Cissp Week 23

download Cissp Week 23

If you can't read please download the document

Transcript of Cissp Week 23

StaridLabs

Security OperationsDomain 7Pages 1014-1080Official CISSP CBK Third Edition

Jem Jensen & Tim JensenStaridLabs

Main Themes

Maintaining operational resilienceAnticipating disruptions, maintain processes

Protecting valuable assetsDay-to-day protection for human & material assets

Controlling system accountsProvide checks & balances

Managing security servicesReporting, change control, key management, etc

Review

Least PrivilegeUser or process is given the minimum access privilege necessary to do a job

Need to knowRequires need for access based on job or business requirements

Must have privileges as well as a need to know

User Management

Groups or roles (RBAC) with permissions

Different types of accountsPrivileged accountsRoot/Admin accounts all powerful, shared (danger!)

Service accounts provides privileged access to system services or applications

Administrator accounts powerful, given to individuals

Power user grants specific privileges to individuals

Limited user Only given privileges strictly required. Individual accounts. Usually the majority of accounts

Separation of duties

System administratorsHighest level of privilege, highest risk

Still could & should have least privilegeNot every system admin needs to do everything

Should be highly monitoredLogs should go to a separate system admin can't access

Should require approval, peer review, job rotation or some other separation of duties (forces collusion for malicious acts)

Should have background checks to ensure they haven't abused power in the past or are prone to blackmail

Separation of duties

OperatorsHighly privileged, high risk

Should have least privilege

Should be highly monitoredLogs should go to a separate system admin can't access

Force collusion for malicious acts with separation of duties

Should have background checks to ensure they haven't abused power in the past or are prone to blackmail

Separation of duties

Security administratorsMedium privilege, mostly audit trailLess write access so they must work with system admin to make changes

Broad read access so they can verify system admin only did the changes they should have

Help desk (power user)Low privilege, some special access

Need sufficient access to perform duties like reset passwords

Should be monitored on those privileged actions

Monitoring Special Privileges

Access should be based on:Past actions

History of trustworthiness

Level of access needed to do their job

Conduct regular reviews & background checksFor background checks, focus on relevance

Periodic reviews to find inactive accounts

Job Rotation

Pros:May uncover nonstandard or fraudulent activities

Reduces the risk of collusion

Provides greater diversity of skills

Cons:More difficult for smaller companies

Getting enough skilled employees is expensive

Sensitive Information

Process to classify and declassify informationInfo changes over time

MediaLabel: Encrypted? Point of Contact?Unlabeled media should be considered highly sensitive until reviewed and classified

Handling: Only trust certain trained individuals

Storing: Away from where everyone can access

Destruction: Don't recycle or reuse! Keep a record of the destruction to correspond to remaining logs

Record Retention

Only keep data as long as it is required

Make a retention policyShouldn't be a single, blanket amount of time

Too many logs make noise

Too few and you don't meet your legal and organizational obligations

Employee Resource Protection

Tangible assets: equipment, employees, etc

Intangible assets: intellectual property, data

Protecting physical assetsConfirm ownership of assets

FacilitiesAccess control (badges, keys)

Fire suppression, surge protection, AC

HardwareHighly secured data center

Less secured workstations, managers with locking office

Printers, phone, cameras

Media Management

TypesMagnetic: Tape, Floppy, Hard Drives

Optical: DVD, CD-ROM

Hard copy: Paper printouts

Encrypt sensitive information

Software librarianKeep original copies of software, test data, code

Media Management

Archival & Offline StorageHistorical data, backups for disaster recovery

Stored offline in a safe, offsite, unplugged

RecoveryUsually slow

Usually some loss

Disposal/ReuseScrub old media thoroughly or destroy it

Asset Management

Software licensesPrevent copyright infringement

Prevent theft by employees (personal use)

Equipment lifecycleDefine requirements (incl security requirements)

Acquire & implement (validate security impl)

Operations & maintenance (keep it secure!)

Disposal & decommission (securely erased)

Media Management

TypesMagnetic: Tape, Floppy, Hard Drives

Optical: DVD, CD-ROM

Hard copy: Paper printouts

Encrypt sensitive information

Software librarianKeep original copies of software, test data, code

Incident Containment

Containment Strategies:Disconnect devices from the network

Shut systems down

Redirect traffic

Considerations:Preservation of forensic evidence

Availability of services

Potential damage of inaction

Time required for containment

Resources required for containment

Bad ideas

Delaying containment of a compromised system is a bad idea.

There may be legal implications if your organization knows about the compromised system and then the system is used to attack other systems.

Good Ideas

Forensics team should create a forensic image of the RAM and hard drive.

Determine how to mitigate the vulnerability

Consult legal to see if the image needs to be admissible in court

If needed for court, a chain of custody must be setup and thoroughly documented.

If your security/infrastructure team doesn't know how to do forensics and it'll be needed for court then consider hiring a 3rd party forensics company.

Incident Documentation

The initial incident and all relevant information should be documented in an incident management system (IMS).

The incident should be updated as more information becomes available until the incident is considered resolved.

Reporting Requirements

Some organizations are required to report incidents which meet certain conditions:US Civilian Government Agencies are required to report any preach of personally identifiable information tot he US Computer Emergency Readiness Team (US-CERT) within 1 hour of discovery

Policies and procedures must define how an incident is routed when criminal activity is suspectedMangement

Law Enforcement

FBI/US Secret Service

Incident Escalation Procedures

Does the media or an external affairs group (Public Relations) need to be involved?

Does the organization's legal team need to be involved?

At what point should security brief: line management, middle management, senior management, board of dirctors or stakeholders

What confidentiality requirements are necessary to protect incident information

What methods are used for reporting (email, phones, IM, etc could be out of service during an incident)

Incident Recovery

Systems need to be recovered to a known good state

The first step is to eradicate (remove) the threat.

Recovery primarily involves restoring the system to a known good state.

If no clean image is available then the system may need to be backed up, re-imaged, data restored, and the system checked to verify that the incident doesn't re-occur.

Remediation and Review

The most important part of incident response is reviewing the incident once it's resolved to identify:What went wrong?

How could this have been prevented?

How could we have sped up containment?

How could we have sped up restoration?

Etc...

Another common term for this is doing a postmortem

Root Cause Analysis

Root Cause Analysis is asking why until there is
only one answer left.

A team is formed to review logs, procedures, packet captures, etc to figure out exactly what happened, how it happened, what failed, etc.

This is a very time consuming process.

Teams being investigated may not cooperate for fear of wrongdoing

When complete, management needs to sign off on the proposed changes or document that they are accepting the risk.

Problem Management

Related to incident management.

Goal is to identify and resolve defects that cause incidents.

Not limited to single incidents. Can cover multiple incidents over long periods of time.

Not always directly related to security. Could be figuring out why system outages consistently occur after reboot, resource usage, etc.

Security Audits and Reviews

Security Audits are usually performed by an independent 3rd partyCompares implemented controls with policy, procedures, and compliance guidelines.

Security Reviews are conducted by system administrators or security personnel to identify vulnerabilities within the system.Vulnerabilities are defined as:Policy violations

Misconfigurations

Hardware/software flaws in systems.

Audits and Reviews
The Legend Continues

Penetration testing is a form of security review.Actually tests exploitation of systems vs just looking at configuration.

Determines actual risk to system vs perceived risk

Can either have physical access or must gain external access.

Security audits can be both internal and external.Internal are conducted by the organization's staff who doesn't have management responsibility of the system.

External are conducted by 3rd parties.Security personnel often like external audits, since they can support security concerns which have been given low priority by management.

Preventative Measures
Against Attacks

A security professional's job is to understand common threats to operations and help prepare for them.

The goal is to be prepared for any potential threat which impacts reliable service.Full mitigation or limiting of damages.

The CIA triad (Confidentiality, Integrity, Availability) is meant to protect against the threats of disclosure, corruption, and destruction

Unauthorized Disclosure

Unauthorized release of information is not a good thing

Common causes:Hacker penetrates system that contains confidential information

Malware infections

Disgruntled employees, contractors, or partners

System misconfigurations

Programming errors

Technical solutions need to be put in place to protect sensitive information. Privileged users must be monitored and file system logging should be enabled and monitored for abnormal activity.

Destruction, Interruption, and Theft

Data can be destroyed by malicious, unintentional, and uncontrollable means.Secure operation is intended to prevent destruction of sensitive assets.

Service interruption can be very expensive and disruptive

Theft is common (really, really common)Secure configurations and operations help protect against theft but it's likely to still happen.

Preventative measures should be continuously evolved

Solid policies, procedures, and training should be setup and evolved to protect an organization against theft.

Corruption and Improper Modification

Environmental factors as well as individuals can cause damage to systems and data

Sporadic fluctuations in temperature or line power can cause systems to make errors while writing data.

Changes to file or table permissions can cause unintended data corruption

Integrity protections should be implemented on key systems

Procedures should be put in place to protect against misconfigurations

Logging and monitoring should be put in place to monitor privileged access to high risk targets

Patch and Vulnerability Management

Patches are created to fix flaws in vendor products which are continuously discovered.

Patch management isn't as easy as it sounds

Types of patches:In band (Follows a release cycle)Microsoft Patch Tuesday

Out of band (Critical security or functionality patches)

HotfixesCan be public or private

Vendors don't always say what a patch is resolving.Often release notes don't show security remediations or are incomplete.

3rd party organizations provide vulnerability databases which show criticality, remediation steps, and continuously updated information.

3rd Party Vulnerability Orgs

Cve.mitre.orgProvides the common vulnerability and exposures database. Generates a standard name and number for disclosed vulnerabilities

CVE numbers are formatted: CVE-2013-0001

Nvd.nist.govVulnerability database managed by NIST

Cert.govOnline resource for vulnerabilities and remedation options

(Tim Tip) cvedetails.com is the best database I've found for vulnerabilitiesProvides same info as NIST/MITRE

Easy to correlate vendor, product, and product version

Tells you if there's a metasploit module for the CVE and provides the module if available.

Vulnerability Management

Many automated and manual tools exist to test for vulnerabilitiesVulnerability scanners (nessus, openvas, retina)May not be up to date on all vulnerabilities

Often provide false positives

Once a vulnerability is identified it should be validated. If the vuln is valid then a determination should be made whether to patch the system or not.

If a patch is applied then the system should be re-scanned to make sure new vulnerabilities weren't introduced

Vulnerability Considerations

What is the risk if the flaw isn't patched?

Is the system likely to be exposed to threats that may be exploited?

Are special privileges required for the vulnerability to be exploited?

Can the vulnerability be used to gain administrative privilege?

How easy is it to exploit?

Is physical access required or can this be exploited remotely?

Patching Etiquette

Users should be notified of when patches are to be appliedThis helps both users and the helpdesk troubleshoot issues

When possible patching should be done on evenings or weekends when systems are less used.

Full system backups should be done before patches are applied (I've learned this the hard way more than once)

Deploy updates in stages, preferably to dev and test before production to identify possible issues.

Document changesWhat was applied

Were there problems? How were they resolved

If not applied, why not?

Random Sun Tzu quote


If you know the enemy and know thyself, then you need not fear the result of a hundred battles

Know thyself

Organizations need to consistently utilize configuration management and vulnerability scanning.

Configuration management provides an organization with knowledge about all of its parts.

Vulnerability scanning identifies weaknesses present within the parts.

(These also provide you with a list of what systems are connected to your network and possibly who put them there)

Change and Configuration Management

Provides system integrity

Documents changes to hardware, OS, software packages installed, software patches, configuration changes, etc.

Provides documentation for audits, transparency for business units, and a troubleshooting database for questions like Why did the system start dropping every 10th connection on July 16th

Change Requests

Proposed changes should be formally presented to a committee in writing.

Should provide a detailed justification with a business case need focusing on benefits of implementation and costs of not implimenting.

Impact Assessment

Members of the committee should determine the impacts to operations regarding the decision to implement or reject the change

Approval/Disapproval

Requests should be answered officially regarding their acceptance or rejection

Build and Test

Approvals are provided to operations for testing and development

Changes should be tested on a non-production system.

Testing documentation should be created and filed.

Security should be invited to perform a final review of the change in test before its implemented into production.

Notification

System users are notified of the proposed change and the schedule of deployment

Be a little cautious with this step. If the change is security related, don't say fixing CVE-2008-0009 in 4 days time at 9PM because that's letting everyone know of how to exploit the system.

Especially don't tell public users if it's an internet app. Just say system maintenance is scheduled for 9PM on July 19th. The system may be unresponsive for 2 hours.

Implementation

Changes are deployed incrementally when possible and monitored for issues.

Validation

The change is validated by operational staff

Security performs a security scan or review to ensure new vulnerabilities are not introduced

Documentation

Lessons learned, outcome, and scan results should be recorded and kept

Configuration Management

Hardware and software requires proper tracking

Configuration management documents hardware components, software, and configuration settings.

Hardware data to include

Make

Model

MAC Address

Serial Number

Operating System or firmware version

Location

BIOS and other hardware related passwords

Assigned IP (If Applicable)

Bar code or organization label number/name

Software Data to Include

Software name

Software vendor

Software reseller

Keys or activation codes

Type of license (and version)

Number of licenses

License expiration

License portability

Software librarian or asset manager

Organizational contact for installed software

Upgrade, full, or limited license

System Resilience
and Fault Tolerance

Systems should be designed for resilience and should be documented for likely system lifetime

When system components are designed they are rated with a 'mean time to failure (MTF).Moving parts generally fail sooner (fans, power supplies)

Systems should be able to react automatically to failures and recovery without human interaction

Trusted Paths and Fail Secure Mechanisms

Trusted paths provide trustworthy interfaces into privileged user functions and are intended to provide a way to ensure that any communications over that path cannot be intercepted or corrupted.Example is 2 ethernet NICS on a server. One serves port 80/443 web traffic. The other provides server management (port 22/ssh, sftp, configuration webpage, etc)

Security should validate that trusted paths continue to operate as intended through log collection, vulnerability scanning, patch management, and system integrity checking.

Fail-safe / Fail-Secure

Fail-Safe: Mechanisms focus on failing with a minimum of harm to personnel or systems

Fail-secure: Focuses on failing in a controlled manner to block access while the systems are in an inconsistent state.

Redundancy / Fault Tolerance

Redundant/ fault tolerant systems can continue to operate in the event of a component failure.

Cold spare: spare component that is not powered up but is a duplicate that can be inserted if needed. Requires human intervention

Warm spare: Installed in system but require human interaction to start

Hot spare: Powered on and ready to work. Requires no or little human intervention.

Redundant Networks

Networks can be configured with redundant paths so if one path dies the network still functions

Clustering

Clusters are two or more partner systems joined together providing service at the same time.

Not to be confused with redundancy.

Redundancy provides same service if one path dies. Clustered systems continue to operate but in a degraded capacity.

Power Supplies

If power fails or voltage lowers then systems will fail or become unreliable.

Redundant power supplies are very common

Power faults outside of the system can be dealt with using uninterruptable power supplies.

Drives and Data Storage

One of the most common types of failures is drive failure.

Caused by the many rotating and moving parts

Even solid state drives (SSD) will fail after a number of write operations

Storage Area Networks (SAN)

Dedicated block level storage on a dedicated network.

Can be made of tape libraries, optical drives, and disk arrays.

Generally use protocols like iSCSI to appear to operating systems as local drives

Network Attached Storage (NAS)

Provides file level storage

Common for FTP and file servers

Generally on a shared network and show up as a shared drive.

JBOD systems

The simpliest drive configuration is to stick a bunch of drives into a system and have them all independent (C drive, D drive, E drive, F drive).

If one drive fails all of the data on that drive is lost, but other drives continue to operate.

Called Just a Bunch of Drives (JBOD)

An alternate method is to concatenate (join) drives. If you have 2 40GB drives you can concatenate them into 1 logical 80GB partition. A single drive failure looses data on all drives.

RAID

RAID allows us to configure drives an a way that doesn't suck

Multiple configuration options to increase performance, reliability, or both

RAID Types

RAID 0: Writes data in stripes across multiple disks without parity. Fast, but not fault tolerant. A single drive failure looses all data.

RAID 1: Duplicates all disk writes from one disk to another to create two identical (mirrored) drives.

RAID 2: Theoretical and not used. Data is spread across mutliple disks at the bit level, uses Hamming error correction. Very complex and expensive.

RAID 3/4: Data is striped across drives but redundancy is also provided. Parity data is written to a dedicated disk. If one disk fails then the party data disk is used to recover. The difference between RAID 3 and 4 is how data is stripped. 4 is a little faster. The parity drive slows the RAID down some and the parity drive is the most likely to fail.

RAID Types 2

RAID 5: Requires 3 or more drives to impliment. Data AND parity data is stripped across drives. Most popular RAID type, can tolerate the loss of any one drive.

RAID 6: Extends RAID 5 by providing two sets of parity data. RAID 6 can tolerate two failed drives. Performance is slightly less than RAID 5

RAIT

Tape media can also be redundant by creating a RAIT (Redundant Array of Independent Tapes).

RAIT uses robotic mechanisms to automatically transfer tapes between storage and the drive mechanisms.

RAIT uses striping without redundancy.

Commonly uses tape vaulting to make multiple copies of tapes that are used for backup and recovery.

Backups/Recovery

Clustering, fault tolerance, and redundancy doesn't solve everything.

Backups are important

Backups should be stored off of the system (removable media) and stored in a different location

Staffing Resilience

Staffing shouldn't fall to a single point of failure.

Multiple people should be trained to operate systems in the event of training, sick days, employee termination, or death/disability.