600 likes | 617 Views
Security Features in Windows Vista. What Will We Cover?. Security fundamentals Protecting your company’s resources Anti-malware features. Helpful Experience. Windows user interface Windows security concepts. Level 200. Agenda. Exploring Security Fundamentals
E N D
What Will We Cover? • Security fundamentals • Protecting your company’s resources • Anti-malware features
Helpful Experience • Windows user interface • Windows security concepts Level 200
Agenda • Exploring Security Fundamentals • Mitigating Threats and Vulnerabilities • Controlling Identity and Access • Protecting System Information
Windows Vista Fundamentals Secure by Default • Improved SDL • Common Criteria Certification
Windows Vista Service Hardening D D D D Kernel drivers User-mode drivers D D D D • Reduce size of high-risk layers • Segment the services • Increase number of layers Service … Service 1 Service… Service 2 Service A Service 3 Service B
Agenda • Exploring Security Fundamentals • Mitigating Threats and Vulnerabilities • Controlling Identity and Access • Protecting System Information
Internet Explorer 7.0 Social Engineering Protections Protection from Exploits • Unified URL parsing • Code quality improvements (SDLC) • ActiveX opt-in • Protected Mode to prevent malicious software • Phishing filter and colored address bar • Dangerous Settings notification • Secure defaults for IDN
ActiveX Opt-in IE7 blocks ActiveX Control User grants permission (opts-in) IE7 ActiveX Control enabled Disabled Controls by default IE7 confirms install
Internet Explorer Protected Mode C:\...\Temporary Internet Files C:\...\Startup
Phishing Filter Compares website with local list of known legitimate sites Scans the website for characteristics common to phishing sites Double-checks site with online Microsoft service of reported phishing sites
Windows Vista Firewall IPSec
Windows Defender Improved detection and removal Redesigned and simplified user interface Protection for all users
Network Access Protection Fix Up Servers Policy Servers Windows Vista Client DHCP, VPN Switch/Router MSFT Network Policy Server Corporate Network
Agenda • Exploring Security Fundamentals • Mitigating Threats and Vulnerabilities • Controlling Identity and Access • Protecting System Information
User Account Control Allows system to run as standard user Allows select applications to run in elevated context Fix or remove inappropriate administrative checks Registry and file virtualization provides compatibility
Consent Prompts Operating System Application Signed Application Unsigned Application
Improved Auditing Main Category File System Access Use of Administrative Privilege Registry Access Logon/ Logoff New Logging Infrastructure
Authentication Improvements GINA.dll Winlogon
Integrated Control Control over removable device installation Restart Manager Security Center enhancements
Agenda • Exploring Security Fundamentals • Mitigating Threats and Vulnerabilities • Controlling Identity and Access • Protecting System Information
Information Leakage 63% 36% 35% 22% 22% 20% Virus infection Unintended forwarding of e-mails Loss of mobile devices Password compromise E-mail piracy Loss of digital assets, restored 0% 10% 20% 30% 40% 50% 60% 70% “After virus infections, businesses report unintended forwarding of e-mails and loss of mobile devices more frequently than they do any other security breach” Jupiter Research Report, 2004
Windows Vista Data Protection Policy Definition and Enforcement Rights Management Services User-Based File System Encryption Encrypted File System Drive-Level Encryption BitLocker Drive Encryption
Windows Vista Firewall • Both inbound and outbound • Authentication and authorization aware • Outbound application-aware filtering is now possible • Includes IPSec management • Of course, policy-based administration • Great for Peer-to-Peer control
Network Access Protection Policy Servers e.g. Microsoft Security Center, SMS, Antigen or 3rd party Fix Up Servers e.g. WSUS, SMS & 3rd party Restricted Network Corporate Network 3 Not policy compliant 1 2 4 Microsoft Network Policy Server Windows Vista Client Policy compliant DHCP, VPN Switch/Router 5
Control Over Device Installation • Control over removable device installation via a policy • Mainly to disable USB-device installation, as many corporations worry about intellectual property leak • You can control them by device class or driver • Approved drivers can be pre-populated into trusted Driver Store • Driver Store Policies (group policies) govern driver packages that are not in the Driver Store: • Non-corporate standard drivers • Unsigned drivers
Client Security Scanner • Finds out and reports Windows client’s security state: • Patch and update levels • Security state • Signature files • Anti-malware status • Ability for Windows to self-report its state • Information can be collected centrally, or just reviewed in the Security Center by the users and admins
Code Integrity • All DLLs and other OS executables have been digitally signed • Signatures verified when components load into memory
BitLocker™ • BitLocker strongly encrypts and signs the entire hard drive (full volume encryption) • TPM chip provides key management • Can use additional protection factors such as a USB dongle, PIN or password • Any unauthorised off-line modification to your data or OS is discovered and no access is granted • Prevents attacks which use utilities that access the hard drive while Windows is not running and enforces Windows boot process • Protects data after laptop theft etc. • Data recovery strategy must be planned carefully! • Vista supports three modes: key escrow, recovery agent, backup
BitLocker Drive Encryption • Improved at-rest data protection with full drive encryption • Usability with scalable security protections • Enterprise-ready deployment capabilities • Offline system-tampering resistance • Worry-free hardware repurposing and decommissioning • Integrated disaster recovery features
Trusted Platform Module Encrypted Volume Key Encrypted Data Encrypted Full Volume Encryption Key Cleartext Data TPM Volume Master Key Full Volume Encryption Key
Session Summary • Windows Vista is the most secure Windows operating system to date • Windows Vista protects users • Numerous other security improvements help protect data and ease deployment
A BRIEF OVERVIEW • “Need to Know Basis” • Baseline • User Account Administration • Password Administration • Group or Role Administration • File Permissions on Critical Files • UMASK • SUID & SGID • Cron • Syslog • Services • Patches • Conclusion
Need to Know Basis • When setting up security on your Unix systems, ensure that security is set up on a need to know need to use basis.
Baseline • A Baseline ensures that security policies are implemented consistently and completely across various platforms. • Should be in a written form • Include specific instructions to achieve security on a specific server.
User Account Administration • User Account Policies should address: • Immediate deactivation of Users Accounts for terminated employees • Superuser account procedures • Contractors Accounts • Naming Conventions for User accounts
Password Administration • 60 to 90 day expiration for ordinary users • 30 day password expiration for superusers • Do not allow password sharing • Set minimum password lengths to at least 6 characters
Group or Role Administration • Assign users with like responsibilities to groups
File Permissions on Critical Files • Unix controls access to files, programs, and all other resources via file permissions. • Unix permission are controlled by three categories: Owner, Group, and World • Each category has the ability to either READ, WRITE, and/or EXECUTE Unix files or resources • Ex. –rwxr-x--x
UMASK • Ensure that your UMASK settings automatically assigns each newly created file with the most secure file permission.
SUID & SGID • SUID and SGID files allow the World user to temporarily assume the permissions of the Owner or Group users while using the program.
CRON • Cron is the Unix Job scheduler • Many system administrators use the Cron to perform automatic full or incremental back-ups of the systems. • The Cron can also be used to email log files, clean up file system etc.
Syslog • The syslog utility allows systems administrators to log various events occurring on the Unix system. • If Syslog is configured correctly, Unix can log many security events without the use of a third party plug-in.
Services • The inetd.conf file controls the services that are allowed on the Unix system. • Make sure that only necessary services are activated • Unix comes with all services activated by default, and many of these services have severe security vulnerabilities.
Patches • Ensure that your Unix systems are patched regularly. A policy should be adopted to ensure that all patches are tested and installed on a schedule.
Remote File Systemsref: Vahalia, ch 10 • Goals • Mount file systems of a remote computer on a local system • Mount any FS, not only UNIX • H/w independent • Transport independent • UNIX FS semantics must be maintained • Performance • Crash recovery • Security