830 likes | 846 Views
Learn how to secure your hosts by hardening systems effectively. Steps include service disabling, application control, and management interface protection.
E N D
Ch 5: Securing Hosts and Data CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide Darril Gibson
Hardening Systems • A host is any device with an IP address; such as servers, workstations, printers, etc. • Hardening is the practice of making the system more secure than a default installation • Disabling unnecessary services • Disabling unneeded applications • Protecting management interfaces and applications
Disabling Unnecessary Services • Improves overall security posture • Less susceptible to attacks • Reduces the attack surface • Prevents both known and 0day attacks against the disabled services • Reduces risks from open ports • Ports won’t be open when scanned
Other Hardening Steps • Uninstall Unneeded Applications • For best protection • Disable unnecessary accounts • Watch for default and backdoor accounts • Protect management interfaces and applications • Change default passwords • Disallow administration from WAN, or limit it to specific source IP addresses
Using Baselines • Security baseline • Configuration baseline • Host software baseline • Application configuration baseline • Performance baseline
Security Baseline • Starting point for OS or application • Deployed by • Group policy • Group Policy Objects (GPOs) • On Windows domains • Security templates • Imaging
Security Templates • Preconfigured settings for various common computer types • Domain Controller • Email server • Web server • etc.
Security Templates • Image from css-security.com
Security Templates • Security Templates contain • Account polices (like disabling Guest) • Password and lockout settings • Audit policies • User rights • System services • Software restrictions
Capturing and Deploying Images • Prepare a reference computer with everything installed and configured properly • Capture an image of the reference computer • Deploy the image to many computers
Image Deployment Tools • Norton Ghost • Acronis TrueImage • Microsoft Windows Image Backup • Windows Automated Installation Kit • Windows Deployment Services • Many others
Imaging Benefits • Secure starting point • Reduced costs • Maintenance is much simpler • Laptops are often sold with built-in images, to restore factory default settings • Reduces Total Cost of Ownership
Virtualization and Images • Images can be deployed to virtual or physical computers • Physical machines can be converted to virtual machines, and vice versa
Configuration Baseline • A record of all the settings on a system, including non-security settings and security settings • The security baseline contains only the security settings • Every time a system is changed, the configuration baseline must be updated • Change management
US Gov't Configuration Baseline(USGCB) • First: Standard Desktop Core Configuration (SDCC) in the Air Force • Then: Federal Desktop Core Configuration (FDCC) • Mandated by the Office of Management and Budget (OMB) for all federal agencies • Current version is the USGCB, also mandated by the OMB
Host Software Baseline • Lists all software installed on a system • Lists all approved software • Also called Application baseline • Can be compared with a scan that finds all installed software • Unauthorized software is not maintained and often vulnerable
Application Configuration Baselines • Proper settings for applications • Makes it easier to audit servers to ensure compliance
Performance Baselines • Documents the overall performance of a system at a point in time • Useful for reference later when performance changes
Baseline Reporting • The process of comparing systems to a baseline to identify discrepancies or anomalies • Can be used to identify abnormal activity • Similar to anomaly-based IDS baselines
Whitelisting v. Blacklisting Applications • Whitelist • A list of approved applications • Blacklist • A list of applications to block • Both can be implemented with Microsoft's Software Restriction Policies • Kaspersky maintains a whitelist database
Trusted OS (Operating System) • Meets predetermined requirements, which emphasize authentication and authorization • Prevents modifications or movement of data by unauthorized entities • Common Criteria includes requirements for a Trusted OS • Intended for Gov't systems
Virtualization Terms • Hypervisor • Software that creates, runs, and manages Virtual Machines (VMs) • Host • The physical server on which the hypervisor runs • Typically requires multiple processors, lots of RAM, fast and abundant storage, and one or more fast network cards
Virtualization Terms • Guest • A virtual machine running in a hypervisor • Patch compatibility • VMs require patches, just like physical machines • Host availability/elasticity • Elasticity is the ability to resize computing capacity based on the load • Meets demand and lowers cost
Snapshots • A copy of a VM at a moment in time • Useful as a backup • You can revert a VM back to the snapshot • Typically, administrators take a snapshot before any risky operation • Applying patches or updates • Installing new applications
Sandboxing and Security Control Testing • VMs can run in an isolated environment called a sandbox • Prevents the VM from interacting with other VMs, the host, or other devices on the network • Can test antivirus against malware in the sandbox, or test patches
VMs as Files • A VM is just a set of files • VHD files: virtual hard disk • XML files: configuration derails • AVHD files: Automatic VHDs—hold difference between the current disk and a snapshot • VSV files: Saved state for VM that was not shut down, like hibernation • BIN files: memory for VMs in a saved state
Virtual Networks • NAT mode: puts the VM behind a virtual router • Bridged: connects directly to host's NIC • Host-only: networks only with the host • Isolated: no network connection at all
Virtualization Technologies • VMware • VMware Workstation • VMware Player (free) • VMware Server (free) • VMware ESXi (Enterprise solution) • Microsoft's Hyper-V • Also Virtual PC • Sun's VirtualBox (free)
Virtualization Risks • VM Escape • An attack that starts in a VM and accesses the host system
Loss of Confidentiality • Each VM may have confidential company data • So there are more copies of the data that could be lot or stolen • Encrypt VMs as well as physical machines
Importance of Updates • Every software product has bugs and vulnerabilities • Patches must be deployed promptly to reduce vulnerabilities
Deploying Patches • Automatic Updates on workstations • Appropriate for home or very small business networks • Not all machines will always be patched to the same level
Deploying Patches • Patch management server • Company controls patch distribution • All machines are updated at once • Only approved patches are used (test them first)
Testing Patches • Some patches create problems • All patches must be tested before deployment onto a large company network • Test them in an environment that mirrors the production network • Regression testing • Administrators run a series of known tests on a system • Compare results to tests run before patching
Scheduling Patches • Patch Tuesday • Microsoft issues patches on 2nd Tues of month • Exploit Wednesday • Attackers reverse-engineer the patches and attack systems the next day • This is why Microsoft keeps vulnerabilities secret and doesn't patch them till there are attacks in the wild
Mitigating Risk in Static Environments • Some systems don't change much • Supervisory Control and Data Acquisition Systems (SCADA) • Embedded systems • Mobile systems (Android and iOS) • Mainframes • Game consoles • In-vehicle computing systems
Protecting Static Systems • Redundancy and diversity controls • Ensure that system continues to operate even when one component fails • Network segmentation • Makes it harder for an attacker to find and attack the protected system • Security layers • Firewall, NIPS, etc.
Protecting Static Systems • Application firewalls • Manual updates • Firmware version control • Wrappers • TCP Wrappers filter traffic, like a host-based firewall • Only allow connections from specified source IP addresses
Supervisory Control and Data Acquisition Systems (SCADA) • Industrial control systems • Such as power plants or water treatment facilities • Should be in isolated LANs, not connected to the Internet
Embedded Systems • Inside printers, smart TVs, HVAC • Point of Sale (PoS) systems
Understanding Stuxnet • Infect Windows systems through infected USB drives • Search through network to find target • Update the worm if the target is found • Compromise target • Control target • Deceive and destroy target systems