Security for Broadcast IT Systems William Dixon, V6 Security, Inc. PBS ACE Security Lead April 14, 2005 Agenda > > > > > > Changes in Broadcast IT environment Security Risk Assessment Threat Modeling Sources of Security Guidance Recommendations for Broadcast IT vendors Recommendations for PBS Stations > Note: Content Microsoft focused, but generally applicable Changes in New Broadcast IT Environment > Newer technology offers more functionality for same or less cost > > > > > > > Digital media, electronic files Using general purpose computers Client-server models for computing Software-based integration of systems TCP/IP network component communication Internet connected Lights-out remote management & operation > Still use physical security for facility and equipment > Still trust your people Microsoft Recommended Practice for Security Risk Assessment > Microsoft Security Risk Management Process – 15oct04 > http://www.microsoft.com/technet/security/topics /policiesandprocedures/secrisk/default.mspx > New MS Press Book: Threat Modeling http://www.microsoft.com/mspress/books/6892.asp > Threat Modeling for Developers http://msdn.microsoft.com/library/default.asp?url=/li brary/en-us/secmod/html/secmod76.asp Microsoft Recommended Practice: Threat Modeling > Analyze and document architecture > Objects: Assets, Applications, Data, People > Document Security Profile > Trust boundaries > Data Flow & communications > Entry points > Privileged operations Document Security Profile > > > > > > > > > > Input Validation Authentication Authorization Configuration Management Sensitive Data Session Management Cryptography Parameter manipulation Exception management Auditing and Logging Microsoft Recommended Practice: Threat Modeling > Identify & rank threats with S.T.R.I.D.E.(S) analysis > > > > > > > Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege (S)ocial Engineering > Example: Denial of Service possible due to blank admin passwords Microsoft Recommended Practice: Threat Modeling > Use attack trees to identify how top level attack goal is composed of more detailed goals > Use attack patterns to help identify techniques for detailed goals Attack Tree Example 5.3. Gain privileged access to ACME Web server AND 1. Identify ACME domain name 2. Identify ACME firewall IP address OR 1. Interrogate domain name server 2. Scan for firewall identification 3. Trace route through firewall to Web server 3. Determine ACME firewall access control (* see attack pattern) OR 1. Search for specific default listening ports 2. Scan ports broadly for any listening port 4. Identify ACME Web server operating system and type OR 1. Scan OS services’ banners for OS identification 2. Probe TCP/IP stack for OS characteristic information 5. Exploit ACME Web server vulnerabilities OR 1. Access sensitive shared intranet resources directly 2. Access sensitive data from privileged account > Source: Moore et al. http://www.cert.org/archive/pdf/01tn001.pdf Attack Pattern Example Goal: Identify firewall access controls Precondition: Attacker knows firewall IP address Attack Techniques: OR 1. Search for specific default listening ports 2. Scan ports broadly for any listening ports 3. Scan ports stealthily for listening ports OR 1. Randomize target of scan 2. Randomize source of scan 3. Scan without touching target host Postcondition: Attacker knows firewall access controls Source: Moore et al. http://www.cert.org/archive/pdf/01tn001.pdf Attack Pattern Example Attack goals: Command or code execution Required conditions: Weak input validation Code from the attacker has sufficient privileges on the server Attack techniques: 1. Identify program on target system with an input validation vulnerability 2. Create code to inject and run using the security context of the target application. 3. Construct input value to insert code into the address space of the target application and force a stack corruption that causes application execution to jump to the injected code. Attack results: Code from the attacker runs and performs malicious action Source: http://msdn.microsoft.com/library/default.asp?url=/library/enus/secmod/html/secmod76.asp Microsoft Recommended Practice: Threat Modeling > Evaluate Risk with D.R.E.A.D. > Damage Potential ($$ cost estimate) > Reproducibility (% probability as 1-10) > Exploitability (% probability as 1-10) > Affected Users (% users as 1-10) > Discoverability (% probability 1-10) > Rank Risks = Probability * Damage Potential > Risk Rating scheme: High, Medium, Low Document Threats > Threat Description > Attacker obtains authentication credentials by monitoring the network > Threat target > Web application user authentication process > Risk rating > High (based on DREAD ranking) > Attack techniques > Use of commonly available network monitoring software > Countermeasures > Use SSL, IPsec end-to-end, or VPN to provide stronger authentication, or encrypted channel through which weaker authentication methods are used (e.g. HTTP Basic, Digest) Conduct Decision Support > > > > > > Define Functional Requirements Identify Control Solutions Review Solution Against Requirements Estimate Risk Reduction Estimate Solution Cost Select Risk Mitigation Strategy Free Microsoft Security Training > https://www.microsoftelearning.com/security/ > Free Security Courses - Updates for XP SP2 and Win2k3 SP1 soon. > Login w/.NET Passport ID, provide email address > Click on link provided in email > 180-day subscription activated > Clinic 2801: Microsoft® Security Guidance Training I > Clinic 2802: Microsoft® Security Guidance Training II > Clinic 2806: Microsoft® Security Guidance Training for Developers > Hands-On Lab 2811: Applying Microsoft® Security Guidance Training > Choose Content tab. Watch each section, or download offline player and course for offline viewing Microsoft Security Guidance > Microsoft.com/security - guidance for Home, Small Business, IT Pro, Developer > Technet Security Centers for many products http://www.microsoft.com/technet/Security/prodtech/defau lt.mspx > Microsoft Security Guides for Win2k, XP and Server 2003 > Expect problems if applying “high security” templates > Enterprise client template should not cause too many problems > Threats and Countermeasures Guide > Details on threats and each security setting Microsoft Security Guidance > KB 885409 “Security configuration guidance support” - 9nov04 > Discusses problems with particular settings that break applications or Windows services > If you use 3rd party templates, contact them for support > KB 891597 “How to apply more restrictive security settings on a Windows Server 2003based cluster server” – 18feb05 > Provides discussion & new security template tested for clusters FCC Security Guidance > FCC Media Security And Reliability Council > http://www.mediasecurity.org/msrcmeetings/index.html > Note: Communications Infrastructure Security, Access and Restoration Committee > Best Practice Recommendations > FCC Network Reliability and Interop Council > http://www.nric.org/fg/index.html > Note: Homeland Security Cybersecurity focus group > Best Practice Recommendations IT Best Practices: NIST > US Government Natl Institute of Standards & Technology (NIST) > Cybersecurity R&D Act directed NIST to develop checklists and Security Technical Implementation Guides (STIG) > Operates Computer Security Resource Center (CSRC) http://csrc.nist.gov/itsec/ > NOTE: Windows XP Security Guide 800-68 published Jun04 > Important because it is a collaboration of NIST, Microsoft, CIS, DISA and NSA Recent NIST CSRC Guides: DISA > > > > > > > > > > Application Security Checklist Desktop Application STIG Desktop Application Security Checklist v1r1.7 Macintosh OS-X STIG v1r1 UNIX Security Checklist Web Server Security Checklist Version 4, Release Windows 2000 Security Checklist Windows NT Security Checklist Windows XP Security Checklist Windows 2003 Addendum Version 4, Release 0.0 DISA 2/17/05 DISA 2/14/05 DISA 2/17/05 DISA 11/24/04 DISA 2/17/05 1.4 DISA 2/17/05 DISA 2/17/05 DISA 2/17/05 DISA 2/17/05 DISA 2/17/05 IT Best Practices: NSA > OS Security guides for Windows 2000, Windows XP > None for Windows Server 2003 – Use Microsoft’s “The "High" security settings in Microsoft's "Windows Server 2003 Security Guide" track closely with the security level historically represented in the NSA guidelines. It is our belief that this guide establishes the latest best practices for securing the product and recommend that traditional customers of our security recommendations use the Microsoft guide when securing Windows Server 2003” > Microsoft .NET Framework Security Guide (Oct 04) > Microsoft Office XP/2003 Executable Content Security Risks and Countermeasures Guide (Oct 04) > Apple Mac OS Security Configuration Guide > Linux Security Configuration Guide > Solaris Security Configuration Guide > Online at: http://www.nsa.gov/snac/index.cfm?MenuID=scg10.3.1 Call to Action for Broadcast IT Vendors > Use current, commercially supported platforms > Red Hat Enterprise Linux 3.0 > Windows XP Pro or Embedded version > Windows Server 2003 or Embedded version > Plan on testing patch updates within 7 days of patch availability > Plan to test on beta or release candidates of service packs > Write applications as a background process/service, not a user application Call to Action for Broadcast IT Vendors > Review & improve security of products > Analyze security – attack surface, threat model for your product > Document security profile for customers > Practice secure design & implementation > Writing Secure Code 2nd Edition, Michael Howard, David LeBlanc > Require authentication for all network access > Strong protection for passwords in network traffic > Evaluate/adopt a baseline security for standard product release > Apply OS hardening, minimize services > Use system security vulnerability assessment tools (e.g. MBSA) > Use secure remote administration connections > > > > Admin level access protected to higher degree Every packet signed & encrypted 2-factor auth capable protocols where possible Use SSL/TLS, SSH, PPTP/L2TP/IPsec VPN, Windows Terminal Services > Change embedded passwords during installation/setup, at least per site Call to Action for PBS Member Stations > Understand that internal systems might be infected via TCP/IP network connections > Must secure internal, external clients and servers > Secure external communications > IPsec or VPN tunnel for all access into secure area > > > > > > > > Use strong passwords ! Protect passwords from theft ! Prevent laptops from directly connecting inside secure area Very careful & trained configuration and change control of core security devices (e.g. firewall, VPN server) Request security information from vendors Try Microsoft Security Risk Management Process Designate someone to learn security administration Train users & operators for security awareness Backup & Details Windows Client Security Summary > > > > > > > Member of an Active Directory domain - for better management through Group Policy User not administrator if possible, uses strong password Automatic updates enabled - either through Windows Update, Update Services or Systems Management Server (SMS) Anti-virus - set for autoupdate of definitions daily and periodic full scans Anti-spyware - set for autoupdate of definitions and periodic full scans Windows Firewall on - exceptions disabled by default Enterprise client security template applied for hardening (update with new XP SP2 settings) > > > > > Additional settings & administrative template settings should be developed Software restriction policies should be configured > NTFS and Encrypting File System used to protect confidential data after theft Centralized monitoring with MACS, MOM, SMS, Systems Center or 3rd party System backup - Automatic System Restore enabled in XP, full disk remote backup, remote backups daily for user data Domain startup script run to check status of these daily or weekly > http://www.microsoft.com/technet/security/prodtech/windowsxp/secwinxp/default.mspx Additional Microsoft Security Help > Technet IT Pro Security Community Page > http://www.microsoft.com/technet/community/en-us/security/default.mspx > Lots of news groups > MS IT Security Papers > http://www.microsoft.com/technet/itsolutions/msit/default.mspx#EDBAAA > PSS Support Webcasts > TCP/IP port and process auditing: Tuesday, December 14, 2004 > TechNet Support WebCast: How to isolate servers and applications, March 22 2005 10am Pacific > See http://support.microsoft.com/pwebcasts Windows Server SP1 Released > Top reasons to use SP1: > Reduced attack surface – higher default security for RPCs and DCOM > New Security Configuration Wizard (SCW)- whitepapers coming soon > More secure new installations by Post-Setup Security Update to block incoming traffic while and until latest patches are installed > Windows Firewall replaces Internet Connection Firewall > Group policy for Windows Firewall added in Active Directory > RRAS VPN Server Quarantine capabilities, see http://www.microsoft.com/vpn > IIS 6.0 auditing for XML configuration metabase > Additional IE hardening > http://www.microsoft.com/technet/prodtechnol/windowsserver2003/ser vicepack/default.mspx Technet webcast for Security Configuration Wizard available > “Join this session as we walk you through the Wizard end-to-end, focusing on role-based server configuration, security configuration template design and development, and security configuration deployment. We will demonstrate the technologies as well as go in depth on customization of SCW and how to customize the database to support non-Microsoft applications” > http://msevents.microsoft.com/cui/WebCastEventDetails.aspx?EventID=103226801 3&EventCategory=5&culture=en-US&CountryCode=US Active Directory Security Links > AD Security Center: > > Best Practice Guides for Securing Active Directory > > > http://www.microsoft.com/resources/documentation/WindowsServ/2003/all/deployguide /enus/Default.asp?url=/resources/documentation/WindowsServ/2003/all/deployguide/enus/dnsbd_dns_wzwd.asp Active Directory in Segmented Networks > > > Windows Server 2003 Best Practice Guide for Securing Windows Server Active Directory Installations http://www.microsoft.com/windowsserver2003/techinfo/overview/adsecurity.mspx (Jan 8 2004) Windows 2000 Best Practice Guide for Securing Active Directory Installations and Day-toDay Operations http://www.microsoft.com/technet/prodtechnol/windows2000serv/technologies/activedir ectory/maintain/bpguide/default.mspx (Feb 28 2004) Securing DNS Zone transfers in Windows Server 2003 > > http://www.microsoft.com/technet/security/prodtech/ActiveDirectory.mspx http://www.microsoft.com/downloads/details.aspx?FamilyID=c2ef3846-43f0-4caf-9767a9166368434e&DisplayLang=en Provides detail for how to use Ipsec to secure all traffic between AD servers TCP/IP Exploits and Countermeasures > http://www.microsoft.com/technet/security/prodtech/windows2000/secmod150.mspx Windows tools for investigating problems with hardening > Full System Backup with ASR Diskette/CD > > > > System Restore – could try checkpoint prior to hardening. Not sure if it can undo everything… Backup Windows event logs to baseline behaviors prior to hardening. Make logs bigger. Network Sniffers > > > > > > > > > > > > Many changes can not be undone by SCE or SCW rollback, such as registry and file ACLs Windows Netmon – light version in Win2k or Win2k3 as optional install networking component. Full version in Systems Management Server Ethereal – open source http://www.ethereal.com/ Dependency Walker (depends.exe, XP or Win2k3 Resource Kit) Portqry.exe v2.0 – port scanning tool - see KB 832919 Port Reporter – installs as service to monitor app port usage - see KB 837243 If Windows Firewall or IPsec filters are blocking UDP ports, watch out for false “port open” messages from remote port scanning tools. Some scan tools expect ICMP destination port unreachable packet in response. Sniff to confirm what tool reports Group Policy Resultant Set of Policy (RSoP) MMC snapin – shows where setting is being defined Set auditing for failure on registry keys – look for errors in Security Log Tlist.exe – process viewer (DDK debugging tools) File Monitor (sysinternals.com) Registry Monitor (sysinternals.com) Process Explorer (sysinternals.com) Developer References > “Creating a simple Win32 service in C++“ > http://msdn.microsoft.com/library/default.asp?url=/library/enus/dndllpro/html/msdn_ntservic.asp > MSDN “About Services” development help > http://msdn.microsoft.com/library/default.asp?url=/library/enus/dllproc/base/about_services.asp > “Example of installing an application as a service” > http://msdn.microsoft.com/library/default.asp?url=/library/enus/exchserv/html/example_0001.asp > Microsoft Security Risk Management Process – 15oct04 > http://www.microsoft.com/technet/security/topics/policiesandprocedures/secrisk /default.mspx > New MS Press Book: Threat Modeling > http://www.microsoft.com/mspress/books/6892.asp > Threat Modeling for Developers > http://msdn.microsoft.com/library/default.asp?url=/library/enus/secmod/html/secmod76.asp