400 likes | 671 Views
System Admin Security Training. Orange Team. Overview. System Admin Duties Employee Documents and Security Controls Security Threats Threat Mitigation Incident Response. System Admin Duties. Perform backup and restore data Add and remove users Add and remove hardware and software
E N D
System Admin Security Training Orange Team
Overview • System Admin Duties • Employee Documents and Security Controls • Security Threats • Threat Mitigation • Incident Response
System Admin Duties • Perform backup and restore data • Add and remove users • Add and remove hardware and software • Configure and maintain hardware and software • General user support • Maintain documentation and licenses • Negotiate with vendors • System planning • Security management
System Admin Duties • Monitor system resource usage and performance • Detect and correct problems • Optimize performance • Manage resources • Automate tasks • Determine and enforce usage policy • Educate users • Corporate priority liaison
A Lot Of Things To Do… • … and it’s better to do them securely! • “Bake in” security • Can’t anticipate all problems • Can limit the problems you have
Perform Backup and Restore Data • Encrypt backups • Secure storage • Physical access control • Environmental protections • Controlled restorations • No network connections • Clean destination (no malware) • Verified assistance
Add and Remove Hardware and Software • Old accounts can be used as backdoor • Completely remove old access rights • Add users while adhering to… • Need-to-know • Minimum privilege
Add and Remove Hardware and Software • Inform users of potential outages • Secure install • Configure first • Attach to network as late as possible • Secure removal • Install replacements first • Avoid loss of functionality • Dispose securely (data retrieval)
Configure and Maintain Hardware and Software • Keep copies of configurations • Configure new elements before attaching to network • Use standard maintenance routines • Document • Update • Verified assistance
General User Support • Beware of social engineering • Callers provide credentials • Educate users to safeguard credentials • Do not prompt • Safeguard credentials • Do not reveal unnecessarily • Protect methods for credential creation
Maintain Documentation and Licenses • Document procedures • New SA education • Consistency • Audit Assurance • Do not use illegitimate software • Cheaper • Unethical • Illegal • Insecure
Negotiate With Vendors • Licensed products can get expensive • Minimize the cost of secure behavior • Vendor relationships are important • Inform them of security concerns • Request new products/solutions • Receive updated hard/firm/software • Continued business is valued and will be rewarded
System Planning • Scaling • Security problems and solutions scale differently • New node = new possible failure • New AV != more secure • Assessing new technology • Anticipate problems • “Shinier” does not mean “safer” • Anticipating and avoiding problems • Malware/attack trends • Follow day-to-day guidelines strictly
Security Management • “An ounce of prevention is worth a pound of cure.” • Prioritize security • Ideal management solution • Simple • Reproducible • Covers security needs • Your job, not the users
Monitor System Resource Usage and Performance • Do not invade privacy • Use data to… • Identify future purchases • Notice potential threats • Excessive or unusual usage • Antivirus logs • Ensure expectations are met (SLA)
Detect and Correct Problems • Use system monitoring devices • Preemptive corrections • Patching • Updating • Upgrading • Reactive corrections • See incident response
Optimize Performance • Users get frustrated with poor system performance • Users will optimize for themselves • Non-compliance • Installing adware/freeware • Working around slow or ineffective processes • Don’t optimize by removing/compromising security
Manage Resources • Know what you have and use • Bad situations • Unaccounted-for router on network • Unconfigured workstation • Ordering unneeded license keys • Wasting resources leads to budget cuts and layoffs • Misplacing resources leads to vulnerabilities
Automate Tasks • Script day-to-day tasks • Focus extra time on harder tasks • Don’t introduce security holes • Unauthorized use of privileged scripts/programs • Scripts disabling security features • Testing/Debugging/Configuration programs used on ‘live’ network
Determine and Enforce Usage Policy • Correct usage is essential • Meaningless without enforcement
Educate Users • A smart user is a safe user • Eliminate “low hanging fruit” • Social engineering • Bad links • Phishing emails • Removal media
Corporate Priority Liaison • Competing goals • Management’s budget • Your security • Customer’s service needs • Employee convenience • Security needs to win • Sell to management • Educate users
Employee Documents • Acceptable Use Policy (AUP) • Service Level Agreement (SLA) • Non-Disclosure Agreement (NDA) • Employee Contract Your responsibility to enact if there are no documents.
Security Controls • Need-to-know • Security awareness training • Separation of duties • Job rotation • Vacations • Auditing/reviews
Security Threats • External • Hacking • E-mail attacks • Internal • Malware • Ignorance • Insider
Security Threats: Hacking • Exploitation of web services • Poorly configured gateways • Use of backdoors • Social engineering • Previous intrusion • Internal corroborator
Security Threats: E-mail • Phishing • Spam • Trojans • Viruses
Security Threats: Malware • Many sources • Hacking • Insider • Ignorance • Spreads quickly • Use up resources
Security Threats: Ignorance • Clicking bad links • Poor e-mail discretion • Downloading malware • USB attacks
Security Threats: Insider • Usually hardest to detect • They know the system • Sometimes privileged user • Disgruntled employee • Abuse of trust
Threat Mitigation • Preparation • Security practices • Education • Incident Response Plan • If none, create one • Form a Computer Security Incident Response Team • Individuals capable of correct response • Include members of management
Incident Response • Identify • Initial Response • Record basic details • Assemble CSIRT • Notify important individuals • Formulate strategy • Investigate • Thorough data collection • Determine what/who/how • Report • Resolve
Rules To Work By • A smart user is a safe user • Policy enforcement is the first step to a secure system • Put security first in everything you do
Bibliography Mandia, Kevin, Chris Prosise, and Matt Pepe. Incident Response & Computer Forensics. Second ed. N.p.: Brandon A. Nordin, n.d. 11-32. Print.