SlideShare a Scribd company logo
Computer Security:
Principles and Practice
Fourth Edition
By: William Stallings and Lawrie Brown
Chapter 12
Operating System Security
Strategies
• The 2010 Australian Signals Directorate (ASD) lists the
“Top 35 Mitigation Strategies”
• Over 85% of the targeted cyber intrusions investigated
by ASD in 2009 could have been prevented
• The top four strategies for prevention are:
• White-list approved applications
• Patch third-party applications and operating system vulnerabilities
• Restrict administrative privileges
• Create a defense-in-depth system
• These strategies largely align with those in the “20
Critical Controls” developed by DHS, NSA, the
Department of Energy, SANS, and others in the United
States
Operating System
Security
• Possible for a system to be compromised during the
installation process before it can install the latest patches
• Building and deploying a system should be a planned
process designed to counter this threat
• Process must:
• Assess risks and plan the system deployment
• Secure the underlying operating system and then the key applications
• Ensure any critical content is secured
• Ensure appropriate network protection mechanisms are used
• Ensure appropriate processes are used to maintain security
System Security Planning
The first step in
deploying a new system
is planning
Planning should
include a wide
security
assessment of the
organization
Aim is to
maximize security
while minimizing
costs
Planning process needs
to determine security
requirements for the
system, applications,
data, and users
Plan needs to
identify
appropriate
personnel and
training to install
and manage the
system
System Security Planning
Process
The purpose of the
system, the type of
information stored, the
applications and services
provided, and their
security requirements
The categories of users of
the system, the privileges
they have, and the types
of information they can
access
How the users are
authenticated
How access to the
information stored on the
system is managed
What access the system
has to information stored
on other hosts, such as
file or database servers,
and how this is managed
Who will administer the
system, and how they
will manage the system
(via local or remote
access)
Any additional security
measures required on the
system, including the use
of host firewalls, anti-
virus or other malware
protection mechanisms,
and logging
Operating Systems
Hardening
• First critical step in securing a system is to secure the
base operating system
• Basic steps
• Install and patch the operating system
• Harden and configure the operating system to adequately
address the indentified security needs of the system by:
• Removing unnecessary services, applications, and protocols
• Configuring users, groups, and permissions
• Configuring resource controls
• Install and configure additional security controls, such as anti-
virus, host-based firewalls, and intrusion detection system (IDS)
• Test the security of the basic operating system to ensure that the
steps taken adequately address its security needs
Initial Setup and Patching
System
security begins
with the
installation of
the operating
system
Ideally new
systems
should be
constructed
on a protected
network
Full installation
and hardening
process should
occur before the
system is
deployed to its
intended location
Initial
installation
should install
the minimum
necessary for
the desired
system
Overall
boot
process
must also
be secured
The integrity
and source of
any additional
device driver
code must be
carefully
validated
Critical that the
system be kept
up to date, with
all critical
security related
patches installed
Should stage
and validate all
patches on the
test systems
before
deploying them
in production
• If fewer software packages
are available to run the risk
is reduced
• System planning process
should identify what is
actually required for a
given system
• When performing the
initial installation the
supplied defaults should
not be used
• Default configuration is set
to maximize ease of use and
functionality rather than
security
• If additional packages are
needed later they can be
installed when they are
required
Remove
Unnecessary
Services,
Applications,
Protocols
• Not all users with access to
a system will have the
same access to all data and
resources on that system
• Elevated privileges should
be restricted to only those
users that require them,
and then only when they
are needed to perform a
task
• System planning process
should consider:
• Categories of users on the system
• Privileges they have
• Types of information they can
access
• How and where they are defined
and authenticated
• Default accounts included as
part of the system installation
should be secured
• Those that are not required
should be either removed or
disabled
• Policies that apply to
authentication credentials
configured
Configure
Users, Groups,
and
Authentication
• Once the users and groups are
defined, appropriate
permissions can be set on data
and resources
• Many of the security
hardening guides provide lists
of recommended changes to
the default access
configuration
• Further security possible by
installing and configuring
additional security tools:
• Anti-virus software
• Host-based firewalls
• IDS or IPS software
• Application white-listing
Configure
Resource
Controls
Install
Additional
Security
Controls
• Final step in the process of
initially securing the base
operating system is
security testing
• Goal:
• Ensure the previous security
configuration steps are correctly
implemented
• Identify any possible
vulnerabilities
• Checklists are included in
security hardening guides
• There are programs
specifically designed to:
• Review a system to
ensure that a system
meets the basic security
requirements
• Scan for known
vulnerabilities and poor
configuration practices
• Should be done following
the initial hardening of the
system
• Repeated periodically as
part of the security
maintenance process
Test the
System
Security
Application
Configuration
• May include:
• Creating and specifying appropriate data storage areas for application
• Making appropriate changes to the application or service default
configuration details
• Some applications or services may include:
• Default data
• Scripts
• User accounts
• Of particular concern with remotely accessed services
such as Web and file transfer services
• Risk from this form of attack is reduced by ensuring that most of the
files can only be read, but not written, by the server
Encryption Technology
Is a key
enabling
technology
that may be
used to secure
data both in
transit and
when stored
Must be
configured and
appropriate
cryptographic
keys created,
signed, and
secured
If secure network
services are provided
using TLS or IPsec
suitable public and
private keys must be
generated for each of
them
If secure network
services are
provided using
SSH, appropriate
server and client
keys must be
created
Cryptographic
file systems are
another use of
encryption
Security Maintenance
• Process of maintaining security is continuous
• Security maintenance includes:
• Monitoring and analyzing logging information
• Performing regular backups
• Recovering from security compromises
• Regularly testing system security
• Using appropriate software maintenance processes to patch and
update all critical software, and to monitor and revise
configuration as needed
Logging
Can only inform you about
bad things that have
already happened
In the event of a system
breach or failure, system
administrators can more
quickly identify what
happened
Key is to ensure you
capture the correct data and
then appropriately monitor
and analyze this data
Information can be
generated by the system,
network and applications
Range of data acquired
should be determined
during the system planning
stage
Generates significant
volumes of information
and it is important that
sufficient space is allocated
for them
Automated analysis is
preferred
Data Backup and Archive
Performing regular
backups of data is
a critical control
that assists with
maintaining the
integrity of the
system and user
data
May be legal or
operational
requirements for
the retention of
data
Backup
The process of
making copies of
data at regular
intervals
Archive
The process of
retaining copies of
data over extended
periods of time in
order to meet legal
and operational
requirements to
access past data
Needs and policy
relating to backup
and archive
should be
determined
during the system
planning stage
Kept online or
offline
Stored locally or
transported to a
remote site
• Trade-offs include
ease of
implementation and
cost versus greater
security and
robustness against
different threats
Linux/Unix Security
• Patch management
• Keeping security patches up to date is a widely recognized and critical
control for maintaining security
• Application and service configuration
• Most commonly implemented using separate text files for each
application and service
• Generally located either in the /etc directory or in the installation tree
for a specific application
• Individual user configurations that can override the system defaults are
located in hidden “dot” files in each user’s home directory
• Most important changes needed to improve system security are to
disable services and applications that are not required
Linux/Unix Security
• Users, groups, and permissions
• Access is specified as granting read, write, and
execute permissions to each of owner, group, and
others for each resource
• Guides recommend changing the access permissions
for critical directories and files
• Local exploit
• Software vulnerability that can be exploited by an attacker to
gain elevated privileges
• Remote exploit
• Software vulnerability in a network server that could be
triggered by a remote attacker
Linux/Unix Security
Remote access controls
•Several host firewall programs may
be used
•Most systems provide an
administrative utility to select which
services will be permitted to access
the system
Logging and log rotation
•Should not assume that the default
setting is necessarily appropriate
Linux/Unix Security
• chroot jail
• Restricts the server’s view of the file system to just a
specified portion
• Uses chroot system call to confine a process by mapping
the root of the filesystem to some other directory
• File directories outside the chroot jail aren’t visible or
reachable
• Main disadvantage is added complexity
Windows Security
Patch
management
• “Windows Update” and
“Windows Server
Update Service” assist
with regular
maintenance and should
be used
• Third party applications
also provide automatic
update support
Users administration
and access controls
•Systems implement
discretionary access controls
resources
•Vista and later systems include
mandatory integrity controls
•Objects are labeled as being of
low, medium, high, or system
integrity level
•System ensures the subject’s
integrity is equal or higher than
the object’s level
•Implements a form of the Biba
Integrity model
Windows Security
Users Administration and Access
Controls
Windows systems also define
privileges
•System wide and granted to user
accounts
Combination of share and
NTFS permissions may be
used to provide additional
security and granularity when
accessing files on a shared
resource
User Account Control (UAC)
•Provided in Vista and later systems
•Assists with ensuring users with
administrative rights only use them
when required, otherwise accesses
the system as a normal user
Low Privilege Service
Accounts
•Used for long-lived service processes
such as file, print, and DNS services
Windows Security
Application and service
configuration
•Much of the configuration information is
centralized in the Registry
• Forms a database of keys and values that may be
queried and interpreted by applications
•Registry keys can be directly modified
using the “Registry Editor”
• More useful for making bulk changes
Windows Security
• Essential that anti-virus, anti-spyware, personal firewall, and other malware
and attack detection and handling software packages are installed and
configured
• Current generation Windows systems include basic firewall and malware
countermeasure capabilities
• Important to ensure the set of products in use are compatible
Other security controls
• Encrypting files and directories using the Encrypting File System (EFS)
• Full-disk encryption with AES using BitLocker
Windows systems also support a range of cryptographic
functions:
• Free, easy to use tool that checks for compliance with Microsoft’s security
recommendations
“Microsoft Baseline Security Analyzer”
Virtualization
• A technology that provides an abstraction of the
resources used by some software which runs in a
simulated environment called a virtual machine (VM)
• Benefits include better efficiency in the use of the
physical system resources
• Provides support for multiple distinct operating systems
and associated applications on one physical system
• Raises additional security concerns
Hypervisor
• Software that sits between the hardware and the VMs
• Acts as a resource broker
• It allows multiple VMs to safely coexist on a single
physical server host and share that host’s resources
• Virtualizing software provides abstraction of all physical
resources and thus enables multiple computing stacks,
called virtual machines, to be run on a single physical
host
• Each VM includes an OS, called the guest OS
• This OS may be the same as the host OS, if present, or a
different one
Hypervisor Functions
The principal
functions performed
by a hypervisor are:
• Execution management of VMs
• Devices emulation and access control
• Execution of privileged operations by
hypervisor for guest VMs
• Management of VMs (also called VM
lifecycle management)
• Administration of hypervisor platform and
hypervisor software
Virtualized Systems
• In virtualized systems, the available hardware resources must
be appropriately shared among the various guest OS’s
• These include CPU, memory, disk, network, and other
attached devices
• CPU and memory are generally partitioned between these,
and scheduled as required
• Disk storage may be partitioned, with each guest having
exclusive use of some disk resources
• Alternatively, a “virtual disk” may be created for each guest,
which appears to it as a physical disk with a full file-system,
but is viewed externally as a single ”disk image” file on the
underlying file-system
• Attached devices such as optical disks, or USB devices are
generally allocated to a single guest OS at a time
Software Defined
Networks (SDNs)
SDNs enable network segments to logically span multiple servers
within and between data centers, while using the same underlying
physical network
There are several possible approaches to providing SDNs,
including the use of overlay networks
• These abstract all layer 2 and 3 addresses from the underlying physical network into
whatever logical network structure is required
• This structure can be easily changed and extended as needed
• The IETF standard DOVE (Distributed Overlay Virtual Network) which uses
VXLAN (Virtual Extended Local Area Network) can be used to implement such an
overlay network
• With this flexible structure, it is possible to locate virtual servers, virtual IDS, and
virtual firewalls anywhere within the network as required
Containers
• A recent approach to virtualization is known as container
virtualization or application virtualization
• In this approach, software known as a virtualization container,
runs on top of the host OS kernel and provides an isolated
execution environment for applications
• Unlike hypervisor-based VMs, containers do not aim to
emulate physical servers
• All containerized applications on a host share a common OS
kernel
• For containers, only a small container engine is required as
support for the containers
• Containerization sits in between the OS and applications and
incurs lower overhead, but potentially introduces greater
security vulnerabilities
Virtualization Security
Issues
• Security concerns include:
• Guest OS isolation
• Ensuring that programs executing within a guest OS may
only access and use the resources allocated to it
• Guest OS monitoring by the hypervisor
• Which has privileged access to the programs and data in
each guest OS
• Virtualized environment security
• Particularly image and snapshot management which
attackers may attempt to view or modify
Securing Virtualization
Systems
• Carefully plan the
security of the
virtualized system
• Secure all elements of
a full virtualization
solution and maintain
their security
• Ensure that the
hypervisor is properly
secured
• Restrict and protect
administrator access
to the virtualization
solution
Organizations
using
virtualization
should:
Hypervisor Security
• Should be
• Secured using a process similar to securing an operating system
• Installed in an isolated environment
• Configured so that it is updated automatically
• Monitored for any signs of compromise
• Accessed only by authorized administration
• May support both local and remote administration so must be
configured appropriately
• Remote administration access should be considered and secured in the
design of any network firewall and IDS capability in use
• Ideally administration traffic should use a separate network with very
limited access provided from outside the organization
Virtualized
Infrastructure
Security
Systems
manage access
to hardware
resources
Access must
be limited to
just the
appropriate
guest OSs
Access to VM
image and
snapshots must
be carefully
controlled
Virtual Firewall
Provides firewall capabilities for the network traffic flowing
between systems hosted in a virtualized or cloud
environment that does not require this traffic to be routed
out to a physically separate network supporting traditional
firewall services
VM Bastion Host
Where a separate VM is used as a
bastion host supporting the same
firewall systems and services that
could be configured to run on a
physically separate bastion, including
possibly IDS and IPS services
VM Host-Based
Firewall
Where host-based firewall
capabilities provided by the Guest
OS running on the VM are
configured to secure that host in
the same manner as used in
physically separate systems
Hypervisor Firewall
Where firewall capabilities are
provided directly by the
hypervisor
Summary
• Linux/Unix security
• Patch management
• Application and service configuration
• Users, groups, and permissions
• Remote access controls
• Logging and log rotation
• Application security using a chroot jail
• Security testing
• Windows security
• Patch management
• Users administration and access
controls
• Application and service configuration
• Other security controls
• Security testing
• Virtualization security
• Virtualization alternatives
• Virtualization security issues
• Securing virtualization systems
• Introduction to operating
system security
• System security planning
• Operating systems
hardening
• Operating system installation:
initial setup and patching
• Remove unnecessary services,
applications and protocols
• Configure users, groups, and
authentications
• Configure resource controls
• Install additional security controls
• Test the system security
• Application security
• Application configuration
• Encryption technology
• Security maintenance
• Logging
• Data backup and archive

More Related Content

Similar to CH12-CompSec4e.pptx

security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
selvapriyabiher
 
CompTIASecPLUSAASS-part4 - Edited (1).pptx
CompTIASecPLUSAASS-part4 - Edited (1).pptxCompTIASecPLUSAASS-part4 - Edited (1).pptx
CompTIASecPLUSAASS-part4 - Edited (1).pptx
mohedkhadar60
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
aizazhussain234
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
SakshiGawde6
 
Fundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxFundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptx
KelvinDube4
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
DevAdnani
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
Tripwire
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
gameaxt
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
shanthishyam
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
limsh
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODING
Sri Latha
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
DrBasemMohamedElomda
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
MuhammadAbdullah311866
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
AlfredObia1
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
Kudzi Chikwatu
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
salutiontechnology
 
Healthcare Compliance Software
Healthcare Compliance SoftwareHealthcare Compliance Software
Healthcare Compliance Software
Jose Ivan Delgado, Ph.D.
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
Priyank Hada
 

Similar to CH12-CompSec4e.pptx (20)

security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
CompTIASecPLUSAASS-part4 - Edited (1).pptx
CompTIASecPLUSAASS-part4 - Edited (1).pptxCompTIASecPLUSAASS-part4 - Edited (1).pptx
CompTIASecPLUSAASS-part4 - Edited (1).pptx
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 
Fundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxFundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptx
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODING
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
 
Healthcare Compliance Software
Healthcare Compliance SoftwareHealthcare Compliance Software
Healthcare Compliance Software
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

CH12-CompSec4e.pptx

  • 1. Computer Security: Principles and Practice Fourth Edition By: William Stallings and Lawrie Brown
  • 3.
  • 4. Strategies • The 2010 Australian Signals Directorate (ASD) lists the “Top 35 Mitigation Strategies” • Over 85% of the targeted cyber intrusions investigated by ASD in 2009 could have been prevented • The top four strategies for prevention are: • White-list approved applications • Patch third-party applications and operating system vulnerabilities • Restrict administrative privileges • Create a defense-in-depth system • These strategies largely align with those in the “20 Critical Controls” developed by DHS, NSA, the Department of Energy, SANS, and others in the United States
  • 5. Operating System Security • Possible for a system to be compromised during the installation process before it can install the latest patches • Building and deploying a system should be a planned process designed to counter this threat • Process must: • Assess risks and plan the system deployment • Secure the underlying operating system and then the key applications • Ensure any critical content is secured • Ensure appropriate network protection mechanisms are used • Ensure appropriate processes are used to maintain security
  • 6. System Security Planning The first step in deploying a new system is planning Planning should include a wide security assessment of the organization Aim is to maximize security while minimizing costs Planning process needs to determine security requirements for the system, applications, data, and users Plan needs to identify appropriate personnel and training to install and manage the system
  • 7. System Security Planning Process The purpose of the system, the type of information stored, the applications and services provided, and their security requirements The categories of users of the system, the privileges they have, and the types of information they can access How the users are authenticated How access to the information stored on the system is managed What access the system has to information stored on other hosts, such as file or database servers, and how this is managed Who will administer the system, and how they will manage the system (via local or remote access) Any additional security measures required on the system, including the use of host firewalls, anti- virus or other malware protection mechanisms, and logging
  • 8. Operating Systems Hardening • First critical step in securing a system is to secure the base operating system • Basic steps • Install and patch the operating system • Harden and configure the operating system to adequately address the indentified security needs of the system by: • Removing unnecessary services, applications, and protocols • Configuring users, groups, and permissions • Configuring resource controls • Install and configure additional security controls, such as anti- virus, host-based firewalls, and intrusion detection system (IDS) • Test the security of the basic operating system to ensure that the steps taken adequately address its security needs
  • 9. Initial Setup and Patching System security begins with the installation of the operating system Ideally new systems should be constructed on a protected network Full installation and hardening process should occur before the system is deployed to its intended location Initial installation should install the minimum necessary for the desired system Overall boot process must also be secured The integrity and source of any additional device driver code must be carefully validated Critical that the system be kept up to date, with all critical security related patches installed Should stage and validate all patches on the test systems before deploying them in production
  • 10. • If fewer software packages are available to run the risk is reduced • System planning process should identify what is actually required for a given system • When performing the initial installation the supplied defaults should not be used • Default configuration is set to maximize ease of use and functionality rather than security • If additional packages are needed later they can be installed when they are required Remove Unnecessary Services, Applications, Protocols
  • 11. • Not all users with access to a system will have the same access to all data and resources on that system • Elevated privileges should be restricted to only those users that require them, and then only when they are needed to perform a task • System planning process should consider: • Categories of users on the system • Privileges they have • Types of information they can access • How and where they are defined and authenticated • Default accounts included as part of the system installation should be secured • Those that are not required should be either removed or disabled • Policies that apply to authentication credentials configured Configure Users, Groups, and Authentication
  • 12. • Once the users and groups are defined, appropriate permissions can be set on data and resources • Many of the security hardening guides provide lists of recommended changes to the default access configuration • Further security possible by installing and configuring additional security tools: • Anti-virus software • Host-based firewalls • IDS or IPS software • Application white-listing Configure Resource Controls Install Additional Security Controls
  • 13. • Final step in the process of initially securing the base operating system is security testing • Goal: • Ensure the previous security configuration steps are correctly implemented • Identify any possible vulnerabilities • Checklists are included in security hardening guides • There are programs specifically designed to: • Review a system to ensure that a system meets the basic security requirements • Scan for known vulnerabilities and poor configuration practices • Should be done following the initial hardening of the system • Repeated periodically as part of the security maintenance process Test the System Security
  • 14. Application Configuration • May include: • Creating and specifying appropriate data storage areas for application • Making appropriate changes to the application or service default configuration details • Some applications or services may include: • Default data • Scripts • User accounts • Of particular concern with remotely accessed services such as Web and file transfer services • Risk from this form of attack is reduced by ensuring that most of the files can only be read, but not written, by the server
  • 15. Encryption Technology Is a key enabling technology that may be used to secure data both in transit and when stored Must be configured and appropriate cryptographic keys created, signed, and secured If secure network services are provided using TLS or IPsec suitable public and private keys must be generated for each of them If secure network services are provided using SSH, appropriate server and client keys must be created Cryptographic file systems are another use of encryption
  • 16. Security Maintenance • Process of maintaining security is continuous • Security maintenance includes: • Monitoring and analyzing logging information • Performing regular backups • Recovering from security compromises • Regularly testing system security • Using appropriate software maintenance processes to patch and update all critical software, and to monitor and revise configuration as needed
  • 17. Logging Can only inform you about bad things that have already happened In the event of a system breach or failure, system administrators can more quickly identify what happened Key is to ensure you capture the correct data and then appropriately monitor and analyze this data Information can be generated by the system, network and applications Range of data acquired should be determined during the system planning stage Generates significant volumes of information and it is important that sufficient space is allocated for them Automated analysis is preferred
  • 18. Data Backup and Archive Performing regular backups of data is a critical control that assists with maintaining the integrity of the system and user data May be legal or operational requirements for the retention of data Backup The process of making copies of data at regular intervals Archive The process of retaining copies of data over extended periods of time in order to meet legal and operational requirements to access past data Needs and policy relating to backup and archive should be determined during the system planning stage Kept online or offline Stored locally or transported to a remote site • Trade-offs include ease of implementation and cost versus greater security and robustness against different threats
  • 19. Linux/Unix Security • Patch management • Keeping security patches up to date is a widely recognized and critical control for maintaining security • Application and service configuration • Most commonly implemented using separate text files for each application and service • Generally located either in the /etc directory or in the installation tree for a specific application • Individual user configurations that can override the system defaults are located in hidden “dot” files in each user’s home directory • Most important changes needed to improve system security are to disable services and applications that are not required
  • 20. Linux/Unix Security • Users, groups, and permissions • Access is specified as granting read, write, and execute permissions to each of owner, group, and others for each resource • Guides recommend changing the access permissions for critical directories and files • Local exploit • Software vulnerability that can be exploited by an attacker to gain elevated privileges • Remote exploit • Software vulnerability in a network server that could be triggered by a remote attacker
  • 21. Linux/Unix Security Remote access controls •Several host firewall programs may be used •Most systems provide an administrative utility to select which services will be permitted to access the system Logging and log rotation •Should not assume that the default setting is necessarily appropriate
  • 22. Linux/Unix Security • chroot jail • Restricts the server’s view of the file system to just a specified portion • Uses chroot system call to confine a process by mapping the root of the filesystem to some other directory • File directories outside the chroot jail aren’t visible or reachable • Main disadvantage is added complexity
  • 23. Windows Security Patch management • “Windows Update” and “Windows Server Update Service” assist with regular maintenance and should be used • Third party applications also provide automatic update support Users administration and access controls •Systems implement discretionary access controls resources •Vista and later systems include mandatory integrity controls •Objects are labeled as being of low, medium, high, or system integrity level •System ensures the subject’s integrity is equal or higher than the object’s level •Implements a form of the Biba Integrity model
  • 24. Windows Security Users Administration and Access Controls Windows systems also define privileges •System wide and granted to user accounts Combination of share and NTFS permissions may be used to provide additional security and granularity when accessing files on a shared resource User Account Control (UAC) •Provided in Vista and later systems •Assists with ensuring users with administrative rights only use them when required, otherwise accesses the system as a normal user Low Privilege Service Accounts •Used for long-lived service processes such as file, print, and DNS services
  • 25. Windows Security Application and service configuration •Much of the configuration information is centralized in the Registry • Forms a database of keys and values that may be queried and interpreted by applications •Registry keys can be directly modified using the “Registry Editor” • More useful for making bulk changes
  • 26. Windows Security • Essential that anti-virus, anti-spyware, personal firewall, and other malware and attack detection and handling software packages are installed and configured • Current generation Windows systems include basic firewall and malware countermeasure capabilities • Important to ensure the set of products in use are compatible Other security controls • Encrypting files and directories using the Encrypting File System (EFS) • Full-disk encryption with AES using BitLocker Windows systems also support a range of cryptographic functions: • Free, easy to use tool that checks for compliance with Microsoft’s security recommendations “Microsoft Baseline Security Analyzer”
  • 27. Virtualization • A technology that provides an abstraction of the resources used by some software which runs in a simulated environment called a virtual machine (VM) • Benefits include better efficiency in the use of the physical system resources • Provides support for multiple distinct operating systems and associated applications on one physical system • Raises additional security concerns
  • 28. Hypervisor • Software that sits between the hardware and the VMs • Acts as a resource broker • It allows multiple VMs to safely coexist on a single physical server host and share that host’s resources • Virtualizing software provides abstraction of all physical resources and thus enables multiple computing stacks, called virtual machines, to be run on a single physical host • Each VM includes an OS, called the guest OS • This OS may be the same as the host OS, if present, or a different one
  • 29. Hypervisor Functions The principal functions performed by a hypervisor are: • Execution management of VMs • Devices emulation and access control • Execution of privileged operations by hypervisor for guest VMs • Management of VMs (also called VM lifecycle management) • Administration of hypervisor platform and hypervisor software
  • 30.
  • 31. Virtualized Systems • In virtualized systems, the available hardware resources must be appropriately shared among the various guest OS’s • These include CPU, memory, disk, network, and other attached devices • CPU and memory are generally partitioned between these, and scheduled as required • Disk storage may be partitioned, with each guest having exclusive use of some disk resources • Alternatively, a “virtual disk” may be created for each guest, which appears to it as a physical disk with a full file-system, but is viewed externally as a single ”disk image” file on the underlying file-system • Attached devices such as optical disks, or USB devices are generally allocated to a single guest OS at a time
  • 32. Software Defined Networks (SDNs) SDNs enable network segments to logically span multiple servers within and between data centers, while using the same underlying physical network There are several possible approaches to providing SDNs, including the use of overlay networks • These abstract all layer 2 and 3 addresses from the underlying physical network into whatever logical network structure is required • This structure can be easily changed and extended as needed • The IETF standard DOVE (Distributed Overlay Virtual Network) which uses VXLAN (Virtual Extended Local Area Network) can be used to implement such an overlay network • With this flexible structure, it is possible to locate virtual servers, virtual IDS, and virtual firewalls anywhere within the network as required
  • 33. Containers • A recent approach to virtualization is known as container virtualization or application virtualization • In this approach, software known as a virtualization container, runs on top of the host OS kernel and provides an isolated execution environment for applications • Unlike hypervisor-based VMs, containers do not aim to emulate physical servers • All containerized applications on a host share a common OS kernel • For containers, only a small container engine is required as support for the containers • Containerization sits in between the OS and applications and incurs lower overhead, but potentially introduces greater security vulnerabilities
  • 34. Virtualization Security Issues • Security concerns include: • Guest OS isolation • Ensuring that programs executing within a guest OS may only access and use the resources allocated to it • Guest OS monitoring by the hypervisor • Which has privileged access to the programs and data in each guest OS • Virtualized environment security • Particularly image and snapshot management which attackers may attempt to view or modify
  • 35. Securing Virtualization Systems • Carefully plan the security of the virtualized system • Secure all elements of a full virtualization solution and maintain their security • Ensure that the hypervisor is properly secured • Restrict and protect administrator access to the virtualization solution Organizations using virtualization should:
  • 36. Hypervisor Security • Should be • Secured using a process similar to securing an operating system • Installed in an isolated environment • Configured so that it is updated automatically • Monitored for any signs of compromise • Accessed only by authorized administration • May support both local and remote administration so must be configured appropriately • Remote administration access should be considered and secured in the design of any network firewall and IDS capability in use • Ideally administration traffic should use a separate network with very limited access provided from outside the organization
  • 37. Virtualized Infrastructure Security Systems manage access to hardware resources Access must be limited to just the appropriate guest OSs Access to VM image and snapshots must be carefully controlled
  • 38. Virtual Firewall Provides firewall capabilities for the network traffic flowing between systems hosted in a virtualized or cloud environment that does not require this traffic to be routed out to a physically separate network supporting traditional firewall services VM Bastion Host Where a separate VM is used as a bastion host supporting the same firewall systems and services that could be configured to run on a physically separate bastion, including possibly IDS and IPS services VM Host-Based Firewall Where host-based firewall capabilities provided by the Guest OS running on the VM are configured to secure that host in the same manner as used in physically separate systems Hypervisor Firewall Where firewall capabilities are provided directly by the hypervisor
  • 39. Summary • Linux/Unix security • Patch management • Application and service configuration • Users, groups, and permissions • Remote access controls • Logging and log rotation • Application security using a chroot jail • Security testing • Windows security • Patch management • Users administration and access controls • Application and service configuration • Other security controls • Security testing • Virtualization security • Virtualization alternatives • Virtualization security issues • Securing virtualization systems • Introduction to operating system security • System security planning • Operating systems hardening • Operating system installation: initial setup and patching • Remove unnecessary services, applications and protocols • Configure users, groups, and authentications • Configure resource controls • Install additional security controls • Test the system security • Application security • Application configuration • Encryption technology • Security maintenance • Logging • Data backup and archive