Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies...

42
1 Operations Security Ed Crowley

Transcript of Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies...

Page 1: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

1

Operations Security

Ed Crowley

Page 2: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

ISC2 Key Areas of Knowledge

Understand:

1. Need to know/least privilege

2. Separation of duties and responsibilities

3. Monitor special privileges (e.g. operators,

administrators)

4. Job rotation

5. Marking, handling, storing and destroying of

sensitive information

6. Record retention

2

Page 3: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

ISC2 Key Areas of Knowledge

Employ resource protection

1. Media management

2. Asset management

3. Personnel privacy and safety

Manage incident response

1. Detection

2. Response

3. Reporting

4. Recovery

5. Remediation

3

Page 4: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

ISC2 Key Areas of Knowledge

Prevent or respond to attacks (e.g., malicious

code, zero-day, exploit, denial of service)

Implement and support patch and

vulnerability management

Understand configuration management

concepts (e.g., versioning, baselining)

Understand fault tolerance requirements

4

Page 5: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

5

Topics

Scope

Function

Controls and Control Categories

Assurance

Covert Channels

Trusted Facility Management

Concepts

Configuration/Change Management

Record retention

Due Care and due diligence

Operational Controls

Monitoring and Auditing

Threats and vulnerabilities

Page 6: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

6

Operations Security Scope

Involves secure computer facility controls as

well as:

Hardware

Data media

Operator controls.

Including:

Controls and protections

Monitoring and Auditing

Threats and vulnerabilities

Page 7: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

7

Operations Security Function

Supplies appropriate countermeasures relative to operational risk. Risk based upon operational threats and vulnerabilities

Controls can be: Preventive

Detective

Corrective (Recovery)

Each control may have a particular attribute Administrative

Physical

Technical

Page 8: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

8

Goals of Operational Controls

Preventative

Lower amount and impact of errors

Prevent intruder access

Detective

After occurrence, detects error.

Corrective

Mitigates loss.

Page 9: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

9

Orange Book

Defines multiple secure computer operation assurance levels.

Assurance is a level of confidence that ensures:

A Trusted Computer Base’s (TCB) security policy has been correctly implemented

The system's security features have been accurately implemented

Assurance levels range from A to D (High to Low)

Page 10: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

10

Orange Book Assurance and TCB

Operational Assurance

Basic system features and architecture

Lifecycle Assurance

Controls and standards necessary for building and

maintaining system

Trusted Computing Base

The totality of protection mechanisms …,

including hardware, firmware, and software, the

combination of which is responsible for enforcing

a computer security policy.

Page 11: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

11

Operational Assurance Scope

System

Architecture

Integrity

Trusted facility management

Trusted recovery

Page 12: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

12

Life Cycle Assurance

Ensures that a TCB is designed, developed,

and maintained with a process that enforces

protections at each system life cycle stage.

Includes:

Security testing

Design specification and testing

Configuration management

Trusted distribution

Page 13: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

13

Operational Assurance Covert Channels

Covert Channel

An information path that is not normally within

a system and is therefore not protected by

the system’s normal security mechanisms.

Covert channel analysis

Covert storage conveys information by changing

stored data.

Covert Timing Channel conveys information by

altering the performance of or modifying the timing

of systems resources in measurable ways (B3

and A1)

Page 14: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

14

Orange Book on Covert Channels

B2

Protects against convert storage channels.

B3 and A1

Must protect against both:

Covert storage channels

Covert timing channels.

Page 15: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

15

Trusted Facility Management

Defined as the assignment of a specific individual to

administrate the security of a system.

Related to the concept of separation of duties.

B2 level

Requires separate operator and system administrator

roles.

B3 and A1

System security administrator’s functions clearly

identified.

Trusted Recovery required for B3 and A1 levels.

Page 16: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

16

Trusted Recovery

Ensures that a system crash or other system failure does not breach security. (Fails safe.)

Failure preparation Critical file back up – on a regular schedule.

System recovery options Rebooting system into a single user mode

Recovering all file systems that were active

Restoring any missing or damaged files and databases

Checking security critical files, such as the system password file.

Linux run levels Knoppix cheat codes Runlevel 2,5

Page 17: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

17

Administrative Controls

Designed to reduce the threat and/or impact

of computer security violations.

Personnel security

Employment Screening

Background checks

Page 18: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

18

Administrative Controls

Separation of duties assigns parts of tasks to different personnel.

Prevents any single person from compromising the system.

Least Privilege

System users should have the lowest level of rights and privileges necessary to perform their work.

Rights should be assigned for the shortest possible time.

Mandatory Vacations help prevent fraud.

Page 19: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

19

Administrative Controls

Two man control is where two persons review

and approve work of each other.

Dual control is where two people are needed

to complete a task.

Rotation of duties is a process limiting the

time an operator is assigned to perform a

specific security related task before being

moved to a different task with a different

security classification.

Page 20: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

20

Configuration/

Change Management Planful, documented, system change process.

Tracking

Identity, control, and audit changes

Documentation to reflect all changes

Change approval.

Goal

Ensure that system changes do not unintentionally diminish

security.

B2, B3, and A1, Requirement

Recommended for all systems

Page 21: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

Change Control Functions

Orderly manner and formalized testing

Users informed of changes

Analyze effects of changes

Reduce negative impact of changes

21

Page 22: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

22

Operations Job Titles

Computer Operator

Operations Analyst

Job Control Analyst

Production Scheduler

Production Control Analyst

Tape Librarian

Page 23: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

23

Operational Controls

Day to day procedures that protect computer

operations. Such as:

Resource protection

Hardware and Software controls

Privileged entity controls

Media controls

Physical access controls

Page 24: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

Media Resource Protection

Media Security Controls

Logging

Access Control

Proper Disposal

Medial Viability Controls

Marking

Handling

Storage

Physical Protection

24

Page 25: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

25

Media Viability Controls

Protected by physical controls.

Effective system recovery requires proper

media marking and labeling.

Proper handling and storage

Page 26: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

26

Record Retention

Management or regulatory stipulation that

may deal with legal, audit, or tax compliance

requirements, including:

How long do transactions and other types of

records need to be retained?

Page 27: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

27

Data Remanence

Without appropriate data removal procedures, sensitive information may be inadvertently disclosed. If the storage media is released into an uncontrolled

environment, disclosure may be possible.

Methods employed to safeguard against disclosure of sensitive information: Media destruction

Degaussing

Overwriting (Overwriting multiple times?)

Data encryption

Deleting files do not normally remove their information from the storage media

Page 28: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

28

Due Care and Due Diligence

Requires an organization to engage in good (relative to the organization’s industry) business practices.

Documentation

Security plans

Contingency plans

Risk analysis

Security policies and procedures

Regulatory compliance plans and documentation

Page 29: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

29

Resource Protection

Protect an organization's computing

resources and assets from loss or

compromise.

Page 30: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

30

Hardware Control Issues

Hardware Maintenance

Requires physical or logical system access.

Maintenance accounts

Rename default passwords

Diagnostic Port Control

If possible, block from external access

Hardware Physical Control

Page 31: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

31

Software Control Issues

Antivirus/malware management

Software testing

Software Utilities

Safe Software Storage

Backup controls

Page 32: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

32

Monitoring and Auditing

Primary monitoring goals: Problem:

Detection

Identification

Response

Resolution

Monitoring includes: Mechanisms

Tools

Techniques

which permit identification of security events that could impact computer operation.

Page 33: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

33

Monitoring Techniques

Baselining

System

Network

Clipping level

Predefined thresholds for the number of certain types of

errors that will be allowed before and activity is

considered suspicious.

Violation processing using clipping levels

Management by exception

Intrusion detection

Penetration testing (where warranted)

Page 34: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

34

Enterprise Evaluation and

Penetration Testing Attempts system access utilizing techniques available to

external intruders.

Depending on the contract, techniques can include:

Scanning, probing

Demon dialing

Sniffing

Dumpster Diving

Social Engineering

Buffer Overflows

Other …

Also various types of pen tests… (Black box, White

box…)

Page 35: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

35

Violation Analysis

Violation tracking, processing,and analysis

For violation tracking to be effective, first

clipping levels must be established.

Clipping level defined as a user activity baseline

that represents routine operations.

Profile based Anomaly Detection

Repetitive Mistakes

Individuals who exceed authority

Too many people with unrestricted access

Patterns indicating serious intrusion attempts

Page 36: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

36

Auditing

Monitoring is the foundation of operational

security controls.

Internal and External

Internal auditors usually have a broad mandate.

External auditors perform an independent audit of

an organization’s financial statements.

Page 37: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

37

Audit Trails

Audit (or transaction) trails enable a security

practitioner to trace a transaction’s history.

Transaction date/time

Who processed transaction?

At which terminal?

Various security events

Problem Management

Way to control the process of problem isolation

and problem resolution.

Page 38: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

38

Relevant Threats

Accidental Loss

Incurred unintentionally, may be due to: Lack of:

Operator training

Operator proficiency

Application malfunction.

Inappropriate Activities

Behavior that while not criminal, may be grounds for a job action or dismissal

Page 39: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

39

Illegal Computer Operations/

Intentional Attacks Eavesdropping

Fraud

Theft

Sabotage

External Attack

Page 40: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

40

Trend/Traffic Analysis

Analysis of data characteristics (message

length, message frequency, etc) and

transmission patterns (rather than any

knowledge of the actual information

transmitted) to infer useful information.

For example, volume of Pentagon pizza deliveries

increased immediately prior to the last invasion of

Iraq.

Page 41: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

41

IPL Vulnerabilities

Initial program load (IPL) presents very

specific system vulnerabilities whether the

system is a centralized mainframe type or a

distributed LAN type.

Operator can put machine into single user

mode (without security protections.).

Note IPL typically refers to mainframe

operations.

Page 42: Operations Securitycybersd.com/cissp/domains/Ops.pdf · Operations Security Function Supplies appropriate countermeasures relative to operational risk. Risk based upon operational

42

Questions?