580 likes | 673 Views
Security Considerations. © Ed Green Penn State University All Rights Reserved. What is Security?. Protection of the enterprise’s information assets from harm Includes Identifying accessing parties authentication Limiting activities Authorization Need-to-know
E N D
Security Considerations © Ed Green Penn State University All Rights Reserved
What is Security? • Protection of the enterprise’s information assets from harm • Includes • Identifying accessing parties • authentication • Limiting activities • Authorization • Need-to-know • Keeping restoration and/or recovery sources • Back up • Logs and journals • Audit trails • Manage and monitor • Activity logs • Audits • Internal • External Managing Risk Security Considerations
What is a Security Architecture • Framework for implementing security measures • Automated • Manual • Includes all elements of the information environment • Networks • Data • Processes • Technology independent • What needs to be done • How that “what” is accomplished Security Considerations
Aspects of Security • Business – enterprise-specific information that represents the “soul” • Data – the single non-replaceable information asset • Legal – requirements imposed upon an enterprise governing the guardianship of information • Physical – safeguarding the enterprise’s physical plant • Technical – safeguarding the enterprise’s information technology investment Security Considerations
Critical Legal Requirements • Foreign Corrupt Practices Act • Export Control Requirements • HIPPA • National Security • Sarbanes-Oxley • DoD • DoJ • DoS • DoT • DoHS Security Considerations
Critical Business Requirements • Business processes • Business strategies • Proprietary information • Trade secrets • Competitive elements • Compliance with legal requirements • Organizational ethical conduct Security Considerations
Critical Security Issues • Access control • Who is allowed to access the system • How are individuals identified? • What is a particular individual allowed to do? • Information protection • What information is disclosed? • Who is allowed to see what information? • What release controls are required? • How is information preserved? • Information receipt • What information is received? • How is this information verified? • Legal obligations • What are the legal requirements? • How is compliance managed? Security Considerations
Identifying Users - Authentication • Authentication – knowing who is attempting to access the system • Techniques • Userid/password • Fingerprints • Facial matches • Processes • Randomly generated passwords • Frequent changes in random intervals • Entry point lockout -“Three tries and your out” with management notification • Audits • Access records (logs) • Automated log reviews • Formal audits Security Considerations
Identifying Users - Authorization • Authorization – knowing what an authenticated user is allowed to do and taking steps to specifically limit their actions • Techniques • Directory management • Password confirmation • Tiered controls • Processes • Activity audits • Logs • “Spyware” • Formal audits • Secure single signon Security Considerations
Identifying Users – An Example 1. A data structure to support authentication and authorization is required. • EMPLOYEE database entity identifies the set of enterprise employees • USER database entity provides identification data for each enterprise employee with reference to the EMPLOYEE entity for additional details • APPLICATION_USER database entity associates users with authorized capabilities (permissions) • APPLICATION database entity provides information about each application that the enterprise has installed EMPLOYEE IDENTIFIER BALANCE OF EMPLOYEE RECORD USERID PASSWORD EMPLOYEE IDENTIFIER PASSWORD CHANGE DATE APPLICATION IDENTIFIER USERID EMPLOYEE AUTHORIZED APPLICATION IDENTIFIER APPLICATION NAME LICENSE NUMBER VENDOR Security Considerations
Identifying Users – An Example 2. A comprehensive and active management process is required. A record is madeof all applicationactivities Person initiates computer session;enters userid and password; submits AUDIT LOG FILE Initiates the execution of acomputer program to determineif the person is known; record of attempt to access is written to alog file User executes oneof the allowed applications APPLICATION Initiator is notifiedthat access attempt was validated; the setof allowed applicationsis presented AUTHENTICATION IS PERSON KNOWN LOG FILE DATABASE OF USERS An entry is writtenfor later analysis Database of Users is referenced to determineif person attempting access is known NO Initiator is notifiedthat access attempt was rejected LOG FILE Security Considerations
Identifying Users – An Example 3. Follow up and management are essential activities. TOTAL ACTIVITY REPORT AUDIT LOG FILE AUDIT PROGRAM UNUSUAL ACTIVITY REPORT LOG FILE AUDIT RULES The reports produced by theaudit program are reviewedby a senior staff individual. Where and when appropriate,actions to address violationsare initiated. VIOLATIONS REPORT On a regularly scheduled basis, the various logfiles are processed through an audit program toidentify entries that are contrary to the enterpriseaudit rules. A series of reports are produced. Security Considerations
User Identification’s Role in Responding to Security Threats • Activity • Using the above scenario as a base of departure, explain how you would modify this example to: • Limit the number of erroneous attempts at access • Prevent any further access attempts from the initiating workstation • Create an Oracle database to accomplish this • Investigate to identify any available COTS products that could provide secure single sign on • Explain how one such product could be implemented in a predominantly Microsoft environment • Present findings in a five minute summary presentation Security Considerations
Firewalls • Access control structure • Governs network traffic • Inbound • Outbound • Logical and/or physical • Separate devices • Incorporate into existing hardware • Accompanying software Security Considerations
Firewalls OUTSIDE INSIDE • Bi-directional gatekeeper • Role – • Keep information objects from leaving the enterprise that should not leave • Keep information objects from entering the enterprise that should not be allowed to enter ? ? Security Considerations
Access Control • Who is allowed to access the system? • Recognized users • How are individuals identified? • Userid and password combination • What is a particular individual allowed to do? • Determined by role/responsibility set • How is access managed? • Risk management • Risk mitigation Security Considerations
Access Control - Authentication • Process of determining who is requesting access to the information technology environment • Userid/password combination • Unique – only one such combination exists • Not absolute Security Considerations
Access Control - Authentication USERID/PASSWORD DIRECTORY USERS @USERID USER DEMOGRAPHICS USERID @USERID @PASSWORD PASSWORD_DATE PASSWORD Authentication is the process of first confirming the USERID andthen matching it to the PASSWORD. The PASSWORD_DATE is includedto manage password change Security Considerations
Access Control - Authentication • Userid/password open to security breaching • Represents a significant risk • Must be mitigated • Mitigation options • Bio-techniques • Retina scans • Facial matching • Fingerprinting • Electronic techniques • Certification Bio-techniques are coming but electronic techniques are now Security Considerations
Digital Certificates • Algorithmically generated • Usually includes userid and password • Other identifying information appended • Produces an electronic signature • Unique to individual Security Considerations
Digital Certificates • What information would you recommend to create a digital signature for intranet-based users? • What information would you recommend to create a digital signature for internet-based users? Security Considerations
Digital Certificates • Private key • The certificate provided by the originator of a message • Originator’ signature • Ensure the authenticity of the message • Validated using public key • Public key • The template used to validate the authenticity of a message’s source Security Considerations
Message Structure Message Contents Must be defined in such a way that it is understood by BOTH sender AND receiver Message Header Includes destination Identifies source Identifies message (type) Message Trailer Indicates end of message Security Considerations
Destination Delivery Mode Message ID Timestamp Correlation ID Reply To Redelivered Type Expiration Priority Message Properties Messaging Infrastructure – Message Format Abstraction Security Considerations
Destination Delivery Mode Message ID Timestamp Correlation ID Reply To Redelivered Type Expiration Priority Message Properties Authentication with Digital Certificates userid/password Private Key Security Considerations
Access Control - Authorization • Process of constraining authenticated users to allowed applications, processes and activities • Can be • Identity-based • Role-based Security Considerations
Access Control - Authorization USER_PROGRAMS PROGRAM_IDENFICATION USERID USERS USERID PRGORAM_IDENTIFICATION USERID PROGRAMS PASSWORD @PROGRAM_IDENFICATION Security Considerations
Validation at the Firewall • Firewall – security barrier on the information superhighway • Prohibit unauthorized senders from releasing information • Prohibit unauthorized information from being released • Prohibit acceptance of information from unauthorized sources • Prohibit acceptance of unauthorized information Security Considerations
Validation at the Firewall • Firewall can be • Hardware-based • Software-based • Firewall management is an installation responsibility • “Rules of the Road” for the business of managing an installations web accessibility • Setting the rules – management responsibility • With technical recommendations from key technical personnel • Enforcing the rules – web administrator’s responsibility Security Considerations
INCOMING MESSAGE Destination Delivery Mode MESSAGE BODY Message ID Timestamp Correlation ID Message has passedall firewall tests Reply To Redelivered Type Message header is inspected - Is this a legitimate message sender? - Is the sender recognized? - Is the sender authorized? - Can the sender’s identify be verified? Message body is inspected - Is this type of data authorized? - Is the sender authorized to send this data? - Is the data valid? Expiration Priority Message Properties Validation at the Firewall Message has not passedall firewall tests Security Considerations
OUTGOING MESSAGE Destination Delivery Mode MESSAGE BODY Message ID Timestamp Correlation ID Message has passedall firewall tests Reply To Redelivered Type Message header is inspected - Is this a legitimate message sender? - Is the destination recognized? - Is the sender authorized? - Is the destination authorized - Can the sender’s identify be verified? Message body is inspected - Is this type of data authorized? - Is the sender authorized to send this data? - Is the data valid? Expiration Priority Message Properties Validation at the Firewall Message has not passedall firewall tests Security Considerations
Validation at the Firewall • Questions represent business rules • What are the business rules • Enterprise-specific • Implementation specific • Set for intranet access • Set for internet access • Transaction – an exchange of data/information required to complete a business event • Multiple technical transactions • Multiple electronic exchanges • Security checks will be performed every time • Trust is verified • Never, ever assumed Security Considerations
Destination Purchase Order Message Purchase Order Message Delivery Mode Message ID Timestamp Correlation ID Reply To Redelivered Type Expiration Firewall Priority In the beginning . . . Purchase Order DB Recognizes EOQ/JIT level Purchase Order Messagesent for review/approval Inventory Management Process Prepare Purchase Order Review Purchase Order Purchase Order reviewed, approved,and submitted to supplier Supplier Catalog Inventory Database Header shows destination as reviewer Header shows destination as supplier Security Check • Authorized submitter • Authorized named personnel • Authorized supplier To Supplier Security Considerations
Fulfillment Message Fulfillment Message Firewall Purchase order is admitted through firewall and passed to order entry system Next, . . . Purchase Order Message Inventory Database From Purchaser If in inventory, message Sent to fulfillment system Fulfillment System Security Check Orders Database If not in inventory, message Sent to manufacturing system Acknowledgement message sent • Authorized submitter • Authorized named personnel • Authorized trading partner • Authorized recipient Order Entry System Manufacturing Message Order Receipt Message Inventory Database Manufacture Database Manufacturing system uses data in inventory and manufacturing databases Manufacturing System When order has been completed, a message is sent to the fulfillment system Purchase Order System Purchase Order Message If raw materials required, purchase order message is sent Security Considerations
Stakeholder Status Message Firewall Firewall Order Receipt Message Order Receipt Message Continuing, . . . • Authorized submitter • Authorized named personnel • Authorized supplier Message is transmitted Security Check Security Check • Authorized submitter • Authorized named personnel • Authorized trading partner • Authorized recipient Validated message sent to Purchase Order Management System Purchase Order Management Purchase Order DB Messages sent to named stakeholders Security Considerations
Shipping Notice Message Shipping Notice Message Fulfillment Message Fulfillment Message Fulfillment Message Fulfillment Message Fulfillment Message Fulfillment Message Fulfillment Message Fulfillment Message Billing Message Billing Message Firewall Meanwhile, . . . Inventory System Inventory System Inventory Database Inventory Database Fulfillment System Fulfillment System Fulfillment System sends messages to Shipping and Billing Systems Fulfillment System sends messages to Shipping and Billing Systems • Authorized submitter • Authorized named personnel • Authorized trading partner • Authorized recipient Billing System prepares and sends bill Billing System prepares and sends bill Security Check Billing System Billing System Shipping System Shipping System Billing Database Billing System prepares and sends bill Security Considerations To Purchaser
Shipping Notice Message Billing Message Firewall Receipt Message General Ledger DB And, . . . Billing message is sent to Accounts Payable Accounts Payable Purchase Order DB From Supplier Electronic Payment Security Check Electronic Payment is sent to supplier • Authorized submitter • Authorized named personnel • Authorized supplier Receipt message is sent to Accounts Payable Shipping Notice message is sent to Accounts Payable Receiving System Purchase Order DB Security Check Firewall To Supplier Security Considerations • Authorized submitter • Authorized named personnel • Authorized supplier
Finally From Purchaser Payment is processed Firewall Security Check Electronic Payment • Authorized submitter • Authorized named personnel • Authorized supplier Payments Payment Processing General Ledger Billing Database Orders Database Security Considerations
Validation at the Firewall A patient at This Hospital has been admitted in very serious condition. A series of tests has been performed; the data collected includes various alphanumeric measurements as well as several medical images. Diary observations (comments by the attending staff) have also been captured. The consensus is that this patient has an unusual illness that the local staff haslittle or no experience in treating. One of the attending staff remembers meeting a colleague at a conferences who has hadexperience treating this illness. An electronic collaboration session is arranged. ASSIGNMENT: Describe the firewall security that MUST exist in order for this electronic consultation to occur. Security Considerations
Securing Stored Data • File management • File management system security features • Application program control • Database management • DCL – data control language • Specific permissions allowed to authenticated users • Multiple levels of granularity • Access to data • Items of data • Allowed functionality • DBMS-managed referential integrity • Activity logs • Transactions • Database write executions • Service utilities • Backup • Recovery • Restore Security Considerations
Log Files • What are log files • Log file formats • Statistics from log files Security Considerations
What Are Log Files • Record of “what happened” • Answers such questions as: • Who • What • When • How much • Critical management tool • Security • Performance Security Considerations
What About Log Files • Integral part of most executive software products • Operating systems • Database managers • Network managers • System managers • Web servers • Critical elements in processing effectiveness • Back up • Recovery • Rollback Security Considerations
Log Files and Web Servers • Identifies users of your web site • Identifies activities performed by users of your web site • Documents frequency of use • Documents resource utilization • Document size transfers • Processor resources • CPU • I/O operation • CGI scripts • Documents “security faults” Security Considerations
Log File Uses • Record of events transpired • Planning tool • Recovery tool Security Considerations
Log File Formats • Common Log File Format • Combined Log File Format • Extended Log File Format • Error Formats Security Considerations
Content Length of Transferred Document Remote Host HTTP Request Line Remote User Name HTTP Status Code Returned to Client Request Date and Time Authenticated User Name Common Log File Format Security Considerations
Referrer Remote Host HTTP Request Line Content Lengthof Transferred Document Remote User Name User Agent Request Date and Time Authenticated User Name HTTP Status Code Returned to Client Combined Log File Format Security Considerations
Extended Log File Format • Extendable format • Allows administrator to specify field(s) of interest • Allows administrator to specify order of recording • Each line (in log file) represents a request • Two configuration directives • Version • Fields • All requests begin with a “#” character Security Considerations
# Data Contents List of Fields Extended Log File Security Considerations