ME Information Security

18
ME Information Security Summit Infrastructure Security Mohamed Monsef Senior System/Network Engineer – MEAI Region Team National Oilwell Varco

Transcript of ME Information Security

Page 1: ME Information Security

ME Information Security Summit

Infrastructure Security

Mohamed MonsefSenior System/Network Engineer – MEAI Region TeamNational Oilwell Varco

Page 2: ME Information Security

AgendaAbout Me.IntroductionCases – Data BreachesSteps in SecuritySecurity model (Defense is in Depth)Security Layer-1Security Layer-2Security Layer-3Security Layer-4Precautionary stepsInsider Security RiskQ & A

Page 3: ME Information Security

Mohamed MonsefSenior System and Network EngineerMEAI Region Team at National Oilwell Varco(Oil and Energy Sector)

[email protected]://eg.linkedin.com/in/mohamedmonsefSenior System and Network EngineerEl Sewedy Electric – Doha Cables Company (Industrial & Manufacturing Sector)

IT Infrastructure ManagerASGATech Company – Teqneyat Group (IT Services and Products sector)

System and Network AdministratorGrand Capital Group – Grand Investment Securities (Banking sector)

System and Network Administrator(Confidential company – Confidential sector)

Page 4: ME Information Security

“Security is not merely a product, but a process. It's more than designing strong cryptography into a system; it's designing the fail-safe system such that, all security measures, including cryptography, works together.“

Bruce SchneierThe renowned security technologist and author

Page 5: ME Information Security

Cases – Data Breaches

Page 6: ME Information Security

1- Comprehend your IT infrastructure, network (configuration and topology), network traffic and communication system.

2- Prepare a security policy, processes, procedures, and their implementation plan.

3- Obtain approval of the above from management.

4- Implement the above policies and plans.

Steps in Security

Page 7: ME Information Security

5- Maintain a standardized documentation of the entire IT infrastructure. 6- Periodically test and audit the entire network security (Internet, Intranet and Extranet), update it regularly, and maintain an audit trail of all changes

7- Create security awareness among users through training, crash courses or “tip of the day” messages.

8- Undertake preventive measures, before corrective measures become necessary.

Page 8: ME Information Security

Security model (Defense is in Depth)Many IT Pros and IT Managers/Directors don’t work for organizations with budgets for procurement of security equipment or systems.

Perimeter defense

Operating Systems & Servers Protection

Host protection

Information protection

Page 9: ME Information Security

Security Layer-1:Perimeter Defense Security Systems

A national survey showed that 70-80% of attacks are internal i.e., from within the organization’s internal network. (www.sans.org)

Therefore, securing from internal attacks is the first line of defense.

For example:DoS (Denial of Service) attack

Zombie attack (system used to attack the target)

Page 10: ME Information Security

Precautionary Measures1- Setup DMZ 1st scenario is setup as an external network to the internal network (Production Network) 2nd scenario is setup as an internal network for requests from Internet to the DMZ.2- Access list (Protect from ICMP attacks)3- Anti-Spoofing (Protect from attacks through network devices)4- “no ip directed-broadcast” (Protect from packets broadcast attacks)5- Control and monitor filter configurations as who can modify / who modified /when modified /why modified.6- Update filters.7- Test filters periodically.

Page 11: ME Information Security

Security Layer-2:OS and Application Servers Security SystemsThis layer holds protection of operating system, the application servers, web servers, and mail servers.

Vulnerabilities exist in operating systems, web servers, proxy servers, mail servers and application servers that need patches / service packs / hotfixes to fill those holes.

1- Place your servers and communication equipment in a secure room.

2- Give restricted access to server/communication room.

3- Avoid using server consoles as much as possible

4- Match hardware compatibility while buying/installing the server.

5- Disable CD-ROM or floppy disk boot.

Who is responsible for securing these systems?

Page 12: ME Information Security

Windows server 2003/2008/2012 some tricks (Not All)1- Install latest Service Pack for the server.2- Enable auditing (it is not by default). 3- Enable “change periodic password” policy (not enabled by default).4- Change the default user rights. 5- Make proper backups. 6- “Password-guessing attack”7- Have Anti-virus software

Page 13: ME Information Security

Security Layer-3:Host Protection1- Protect against someone trying to attack from within the network.2- Protect the data stored on workstation from someone coming through the firewall.

To apply the security in this level:-

1- Prepare User Access Policy

2- Update regularly the patches/hotfixes.

3- Limit the Network Resources Access from workstations.

4- Install AV software

5- Ensure workstation data is included in daily nightly backups.

6- Allow no modems on workstations.

7- Allow only one user to login in on each workstation.

8- Do not retain faulty or old hard disk drives.

Page 14: ME Information Security

Security Layer-4:Data/Information ProtectionW ith the previous layers, we should have one more layer on our data. Have encryption, whenever possible.

1- Having all the security layers implemented on the corporate network helps

secure all the PCs in the network but ??

2- Data protection distinct to the following categories:

operating system security, sensitive data storage practices, and data encryption.

3- Operating system security

4- Sensitive data storage practices

5- Data encryption covers

Page 15: ME Information Security

Precautionary steps:1- Do not use any option that "remembers" your password so that you do not have to reenter it the next time you need it.2- Have all the laptops with latest windows OS installed with all encryption features enabled.3- Have different password for different accounts.4- Do not use same password for corporate network and public networks. (Hotmail.com, Yahoo mail etc.)5- Apply newly released operating system patches and application patches.

Page 16: ME Information Security

Insider Security Risk

• Minimize Rights• Enforce Access Controls• Monitor User Activity

Page 17: ME Information Security

Questions &

Answers

Page 18: ME Information Security

Thanks YouMohamed Monsef

Senior System and Network EngineerMEAI Region Team– National Oilwell Varco

[email protected]://eg.linkedin.com/in/mohamedmonsef