Security Essentials for Desktop System Administrators.

76
Security Essentials for Desktop System Administrators

Transcript of Security Essentials for Desktop System Administrators.

Page 1: Security Essentials for Desktop System Administrators.

Security Essentials for Desktop System Administrators

Security Essentials for Desktop System Administrators

Page 2: Security Essentials for Desktop System Administrators.

Civilization Is Made Of People …Civilization Is Made Of People …

Civilization is Risk.-- Not Big Brother

Civilization is Risk.-- Not Big Brother

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 22

Page 3: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

New Technology Is Invented LargelyTo Overcome Previous "Advances"

New Technology Is Invented LargelyTo Overcome Previous "Advances"

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 33

Page 4: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 44

Page 5: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 55

Page 6: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 66

Page 7: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

Fields -> Trees -> Caves -> HousesFields -> Trees -> Caves -> Houses

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 77

Page 8: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 88

Page 9: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 99

Page 10: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

Houses -> Windows -> GlassHouses -> Windows -> Glass

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1010

Page 11: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1111

Page 12: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1212

Page 13: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

Glass -> Drapes -> Tents (in Fields!)Glass -> Drapes -> Tents (in Fields!)

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1313

Page 14: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1414

Page 15: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1515

Page 16: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

Fireplaces -> Microwaves -> Bean BurritosFireplaces -> Microwaves -> Bean Burritos

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1616

Page 17: Security Essentials for Desktop System Administrators.

Dave Barry On Civilization …Dave Barry On Civilization …

-> ->

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1717

Page 18: Security Essentials for Desktop System Administrators.

Computer Security …Computer Security …

Essentially A People ProblemEssentially A People Problem

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1818

Page 19: Security Essentials for Desktop System Administrators.

Internet

A Basic “People Problem”A Basic “People Problem”

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 1919

Privacy

Page 20: Security Essentials for Desktop System Administrators.

Internet

A Slightly More Precise ViewA Slightly More Precise View

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2020

Privacy

Blog Rants (tl;dr)

Page 21: Security Essentials for Desktop System Administrators.

Bruce SchneierBruce Schneier

Once the technology is in place, there willalways be the temptation to use it ...

(Secrets and Lies, 2000)

Once the technology is in place, there willalways be the temptation to use it ...

(Secrets and Lies, 2000)

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2121

Page 22: Security Essentials for Desktop System Administrators.

Technology

How Technology WorksHow Technology Works

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2222

SurprisingUses

Page 23: Security Essentials for Desktop System Administrators.

Surprising Technology UseSurprising Technology Use

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2323

Page 24: Security Essentials for Desktop System Administrators.

Surprising Technology Non-UseSurprising Technology Non-Use

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2424

Page 25: Security Essentials for Desktop System Administrators.

MUDFLAPSSO I HERD U LIEK THEM

MUDFLAPSSO I HERD U LIEK THEM

Surprising Technology UseSurprising Technology Use

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2525

Page 26: Security Essentials for Desktop System Administrators.

Technology

Technology And RiskTechnology And Risk

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2626

SurprisingUses

Page 27: Security Essentials for Desktop System Administrators.

Technology

Technology And RiskTechnology And Risk

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2727

SurprisingUses

MaliciousActivity*

* not to scale

Page 28: Security Essentials for Desktop System Administrators.

Bruce SchneierBruce Schneier

And it is poor civic hygiene to installtechnologies that could somedayfacilitate a police state.

And it is poor civic hygiene to installtechnologies that could somedayfacilitate a police state.

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2828

Page 29: Security Essentials for Desktop System Administrators.

xkcd …xkcd …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 2929

Page 30: Security Essentials for Desktop System Administrators.

… xkcd… xkcd

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3030

Page 31: Security Essentials for Desktop System Administrators.

Dealing With RiskDealing With Risk

Recognize | Reduce | RecoverRecognize | Reduce | Recover

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3131

Page 32: Security Essentials for Desktop System Administrators.

Dealing With RiskDealing With Risk

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3232

Page 33: Security Essentials for Desktop System Administrators.

Recognizing RisksRecognizing Risks

High BandwidthEnormous StoragePosh .gov Location

Nothing Marketable

High BandwidthEnormous StoragePosh .gov Location

Nothing Marketable

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3333

Page 34: Security Essentials for Desktop System Administrators.

Recognizing RisksRecognizing Risks

High BandwidthEnormous StoragePosh .gov Location

Nothing Marketable*

High BandwidthEnormous StoragePosh .gov Location

Nothing Marketable*

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3434

Page 35: Security Essentials for Desktop System Administrators.

Recognizing RisksRecognizing Risks

Caching warezSending SPAMSpreading malwareBeing/controlling botsCommitting/suffering DDoS attacks

Caching warezSending SPAMSpreading malwareBeing/controlling botsCommitting/suffering DDoS attacks

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3535

Page 36: Security Essentials for Desktop System Administrators.

Recognizing RisksRecognizing Risks

Destruction Of DataWaste Of BandwidthWaste Of TimeFrustration

Destruction Of DataWaste Of BandwidthWaste Of TimeFrustration

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3636

Page 37: Security Essentials for Desktop System Administrators.

Recognizing RisksRecognizing Risks

Default admin privsVisiting malicious sitesPromiscuous USB sharingLack of gruntlement

Default admin privsVisiting malicious sitesPromiscuous USB sharingLack of gruntlement

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3737

Page 38: Security Essentials for Desktop System Administrators.

Newer ThreatsNewer Threats

CarrierIQ / mobile device surveillanceQR Code attacksCarrierIQ / mobile device surveillanceQR Code attacks

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3838

Page 39: Security Essentials for Desktop System Administrators.

Newer ThreatsNewer Threats

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 3939

Page 40: Security Essentials for Desktop System Administrators.

Grace Hopper

Grace Hopper

Life was simple before World War II.After that we had systems.

Life was simple before World War II.After that we had systems.

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4040

Page 41: Security Essentials for Desktop System Administrators.

TLAs for TCB: ISM? DID!TLAs for TCB: ISM? DID!

Integrated Security Management (ISM)

Defense In Depth (DID)

Integrated Security Management (ISM)

Defense In Depth (DID)

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4141

Page 42: Security Essentials for Desktop System Administrators.

Reducing Risks: DIDReducing Risks: DID

Perimeter ControlsAuto-blockingMail virus scanningCentral Authentication (via LDAP/Kerberos)

Perimeter ControlsAuto-blockingMail virus scanningCentral Authentication (via LDAP/Kerberos)

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4242

Page 43: Security Essentials for Desktop System Administrators.

Reducing Risks: DIDReducing Risks: DID

Patch and configuration mgmtCritical VulnerabilitiesPrompt response via FCIRTIntelligent and informed usersGeneral and special enclaves

Patch and configuration mgmtCritical VulnerabilitiesPrompt response via FCIRTIntelligent and informed usersGeneral and special enclaves

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4343

Page 44: Security Essentials for Desktop System Administrators.

Recognizing Risks: ISMRecognizing Risks: ISM

Computer Security not an add-onNot “one size fits all”Largely common sense

Computer Security not an add-onNot “one size fits all”Largely common sense

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4444

Page 45: Security Essentials for Desktop System Administrators.

Reducing Risks: ISMReducing Risks: ISM

Primary passwords off the netSingle turn-off pointNo visible services without Strong AuthenticationLab systems scanned for compliance

Primary passwords off the netSingle turn-off pointNo visible services without Strong AuthenticationLab systems scanned for compliance

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4545

Page 46: Security Essentials for Desktop System Administrators.

Recovery: ISMRecovery: ISM

General Computer Security Coordinators (Listed at http://security.fnal.gov/ )Work with Computer Security TeamDisseminate informationDeal with incidents

General Computer Security Coordinators (Listed at http://security.fnal.gov/ )Work with Computer Security TeamDisseminate informationDeal with incidents

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4646

Page 47: Security Essentials for Desktop System Administrators.

What About Us Users?What About Us Users?

Malicious Surprises aboundUse reasonable cautionMalicious Surprises aboundUse reasonable caution

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4747

Page 48: Security Essentials for Desktop System Administrators.

Users: We Get MailUsers: We Get Mail

You haven’t won $10MDon’t open (most) attachmentsBest not to click links in mailDisable scripting for mail

You haven’t won $10MDon’t open (most) attachmentsBest not to click links in mailDisable scripting for mail

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4848

Page 49: Security Essentials for Desktop System Administrators.

Users: We Get MailUsers: We Get Mail

Can you trust the (so-called) sender?Can you trust the (so-called) sender?Received: from [123.28.41.241] (unknown [123.28.41.241]) by hepa1.fnal.gov (Postfix) with ESMTP id 808F76F247 for <[email protected]>; Thu, 01 Apr 2010 09:41:02 -0500 (CDT)From: Wayne E Baisley <[email protected]>To: Wayne E Baisley <[email protected]>

route: 123.28.32.0/19descr: VietNam Post and Telecom Corporation (VNPT)address: Lo IIA Lang Quoc te Thang Long, Cau Giay, Ha Noi

Can you trust the (so-called) sender?Can you trust the (so-called) sender?Received: from [123.28.41.241] (unknown [123.28.41.241]) by hepa1.fnal.gov (Postfix) with ESMTP id 808F76F247 for <[email protected]>; Thu, 01 Apr 2010 09:41:02 -0500 (CDT)From: Wayne E Baisley <[email protected]>To: Wayne E Baisley <[email protected]>

route: 123.28.32.0/19descr: VietNam Post and Telecom Corporation (VNPT)address: Lo IIA Lang Quoc te Thang Long, Cau Giay, Ha Noi

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 4949

Page 50: Security Essentials for Desktop System Administrators.

Users: Pass the WordUsers: Pass the Word

Use strong passwords Longer is betterUse different passwords Or variants, at least

Use strong passwords Longer is betterUse different passwords Or variants, at least

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5050

Page 51: Security Essentials for Desktop System Administrators.

Royko any social engineering attemptsRoyko any social engineering attempts

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5151

Page 52: Security Essentials for Desktop System Administrators.

Users: DataUsers: Data

Decide what data requires protectionHow to be recovered, if neededArrange backups with SysadminsOr do your own backupsOccasionally test retrieval

Decide what data requires protectionHow to be recovered, if neededArrange backups with SysadminsOr do your own backupsOccasionally test retrieval

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5252

Page 53: Security Essentials for Desktop System Administrators.

The Incidental ComputistThe Incidental Computist

Some non-Lab-business Surprising Use is allowed:

http://security.fnal.gov/ProperUse.htm (I prefer personal iPhone/iPad/Droid

via an external network …)

Some non-Lab-business Surprising Use is allowed:

http://security.fnal.gov/ProperUse.htm (I prefer personal iPhone/iPad/Droid

via an external network …)

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5353

Page 54: Security Essentials for Desktop System Administrators.

Activities to AvoidActivities to Avoid

Services like Skype and BitTorrentnot forbidden but very easy to misuse!Services like Skype and BitTorrentnot forbidden but very easy to misuse!

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5454

Page 55: Security Essentials for Desktop System Administrators.

Activities to AvoidActivities to Avoid

Anything that:Is illegalIs prohibited by Lab/DOE policyMay embarrass the LabInterferes with job performanceConsumes excessive resources

Anything that:Is illegalIs prohibited by Lab/DOE policyMay embarrass the LabInterferes with job performanceConsumes excessive resources

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5555

Page 56: Security Essentials for Desktop System Administrators.

Which Brings Us To SysadminsWhich Brings Us To Sysadmins

That wrench ain’t gonna swing itself.That wrench ain’t gonna swing itself.

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5656

Page 57: Security Essentials for Desktop System Administrators.

Sysadmins Get Risk-RoledSysadmins Get Risk-Roled

System manager for securityAssist and instruct users to do it rightVigilant observer of your systems (and sometimes users’) behavior

System manager for securityAssist and instruct users to do it rightVigilant observer of your systems (and sometimes users’) behavior

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5757

Page 58: Security Essentials for Desktop System Administrators.

NOISE, n.NOISE, n.

…The chief product and authenticatingsign of civilization.

Ambrose Bierce, The Devil’s Dictionary

…The chief product and authenticatingsign of civilization.

Ambrose Bierce, The Devil’s Dictionary

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5858

Page 59: Security Essentials for Desktop System Administrators.

Data PrivacyData Privacy

Generally, Fermilab respects privacyYou are required to do likewiseSpecial cases for Sysadmins during Security IncidentsOthers must have Directorate approval

Generally, Fermilab respects privacyYou are required to do likewiseSpecial cases for Sysadmins during Security IncidentsOthers must have Directorate approval

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 5959

Page 60: Security Essentials for Desktop System Administrators.

Privacy of Email and FilesPrivacy of Email and Files

May not use information in anotherperson’s files seen incidental to anyactivity (legitimate or not) for any

purpose w/o explicit permission of theowner or “reasonable belief the file

was meant to be accessed by others.”

May not use information in anotherperson’s files seen incidental to anyactivity (legitimate or not) for any

purpose w/o explicit permission of theowner or “reasonable belief the file

was meant to be accessed by others.”

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6060

Page 61: Security Essentials for Desktop System Administrators.

Offensive MaterialsOffensive Materials

Material on computer ≈ Material on deskA line management concernNot a computer security issue per se

Material on computer ≈ Material on deskA line management concernNot a computer security issue per se

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6161

Page 62: Security Essentials for Desktop System Administrators.

Software LicensingSoftware Licensing

Fermilab is strongly committed torespecting intellectual property rights.Use of unlicensed commercial software

is a direct violation of lab policy.

Fermilab is strongly committed torespecting intellectual property rights.Use of unlicensed commercial software

is a direct violation of lab policy.

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6262

Page 63: Security Essentials for Desktop System Administrators.

Patch/Configuration ManagementPatch/Configuration Management

Baselines: Linux, Mac, WindowsAll systems must meet their baselineAll systems must be regularly patchedNon-essential services offWindows, especially, must run AV

Baselines: Linux, Mac, WindowsAll systems must meet their baselineAll systems must be regularly patchedNon-essential services offWindows, especially, must run AV

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6363

Page 64: Security Essentials for Desktop System Administrators.

Patch/Configuration ManagementPatch/Configuration Management

Exceptions/Exemptions: Documented case why OS is “stuck” Patch and manage as securely

Exceptions/Exemptions: Documented case why OS is “stuck” Patch and manage as securely

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6464

Page 65: Security Essentials for Desktop System Administrators.

Critical VulnerabilitiesCritical Vulnerabilities

Active exploits declared criticalPose a clear and present dangerMust patch by a given date or be blockedHandled via TIssue events

Active exploits declared criticalPose a clear and present dangerMust patch by a given date or be blockedHandled via TIssue events

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6565

Page 66: Security Essentials for Desktop System Administrators.

Computer Security IncidentsComputer Security Incidents

Report suspicious events to x2345 or [email protected] FCIRT instructions during incidentsKeep infected machines off the networkPreserve system for expert investigationNot to be discussed!

Report suspicious events to x2345 or [email protected] FCIRT instructions during incidentsKeep infected machines off the networkPreserve system for expert investigationNot to be discussed!

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6666

Page 67: Security Essentials for Desktop System Administrators.

FCIRTFCIRT

Triage initial reportsCoordinate investigationWork with local Sysadmins, expertsMay take control of affected systemsMaintain confidentiality

Triage initial reportsCoordinate investigationWork with local Sysadmins, expertsMay take control of affected systemsMaintain confidentiality

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6767

Page 68: Security Essentials for Desktop System Administrators.

Mandatory Sysadmin RegistrationMandatory Sysadmin Registration

All Sysadmins must be registeredPrimary Sysadmin is responsible for configuring and patchinghttp://security.fnal.gov -> “Verify your node registration”

All Sysadmins must be registeredPrimary Sysadmin is responsible for configuring and patchinghttp://security.fnal.gov -> “Verify your node registration”

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6868

Page 69: Security Essentials for Desktop System Administrators.

Do Not Want: Prohibited ActivitiesDo Not Want: Prohibited Activities

Blatant disregard of computer securityUnauthorized or malicious actionsUnethical behaviorRestricted central servicesSecurity & cracker toolshttp://security.fnal.gov/policies/cpolicy.html

Blatant disregard of computer securityUnauthorized or malicious actionsUnethical behaviorRestricted central servicesSecurity & cracker toolshttp://security.fnal.gov/policies/cpolicy.html

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 6969

Page 70: Security Essentials for Desktop System Administrators.

We Want To Avoid This …We Want To Avoid This …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 7070

Page 71: Security Essentials for Desktop System Administrators.

Role of SysadminsRole of Sysadmins

Manage your systems sensibly, securelyServices comply with Strong Auth rulesReport potential incidents to FCIRTAct on relevant bulletinsKeep your eyes open

Manage your systems sensibly, securelyServices comply with Strong Auth rulesReport potential incidents to FCIRTAct on relevant bulletinsKeep your eyes open

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 7171

Page 72: Security Essentials for Desktop System Administrators.

We Can Do It …We Can Do It …

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 7272

Page 73: Security Essentials for Desktop System Administrators.

We Can Do It. Statistically.We Can Do It. Statistically.

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 7373

Page 74: Security Essentials for Desktop System Administrators.

Questions?Questions?

[email protected] questions about security policy

[email protected] reporting security incidents

http://security.fnal.gov/

[email protected] questions about security policy

[email protected] reporting security incidents

http://security.fnal.gov/

December 8, 2011December 8, 2011 Security Essentials for Desktop System AdministratorsSecurity Essentials for Desktop System Administrators 7474

Page 75: Security Essentials for Desktop System Administrators.

Security Essentials for Desktop System Administrators

Security Essentials for Desktop System Administrators

Page 76: Security Essentials for Desktop System Administrators.

Security Essentials for Desktop System Administrators

Security Essentials for Desktop System Administrators