Security Strategies in Linux Platforms and Applications Lesson 5

26
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Security Strategies in Linux Platforms and Applications Lesson 5 Filesystems, Volumes, and Encryption

description

Security Strategies in Linux Platforms and Applications Lesson 5 Filesystems , Volumes, and Encryption. Learning Objective. Examine the flexibility of various options with file permissions and filesystem settings and how granular control isolates data access. Key Concepts. - PowerPoint PPT Presentation

Transcript of Security Strategies in Linux Platforms and Applications Lesson 5

Page 1: Security Strategies in Linux Platforms and Applications Lesson 5

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Security Strategies in Linux Platforms and Applications

Lesson 5Filesystems, Volumes, and Encryption

Page 2: Security Strategies in Linux Platforms and Applications Lesson 5

Page 2Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Learning ObjectiveExamine the flexibility of various options

with file permissions and filesystem settings and how granular control isolates data access.

Page 3: Security Strategies in Linux Platforms and Applications Lesson 5

Page 3Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Key ConceptsLinux filesystem hierarchy standard (FHS) Filesystem mounting options Remote filesystems Filesystem encryption Filesystem quotas

Page 4: Security Strategies in Linux Platforms and Applications Lesson 5

Page 4Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: CONCEPTS

Page 5: Security Strategies in Linux Platforms and Applications Lesson 5

Page 5Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

The Filesystem Hierarchy Standard What is it?What is the purpose?

Page 6: Security Strategies in Linux Platforms and Applications Lesson 5

Page 6Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Linux Partition Type Identifiers

Page 7: Security Strategies in Linux Platforms and Applications Lesson 5

Page 7Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Filesystem Encryption

Encryption adds another layer of security for data that is considered confidential.

Documents such as customer personal information, social security numbers, credit card information, and business plans can be encrypted.

There are many regulations and laws for protecting consumer's personal data.

Page 8: Security Strategies in Linux Platforms and Applications Lesson 5

Page 8Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Filesystem Encryption Techniques Kernel Space Disk encryption subsystem (dm_Crypt)

• Linux unified key setup (LUKS) Loop-Advanced Encryption Standard (AES) TrueCrypt Enterprise cryptographic filesystem (eCryptfs)

Page 9: Security Strategies in Linux Platforms and Applications Lesson 5

Page 9Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Filesystem Encryption Techniques (Continued)

User SpaceLUKSEncrypted File System (EncFS)

Page 10: Security Strategies in Linux Platforms and Applications Lesson 5

Page 10Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Pros and Cons of Filesystem Encryption

• Simple to implement• Transparent to the user• Difficult to hackPros

• All data in filesystem is encrypted, including data you don’t want encrypted

• Resizing the filesystem later is difficultCons

Page 11: Security Strategies in Linux Platforms and Applications Lesson 5

Page 11Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: PROCESS

Page 12: Security Strategies in Linux Platforms and Applications Lesson 5

Page 12Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Securing a Filesystem Using FHS

Format with an appropriate filesystem type.Confine to read-only if there is no need for

users to write or edit data.Restrict executing files in the /tmp/ directory.Encrypt directories that contain sensitive data.Consider using quotas.

Page 13: Security Strategies in Linux Platforms and Applications Lesson 5

Page 13Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Configuring Remote MountingData server with an Network File System (NFS) share

/share *.is418.local.(ro,all_squash)

/etc/exports file on data.is418.local

data.is418.local

data.is418.local:/share /data nfs defaults 0 0

Entry on each client server's /etc/fstab file

Web servers mount the share at boot

Page 14: Security Strategies in Linux Platforms and Applications Lesson 5

Page 14Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Enabling Quotas

Step 4

Turn quotas on using the command: quotaon /home

Step 3

Initialize the quota database using the command : quotacheck –cm /home

Step 2

Remount the home filesystem using the command : mount -o remount /home

Step 1

Configure filesystem to allow quotas in /etc/fstab using the command : /home ext4 defaults,usrquota 1 2

Page 15: Security Strategies in Linux Platforms and Applications Lesson 5

Page 15Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Editing a User Quota

Page 16: Security Strategies in Linux Platforms and Applications Lesson 5

Page 16Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Quota Grace Periods

Page 17: Security Strategies in Linux Platforms and Applications Lesson 5

Page 17Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: ROLES

Page 18: Security Strategies in Linux Platforms and Applications Lesson 5

Page 18Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Securing the Linux FilesystemLinux system administrator should:Use binaries placed in /sbin/ directory.Group files or create separate partitions for

directories such as /var/, /home/, and /tmp/. Isolate root account home directory from other

users that are typically located in /home/<suser>.

Page 19: Security Strategies in Linux Platforms and Applications Lesson 5

Page 19Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: CONTEXTS

Page 20: Security Strategies in Linux Platforms and Applications Lesson 5

Page 20Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

NFSUse the root_squash option to ensure

requests to filesystem are not given root privileges.

Use the all_squash option for read-only shares.

Use the showmount command to verify that the correct shares are exported or not exported to various clients.

Page 21: Security Strategies in Linux Platforms and Applications Lesson 5

Page 21Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Samba Is very flexible with its security settingsCan restrict access based on network or

host address Can restrict access and permissions to

share for a particular group or list of usersCan be used for workstation and mixed

environments with Windows operating system

Page 22: Security Strategies in Linux Platforms and Applications Lesson 5

Page 22Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

DISCOVER: RATIONALE

Page 23: Security Strategies in Linux Platforms and Applications Lesson 5

Page 23Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Linux FHS It helps users to locate data and files.Fedora, Ubuntu, and other Linux distributions

abide by the FHS. It would be difficult to work efficiently across

various Linux distributions if each distribution followed a completely different standard.

It helps administrators to systematically create and mount various partitions with desired options.

Page 24: Security Strategies in Linux Platforms and Applications Lesson 5

Page 24Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Filesystem Encryption Stolen or compromised customer data is

typically not encrypted. If any organization's confidential data is

compromised, it can have the following repercussions:• The organization’s image is damaged• The organization would be fined• The organization would incur extra cost for

fixing the problem later

Page 25: Security Strategies in Linux Platforms and Applications Lesson 5

Page 25Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Setting QuotasOnce a directory or a partition becomes 100%

full due to downloads, installs, archived data, and even personal music and movies, many processes stop working and can cause an operating system to be unavailable.

Enabling quotas for each user or group, or singling out a single user can prevent many problems.

Page 26: Security Strategies in Linux Platforms and Applications Lesson 5

Page 26Security Strategies in Linux Platforms and Applications© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.comAll rights reserved.

Summary Importance of FHSAdvantages and disadvantages of

filesystem encryptionProcess to use for securing a filesystem,

configuring remote mounting, and enabling quotas

Use of NFS and Samba in Linux