460 likes | 608 Views
Components of WS Security. Security Policies and Procedures A well patched system Passwords Users, permissions and file systems Services Malware protection Information assurance. Security Policies. Complete Current Procedures also Must be enforced or they are useless.
E N D
Components of WS Security • Security Policies and Procedures • A well patched system • Passwords • Users, permissions and file systems • Services • Malware protection • Information assurance
Security Policies • Complete • Current • Procedures also • Must be enforced or they are useless
Keep the system current • Patch the OS • Turn on automatic updates • Microsoft does the rest • Just trust them with my machine? • They are only upgrading! • Patch all of the apps • TEST, TEST, TEST
Applications and Services • General • Only applications necessary for job • Only approved applications • NO unapproved applications • Keep applications up to date • Configuration according to procedures and permission • Client or Server
File System Permissions • Directories • Data • Home • Shared • Cloud • System • Application • Permissions • Read, Write, Delete, Execute
Malware Protection • Anti-Virus software • Auto updates • Robust package • Ingress and egress filtering • Current license
Users • Groups and users • Rights/permissions • Access level • Directory access
Accounts • Uniform rules to establish an account • Belongs to only the groups necessary • Signed approval • Usually only in one workgroup
Passwords • Length • At least 8 characters • Upper & lower case, numeric & non • Hints – geometric patterns, equations, code • Lifetime • Max - 30 – 60 days • Min – at least one day • History – 10 – 20 changes • Authority
Password Use • Require authentication at login • Require re-authentication after Idle periods • Deny login after n attempts
Password Policy • Complexity • Age – min & max • History • Length
Workstation Security Tools • Windows Security Tools • MMC • Security Configuration & Analysis Snap-in • secpol.msc http://csrc.nist.gov/itsec/download_WinXP.html Windows Vista Security Guide Windows XP Security Guide.
A GUI way to do it • Microsoft Management Console • Permits “Snap-in”s for various system management functions • Security configuration and analysis is one • Accessed via the “run” option or a command line prompt
Security Templates Tool • MMC Snap-in • Creates security templates • Imports security templates • Modifies security templates
Get the Security Templates • Go Windows Vista Security Guide • Scroll dow to the down load button • Retreive the .msi file • Double click on the downloaded file • Follow your nose • Make a note where it put the templates
Security Templates Location XP Vista Windows 7
mmc Console • A GUI snap-in for the mmc • Microsoft Management Console • Windows-r -> Run... typemmcclick OK • Select File > Add/Remove Snap-in • Click Add.. • Select Security Templates • Right click on security and select path to templates • Click Add, Close, OK • File -> Save As • Name the Console Sec_I_Console.msc • Save
Select Path to Templates Right click on Security Templates
Save it! ->File -> Save As
Check it out (MS) • Run mmc • Open your previous Security Console • File -> open -> Sec_I_Console.msc • Open Security Templates • Open VSG EC Domain • Open Account Policies • Open Password Policy • Check it out
Check it out (NIST) • Run mmc • Open your previous Security Console • File -> open -> Sec_I_Console.msc • Open Security Templates • Open VSG EC Domian • Open Account Policies • Open Password Policy • Check it out
Adjust settings • Choose the template that you wish to adjust • Adjust settings to comply with policy • Right click on template name • Choose Save As(different)
Security Configuration &Analysis • A GUI snap-in for the MMC • Microsoft Management Console • Programs -> Run...typemmcclick OK • Select File > Add Remove Snap-in • ClickAdd.. • Select Security Configuration and Analysis • Click Add, Close, OK • File -> Save in Administrative Tools
Create a Security SettingsDatabase • Right click Security Configuration and Analysis • SelectOpen Database • Type in a file name to create a new database
Analyze • Compare current security settings to settings saved in the data base • Right click onSecurity Configuration and Analysis • SelectAnalyze Computer Now • Save log somewhere you can remember • Take a look at the log
Configure Security Settings • Right click on Security Configuration and Analysis • Select Configure Computer Now • CAUTION: • It is all over • Make sure your password satisfies the policy • Etc., etc., etc., etc., etc.
Security Settings • You can have many templates • You can create your own • You can merge templates • You will have to reinstall Windows many times before you get it right • Develop your template on a test bench • Test, test, test!
Lab • Do what we just did • Comment on the settings of the workstation • Start with the Default Settings • Change some of the settings • Configure the workstation • Analyze again • How are you doing? • Show some work
Assignment • Write a password policy • Implement this password policy • List the procedure, i.e. list the settings for the mmc • Test it.