or detected byHardening

Page 29: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

CSI/FBI SECURITY SURVEY 2008:

These are all Products…

Where is the Process ?

Where is the Practice of Least Privilege ?

Page 30: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

CSI/FBI SECURITY SURVEY 2008:

Where is “Improved Internal Processes”?

Page 31: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

CSI/FBI SECURITY SURVEY 2008:

Page 32: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

BENEFITS OF PLATFORM HARDENING

More secure deployments of information systems.

Improve Configuration Management for securityrelated settings

Compliance and Regulatory requirements

Ability to implement Security Configuration toolslike Tripwire

Easier ability to Audit our systems…we now havesomething to measure against…assuming wehave implemented a hardening process

Page 33: ISACA Hardening Presentation v1.0isacaaustin.weebly.com/uploads/9/4/9/1/949112/10-6-2009_platform_hardening.pdf · need to prepare to Harden systems ... Easier ability to Audit our

THE END

Part 2 –What do we need to do and How do we need toprepare to Harden systems

Thank you !

Contact me at: [email protected]

Security is not a goal, it is a process, Security is not a product, it is amindset. Security is a never ending task. If you think you aresecure... just wait a few minutes until the next sploit is released.

Security is like breathing - If you stop, you die... (Pezzo - May 2001)