Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Security. ©2005 Microsoft 2 Security Jason Trump, Education Solutions Specialist.
-
date post
22-Dec-2015 -
Category
Documents
-
view
214 -
download
0
Transcript of Security. ©2005 Microsoft 2 Security Jason Trump, Education Solutions Specialist.
©2005 Microsoft2
SecuritySecurityJason Trump, Education Solutions SpecialistJason Trump, Education Solutions Specialist
©2005 Microsoft3
“Give us better access control”“Give us better access control”
“Simplify critical
maintenance”
“Simplify critical
maintenance”
“Reduce impact of malware”
“Reduce impact of malware”
Advanced Updating
Expanded Authentication, Authorisation, Access Control
Isolation and Resiliency
“Provide betterguidance”
“Provide betterguidance”
Security Guidance, Tools, Responsiveness
“Develop reliable and secure software”
“Develop reliable and secure software”
Engineering Excellence
You’ve Told Us
©2005 Microsoft5
Technology Innovation
• Updating
• Isolation
• Authorisation and access control
• Better protection from Internet-enabled social engineering
©2005 Microsoft7
Security toolsMicrosoft Baseline Security AnalyzerSecurity Bulletin Search Tool
Guidance and trainingSecurity Guidance CenterE-Learning Clinics
Community engagementNewslettersWebcasts and chats
Security Guidance and Training
©2005 Microsoft9
One update experience
Delta updating for 30-80% smaller update packages
Better quality updatesRollback capability for all updatesBroader pre-release testing
10-30% fewer reboots
Reduce Complexity
Reduce Size
Reduce Risk
Reduce Downtime
Improvements to Patching
More Information Scheduled release cycle, wherever possibleSecurity bulletin advanced notification
©2005 Microsoft10
Windows, SQL,Windows, SQL,Exchange, Office…Exchange, Office…
Windows, SQL,Windows, SQL,Exchange, Office…Exchange, Office…
Office Update
Download Center
SUSSUS SMSSMS
VS Update
Windows Update
Windows onlyWindows only
Windows onlyWindows only
Windows, SQL,Windows, SQL,Exchange, Exchange, Office…Office…
©2005 Microsoft11
Solution for ‘simple’ update management in organisations Assesses, controls, and automates deployment of Microsoft software
updates
Administrator experience optimised for ‘IT Generalist’
Next version of Software Update Services (SUS) 1.0
Core update management infrastructure in Windows Enables SMS, MBSA, and other Microsoft and 3rd party software to
leverage unified infrastructure
Single update analysis engine for supported Microsoft software
Data model & deployment infrastructure for update mgmt
Client and Server APIs to extend / leverage the infrastructure
RTW component of Windows Server Free to Windows Server (2000 and above) licensees
Requires Windows Server / Core CAL for target systems
Windows Server Update Services
Perfect solution for schools and small campuses
©2005 Microsoft12Administrator subscribes to update categories
< Back Finish Cancel
Windows Update ServicesWindows Update Services
Server downloads updates from Microsoft UpdateClients register themselves with the serverAdministrator puts clients in different target groupsAdministrator approves updatesClients install administrator approved updates
< Back Finish Cancel
Windows Update ServicesWindows Update Services
Microsoft Update
WSUS Server
Desktop ClientsTarget Group 1 Server
ClientsTarget Group 2
WSUS Administrator
WSUS: How It Works
©2005 Microsoft13
Supported Applications Windows Update
Microsoft Update
Windows (2000 SP3+, XP+, WS2003)
Office (XP & 2003)
SQL Server 2000, MSDE 2000
Exchange 2003
Additional products over time
SUS 1.0 synchronises with Windows Update
WSUS synchronises with Microsoft Update
Both services built on customised version of Windows Server Update Services
Updating Services
©2005 Microsoft14
Resilient and transparent BITS* for client-server and server-server downloads Downloads are in the background
Minimised data downloads Update subscriptions (per product/classification) Support for “delta compression” technologies for client-
server communications Option to only download approved updates
*Background Intelligent Transfer Service
Optimised Network Use
©2005 Microsoft15
Standard consolidated reports (for client activity) Per machine/per update/per target group Download, install success & failures with error information
Content synchronisation status reports What’s new, what changed
Aggregate reports for multiple servers Summary event roll-up to parent server
Event log integration Client and server status events sent to local event log
WSUS Reporting Features
©2005 Microsoft16
Server deployment Options Updates hosted on Microsoft Update
- WSUS server acts as a control point
Hierarchical deploymentIndependent servers (admin wishes not inherited)
Manageability (and extensibility) .NET based Server APIs (for admin tasks) COM based Client APIs (with scripting & remoting support) Automatic deployment of updates Command line options to trigger update detection
WSUS Deployment Flexibility
©2005 Microsoft17
*Partially addressed through polling frequency control and scripts
Top Features Requested SUS 1.0 SP1 WSUS
Support for service packs Install on SBS and domain controller Support for Office and other MS products Support additional update content types Update uninstall Update targeting Improve support for low bandwidth networks
Reduce amount of data that needs to be downloaded Set polling frequency for downloading new updates Minimise need for end user interruption Emergency patch deployment (‘big red button’) *
Deploy update for ISV and custom apps
NT4 support
WSUS: Feedback Requests
©2005 Microsoft18
Capability Microsoft Update WSUS SMS 2003
Supported Software and Content
Supported Software for Content
Same as Windows Update Services + WinXP Home
Win2K, WS2003, WinXP Pro, Office 2003, Office XP, Exchange 2003, SQL Server 2000, MSDE
Same as Windows Update Services + NT 4.0 & Win98* + can update any other Windows based software
Supported Content Types for Supported Software
All software updates, critical driver updates, service packs (SPs), and feature packs (FPs)
All software updates, critical driver updates, SPs, & FPs
All updates, SPs, & FPs + supports update & app installs for any Windows based software
Update Management Capabilities
Targeting Content to Systems
N/A Simple Advanced
Network Bandwidth Optimisation
Yes Yes Yes
Patch Distribution Control N/A Simple Advanced
Patch Installation & Scheduling Flexibility
Manual & end user controlled Simple Advanced
Patch Installation Status Reporting
Install errors reported to user Simple Advanced
Deployment Planning N/A Simple Advanced
Inventory Management N/A No Yes
Compliance Checking N/A No – status reporting only Advanced
*MBSA does not support scanning Win98 – Win98 can be updated using SMS2003 inventory management and software distribution capabilities
Comparing the Patching Options
©2005 Microsoft20
Windows XP Service Pack 2Windows Server 2003 Service Pack 1Microsoft Windows AntiSpywareSoftware Restriction PoliciesFuture: Network Access Protection
Host Isolation
©2005 Microsoft21
ISA Server 2004 Exchange ServerSybari Antigen
LabUnmanaged guest
Perimeter Isolation
©2005 Microsoft22
Quarantine Scenarios
Access From Home
Student Laptops
Guests
PrivatePC’s
Health Checkup IT checks “health” of client - patch
level, AV, other scriptable checks
Network Access Control Access/No Access
Health Maintenance Quarantined clients
given access to
patch
Can’t protect against malicious users
©2005 Microsoft23
Network Access Protection
The Network Access Protection system provides three distinct functionalities:
Network Policy Validation – is your system healthy? Network Isolation – if you’re not healthy, you’re out! Network Policy Compliance - if you’re not healthy,
we’ll help you get there.
©2005 Microsoft24
Quarantine Scenario
Accessing the networkX
DHCP
Remediation Server
IAS
May I have a DHCP address?
Here you go.
HCS
May I have a health certificate? Here’s my SoH. Client ok?
No. Needs fix-up.You don’t get a health certificate.Go fix up. I need updates.
Here you go.
Yes. Issue health certificate.
Here’s your health certificate.
Client
QuarantineRing
BoundaryRing
ProtectedRing
©2005 Microsoft26
User Education & Enablement
www.microsoft.com/spam
Industry Associations
• Standards and policy
Govt Partnerships• Strong laws• Enforcement
eMail usereMail user
Prevention Agents• Attack detection • Sender
reputation • Outbound
filtering
Proof: Identity & Evidence• Sender ID• Computational Proofs• Certificates, Digital
Signatures• Sender Safelists
Protection Filters• SmartScreen• At gateway,
server and desktop
• Update services
Microsoft’s SPAM Approach
©2005 Microsoft27
Outlook 2003 Enhancements
User specified Safe & Blocked Senders lists Safe Senders, Safe Recipients, Blocked Senders Can optionally include Contacts and GAL
User Lists shared by Outlook 2003 and Exchange 2003 OWA, stored on the server
Move to junk folder determined by: Exchange 2003 Mailbox Store based on user lists Per message SCL Client Side based on Microsoft SmartScreen Technology
Block all external content by default (Web beacons)
©2005 Microsoft28
Leverage SmartScreen Technology
Extension to Exchange 2003 Server, deployed on Internet Bridgeheads
Leverages the ISV infrastructure
Coexistence with 3rd party solutions
Supports per Message tagging
Administration via Exchange System Manager Console extension
Update Service
http://www.microsoft.com/exchange/imf
Intelligent Message Filter
©2005 Microsoft29
Gateway Server Transport
Mailbox ServerStore
JunkMail
Folder
JunkMail
Folder
Inbox
SCL = Spam Confidence Level
Spam?
UserSafe & Junk
Senders
Exchange IMF
ISV Solutions
Allow/Deny Lists
Real-Time Block Lists
Recipient & Sender Filtering
Message + SCL
Spam?
UserSafe & Junk
Senders
Inbox
UserSafe & Junk
Senders
SMTP Message
Exchange and Outlook Measures
©2005 Microsoft31
802.11b Security Concerns
WEPUnique key required across enterprise802.11b standard is only 40-bit
128-bit is proprietary
WEP keys are not dynamically changed and therefore vulnerable to attack
Using a PC-based tool and 802.11b antenna, a 128-bit WEP key can be hacked within two hours, and a 40-bit key within 40 minutes
Difficult to change or administer
©2005 Microsoft32
802.11b Security Concerns
Media Access Control (MAC) address filteringNot scalable
Exception list must be administrated and propagated to all APs
The list may have a size limit
MAC address must be associated to a user nameUser could neglect to report a lost or stolen cardUser could change the MAC address
©2005 Microsoft33
The 802.1X Solution
1. Client network access (link layer) is controlled by the AP based on domain user and/or machine account authentication
2. Authentication process is secured via standard Public Key Infrastructure (PKI) protocols available in Windows
Extensible authentication protocol over LAN (EAPoL) Transport Layer Security (TLS) Public / private keys, X.509 Certificates
3. Client user and computers negotiate authentication against Internet Authentication Server (IAS).
IAS proxies authentication requests to Active Directory and Certificate Authority
IAS is the Microsoft implementation of the IETF Remote Authentication Dial-In User Service (RADIUS) standard
4. WEP keys are dynamic They are changed with each new connection session, when roaming, or
within a preset time interval
©2005 Microsoft35
Global SpyNet™ community helps identify new spyware
Automatic signature downloads keep you up-to-date
Spyware removal reduces PC slow down, pop-up ads, and more
Scheduled scans help maintain PC security and privacy
Continuous protection guards 50+ ways spyware gets on a PC
Intelligent alerts handle spyware based on your preferences
Detect & Remove Spyware
Helps protect Windows users from spyware and other potentially unwanted software
©2005 Microsoft36
Detect & Remove Viruses
• Layered defence strategy
• Integration with infrastructure
• Reduces the window of vulnerability
• Ability to monitor, control and manage how viruses are scanned within the network
• Maximal protection with minimal performance impact
©2005 Microsoft37
Internet Explorer 7.0
Builds on positive response to IE 6.0 with SP2
Stronger defense against phishing, malware and spyware
Maintains extensibility and compatibility
Beta version available mid-2005
©2005 Microsoft40
Using a layered approach:Increases an attacker’s risk of detection Reduces an attacker’s chance of success
Security policies, procedures, and educationPolicies, procedures, and awarenessPolicies, procedures, and awareness
Guards, locks, tracking devicesPhysical securityPhysical security
Application hardeningApplication
OS hardening, authentication, update management, antivirus updates, auditing
Host
Network segments, IPSec, NIDSInternal network
Firewalls, boarder routers, VPNs with quarantine proceduresPerimeter
Strong passwords, ACLs, encryption, EFS, backup and restore strategy
Data
Strategy: Defence in Depth
©2005 Microsoft41
Microsoft Baseline Security Analyzer (MBSA) v1.2Virus Cleaner ToolsSystems Management Server (SMS) 2003Software Update Services (SUS) SP1Internet Security and Acceleration (ISA) Server 2004 Standard EditionWindows XP Service Pack 2
Patching Technology Improvements (MSI 3.0)Systems Management Server 2003 SP1Microsoft Operations Manager 2005Windows malicious software removal tool
Windows Server 2003 Service Pack 1Windows Update Services ISA Server 2004 Enterprise EditionWindows Rights Management Services SP1Windows AntiSpywareSystem Center 2005Windows Server 2003 “R2”Visual Studio 2005
Vulnerability Assessment and Vulnerability Assessment and RemediationRemediationActive Protection Technologies Active Protection Technologies AntivirusAntivirus
PriorPrior
H2 04H2 04
FutureFuture
20052005
Security Timeline
©2005 Microsoft42
Microsoft Security Website http://www.microsoft.com/security
Windows Server Update Services (WSUS) http://www.microsoft.com/windowsserversystem/updateservices/
Network Access Protection (Network Quarantine) http://www.microsoft.com/nap
Security Tools on Technet http://www.microsoft.com/technet/Security/tools
Anti-SPAM using Exchange http://www.microsoft.com/exchange/imf
How Microsoft IT Secures Microsoft http://www.microsoft.com/technet/itsolutions/msit
E-Learning Clinics https://www.microsoftelearning.com/security
Events and Webcasts http://www.microsoft.com/seminar/events/security.mspx
Patch Management http://www.microsoft.com/technet/security/topics/patchmanagement.mspx
Anti-Spyware http://www.microsoft.com/athome/security/spyware/software/default.mspx
Microsoft Baseline Security Analyser http://www.microsoft.com/technet/security/tools/mbsahome.mspx
Further Information