Security Strategies in Linux Platforms and Applications Lesson 2

24
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Security Strategies in Linux Platforms and Applications Lesson 2 Basic Components of Linux Security

description

Security Strategies in Linux Platforms and Applications Lesson 2 Basic Components of Linux Security. Learning Objective. Describe components of Linux security . Key Concepts. Understand boot loaders Security considerations while using kernel and user space components - PowerPoint PPT Presentation

Transcript of Security Strategies in Linux Platforms and Applications Lesson 2

Page 1: Security Strategies in Linux Platforms and Applications Lesson  2

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Security Strategies in Linux Platforms and Applications

Lesson 2Basic Components of Linux Security

Page 2: Security Strategies in Linux Platforms and Applications Lesson  2

Page 2Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Learning ObjectiveDescribe components of Linux security.

Page 3: Security Strategies in Linux Platforms and Applications Lesson  2

Page 3Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Key ConceptsUnderstand boot loadersSecurity considerations while using kernel

and user space componentsDiscretionary access control (DAC) and

access control lists (ACLs)Mandatory access control (MAC) with

Security Enhanced Linux (SELinux)Concepts of a packet filtering firewall

Page 4: Security Strategies in Linux Platforms and Applications Lesson  2

Page 4Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: CONCEPTS

Page 5: Security Strategies in Linux Platforms and Applications Lesson  2

Page 5Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Common Boot LoadersGrand Unified Bootloader (GRUB)Linux Loader (LILO)LoadlinUniversal Bootloader (U-Boot)

Page 6: Security Strategies in Linux Platforms and Applications Lesson  2

Page 6Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Configuration Options Comments

default=0 Is for default kernel to boot

timeout=0 Sets the timeout to zero

color green/blue Specifies the color for the GRUB screen

password – md5 <encrypted password>

Is for the encrypted password

splashimage=(hd0,0)/grub/splash.xpm.gz

Is for “splash” image that shows when you access the GRUB menu

GRUB Configuration Options

Page 7: Security Strategies in Linux Platforms and Applications Lesson  2

Page 7Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

The Linux Firewall

Hardware

Kernel Space

User Space

Location of iptables

Location of netfilter

User

Page 8: Security Strategies in Linux Platforms and Applications Lesson  2

Page 8Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Layered Security

Physical security

Firewall

Access control mechanisms

Encryption

Monitoring

Backups

Page 9: Security Strategies in Linux Platforms and Applications Lesson  2

Page 9Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: PROCESS

Page 10: Security Strategies in Linux Platforms and Applications Lesson  2

Page 10Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Common Linux Access Controls

MAC allows the file sharing service to interact with the shared filesystem.

DAC provides the required

permissions to access files.

The firewall allows user access based on the file service

port and user’s Internet Protocol

address.

Page 11: Security Strategies in Linux Platforms and Applications Lesson  2

Page 11Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: ROLES

Page 12: Security Strategies in Linux Platforms and Applications Lesson  2

Page 12Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Access Control Mechanisms

DAC Defines the access control for objects in the filesystem

ACLs Grants “special” permissions to users or groups for an

object in the filesystem that are not specified in the DAC permissions

MAC Adds additional categories to objects in the filesystem

Page 13: Security Strategies in Linux Platforms and Applications Lesson  2

Page 13Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: CONTEXTS

Page 14: Security Strategies in Linux Platforms and Applications Lesson  2

Page 14Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Kernel Space

Kernel space has access and can control all aspects of a Linux system

Loadable kernel modules (LKMs) are a common avenue for rootkits

Page 15: Security Strategies in Linux Platforms and Applications Lesson  2

Page 15Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

User Space

User space is the most likely avenue that black-hat hackers attempt to exploit the Linux system.

It is common for black-hat hackers to gain unauthorized access simply by guessing an easy password from a user account.

Page 16: Security Strategies in Linux Platforms and Applications Lesson  2

Page 16Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: RATIONALE

Page 17: Security Strategies in Linux Platforms and Applications Lesson  2

Page 17Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Importance of a FirewallFirewall on each host server provides an

additional layer of security: If the network perimeter firewall allows

unauthorized traffic into the network, firewall protects servers from the unauthorized traffic.

Firewall provides additional protection to host servers if a rogue program infects the local area network (LAN).

Page 18: Security Strategies in Linux Platforms and Applications Lesson  2

Page 18Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Importance of Securing Core ComponentsDefault settings, improper file permissions,

and insecure user accounts are common methods used by black-hat hackers to gain unauthorized access.

Best practices and compliance standards require basic security and can result in hefty fines, if not followed.

Page 19: Security Strategies in Linux Platforms and Applications Lesson  2

Page 19Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

SummaryUnderstand boot loadersThe process of Linux access controlAccess control mechanisms such as DAC,

ACLs, and MACConsiderations for using kernel space and

user space Importance of firewall and securing core

components

Page 20: Security Strategies in Linux Platforms and Applications Lesson  2

Page 20Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

OPTIONAL SLIDES

Page 21: Security Strategies in Linux Platforms and Applications Lesson  2

Page 21Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

A Linux Kernel Configuration Menu

Page 22: Security Strategies in Linux Platforms and Applications Lesson  2

Page 22Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Red Hat’s AuthenticationConfiguration Tool

Page 23: Security Strategies in Linux Platforms and Applications Lesson  2

Page 23Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

The Security Level Configuration Tool for Firewalls

Page 24: Security Strategies in Linux Platforms and Applications Lesson  2

Page 24Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

The SELinux Administration Tool