SANS Technology Institute Group Discussion/Written Project GIAC Enterprises Desktop Protection

advertisement
SANS Technology Institute
Group Discussion/Written Project
GIAC Enterprises Desktop Protection
9/28/2008
Jim Beechey
Emilio Valente
1
Table of Contents
Table of Contents ....................................................................................... 2
Executive Summary .................................................................................... 3
Market Survey – Top 10 Vendors ............................................................... 4
Top Three Recommendations................................................................... 10
Recommendation...................................................................................... 12
Project Costs ........................................................................................... 13
Implementation Plan ................................................................................ 14
Summary .................................................................................................. 16
References ............................................................................................... 17
2
Executive Summary
GIAC Enterprises has made a significant investment in securing web applications and
backend database infrastructure. These investments addressed several potential
vulnerabilities in our fortune cookie system. However, one weak link remains, the
security of our desktop computers.
Today’s malware could potentially be used as a tool to steal our most precious asset,
our fortune cookie data. The malware threat continues to grow as it become easier to
create modified or custom malicious code that cannot be detected by signature-based
solutions. “The number of unique malware samples received by AV-Test.org increased
from 333,000 in 2005 to 972,000 in 2006 and reached 5,490,000 in 2007. During
January and February 2008 alone we found more than 1.1 million samples spreading in
the internet.” (1) In addition, today’s attacks are often targeted at a specific company or
area of the company. Gone are the days when we can feel confident that someone will
produce a virus definition file in time to protect our critical assets.
During a recent competition at Defcon 16 called “Race to Zero”, competitors were asked
to attempt to push known exploits through antivirus software without detection. The
participants used various techniques to obfuscate the exploits to avoid detection.
“Overall, the average detection rate of the antivirus engines was 60%. For some of the
attacks like Netsky.P and MS07-014, the average plummeted to 15-20%.” (2) This
example illustrates the fundamental problem with signature based protection
mechanisms and underscores the concern GIAC Enterprises has over the security of
their desktop solutions.
As you will see in the full report, we are recommending a significant change in the way
we protect our desktop computers at GIAC Enterprises. The following proposal will
outline various options available on the market including a new approach called
application whitelisting. Application whitelisting involves changing the model from
signatures which detect known malware to locking down the entire computer and only
allowing known good applications to run.
During the “Race to Zero” competition at Defcon 16 noted above, the same obfuscated
exploits were run through an application whitelisting solution and the solution blocked
100% of the attacks. This example highlights the beauty of the application whitelisting
model and addresses GIAC Enterprises primary concern of undetected malware
stealing our fortune cookie data.
3
Market Survey – Top 10 Vendors
Traditional antivirus solutions couple signature based antivirus protection with numerous
other system protection options. A full featured endpoint security product can have
several protection mechanisms such as: antivirus, antispyware, firewall, intrusion
prevention, rootkit detection, and protection for various applications (email, instant
messenger, P2P, registry settings). The end result is solutions which use signatures to
block known exploits and malware.
The problem with this blacklisting approach is that malware today is so dynamic and
targeted in nature that antivirus companies are having a tough time keeping up.
Malicious individuals are able to easily make variants of existing malware which are
undetectable by many signature based solutions.
Whitelisting solutions vary in that they do not allow any executable to run which has not
been explicitly allowed by the system administrator. They take the approach to block
everything and only allow known good applications to run. This approach can be
extremely effective against malicious code.
Due to whitelisting’s block everything approach, these solutions often require more
administrative overhead and could potentially have productivity impacts if not configured
properly. In addition, most whitelisting solutions do not protect against existing security
holes in applications, therefore a robust patch management strategy is still required.
Clearly, both methods have their strengths and weaknesses and in the end the best
solution is likely a combination of the two approaches. The following section details
various vendor offerings for desktop security solutions. The list is in no particular order.
Kaspersky Internet Security 2009 – www.kaspersky.com
Kaspersky Internet Security 2009 is a full featured suite of protection
mechanisms including antivirus, antispyware, antispam, intrusion prevention and
vulnerability scanner.
Strengths:
The Kaspersky Antivirus product was CNET Editors choice 2 years running. The
product contains a virtual keyboard which is designed to thwart collection of
sensitive data by keyloggers. Hourly updates keep the application up to date
with changing threats. Kaspersky requires less hard drive space than competitors
(50MB).
Weaknesses:
Kaspersky costs more than the competition ($79.95).
4
Performance score (4):
Excellent 8.0 ***Review was for Kaspersky Antivirus 7, not Internet Security
Suite***
Cost:
79.95
Check Point ZoneAlarm Internet Security Suite 2009 – www.checkpoint.com
The Check Point ZoneAlarm Internet Security Suite is a collection of antivirus,
antispyware, antiphising and firewall protection. The product uses the Kaspersky
version 6 antivirus engine which has received high reviews.
Strengths:
The firewall included in the product has an auto learn function which allows users
to configure the firewall more quickly and effectively. The product keeps a
database of legitimate applications and matches these signatures against
installed applications. This minimizes the alerts and questions to the user and
only prompts for unusual activity. Check Point also includes identity theft and
fraud protection with a world-wide monitoring.
Weaknesses:
The product does not provide any backup or file shredding functionality.
Performance score (4):
Excellent 8.0 ***Review is for Internet Suite 7***
Cost:
$69.99
McAfee Internet Security 2008 – www.mcafee.com
The McAfee Internet Security Suite contains various features including
antiphishing, antivirus, antispyware, firewall, backup and recovery.
Strengths:
McAfee also has some "state aware" capabilities which help to allow multimedia
applications (movies, slide shows, etc) to play without interruption by security
alerts or scans whenever you're in full-screen mode.
.
Weaknesses:
McAfee updates only occur daily whereas competitors update hourly. Technical
support costs $2.95 a minute or $39 per incident.
Performance score (4):
5
Very Good 7.3
Cost:
$69.99
Norton Internet Security 2009 – www.symantec.com
Norton Internet Security 2009 is the upgrade to GIAC Enterprise’s current
antivirus solution Norton Internet Security 2008. This new version has several
new features including: up to the minute protection (updates every 5 to 15
minutes), identity theft protection, faster scans and a two-way internet firewall.
Strengths:
Norton is a fully featured product with numerous options. Up to the minute
updates give Norton a competitive advantage over other products.
Weaknesses:
Norton 2009 does not include any file backup/restore functionality, or security file
deletion.
Performance score (4):
Good 6.8 ***Norton 2008 Reviewed***
Cost:
$49.99 upgrade
Symantec Endpoint Protection Version 11 – www.symantec.com
Symantec Endpoint Protection is the enterprise counterpart to Norton Internet Security
2009. Version 11 included significant changes from previous versions and include a
very rich feature set including: antivirus, antispyware, intrusion prevention, network
threat protection, DLP add-in and NAC capabilities.
Strengths:
Full featured enterprise level product covering all bases when it comes to end
point security.
Weaknesses:
SEP 11 is an expensive solution compared to alternatives. In addition, there are
features in the product that likely overlap with GIAC Enterprises existing DLP
solution. Setup and deployment appears to be a bit more complicated than
competitors’ products.
Cost:
6
$75-225 per client (4)
BitDefender Antivirus 2008 – www.bitdefender.com
The BitDefender suite provides protection against viruses, spyware, phishing
attacks,
and
rootkits,
Strengths:
BitDefender provides hourly updates and has an optional (in aggressive mode)
add-on web protection (malicious ActiveX and Javascripts). The suite costs less
than most competitors and requires only 50MB of hard-drive space. A unique
feature is BitDefender’s identity privacy check for outgoing data.
Weaknesses:
The product’s configuration could be a little more straightforward by providing
more options and explanations.
Performance score (4):
Very good 7.8
Cost:
$24.95
Sunbelt Vipre Antivirus + Antispyware – www.sunbeltsoftware.com
The Sunbelt Vipre suite includes antivirus and antispyware protection as well as
secure deletion of files and browser history.
.
Strengths:
Vipre shows hidden processes on the system that are potentially malicious. A
secure file erase function is an interesting feature not seen in other products.
Weaknesses:
No Firewall.
Performance score (4):
Very good 7.8
Cost:
$29.95
The Shield Deluxe 2008 – www.pcsecurityshield.com
The Shield Deluxe 2008 combines reliable and efficient antivirus (Kaspersky
version 6) with spyware and adware protection.
7
Strengths:
The product provides free technical support via phone and email which is
uncommon for most solutions. The Shield Deluxe monitors programs and
processes in memory and alerts for changes in both the file system and system
registry. The program only requires 32 MB RAM or higher and 65 MB free disk
space and it is optimized for laptops.
Weaknesses:
The Shield Deluxe does not come with a firewall.
Cost:
$30 per client (http://www.2009softwarereviews.com/)
Bit 9 Parity – www.bit9.com
Bit9 Parity is an application whitelisting solution which allows administrators to
completely control what applications and executables are allowed to run on end
user desktop/laptop computers as well as servers. Bit9 is managed through a
central console and policies are deployed to agent software installed locally on
end user computers. Before running any executable, Bit9 compares the file
against its database of allowed applications and only runs those which have
been given permission. Bit9 users file hashes to identify which files are allowed
and which are not. The Bit9 agent can be used to protect both desktops and
servers.
Strengths:
Bit9 has an enormous database (over 6 billion) of files which makes setup and
maintenance of the system much easier. Administrators do not have to do any
cataloging or hashing of applications themselves.
Weaknesses:
Bit9 is for the Windows platform only. Application whitelisting typically can do
nothing to protect against vulnerabilities in existing software, therefore a robust
patch management strategy is still required.
Performance:
Bit9 scored “five out of five stars” for performance during a SC Magazine review.
(5)
Cost:
Bit9 costs around $30 per client.
8
CoreTrace Bouncer – www.coretrace.com
CoreTrace Bouncer is an application whitelisting solution which allows
administrators to completely control what applications and executables are
allowed to run on end user desktop/laptops as well as Windows and Solaris
servers. Bouncer is managed centrally through a console and policies are
pushed down to client computers and servers.
Strengths:
Bouncer runs at the kernel level, which allows it to provide more protection
against complex attacks such as rootkits.
Weaknesses:
Bouncer is expensive compared to other application whitelisting solutions.
Performance:
Bouncer requires very little system resources “The BOUNCER client typically
takes up less than 20 MB, and uses less than 2 percent of the CPU. “
(http://www.coretrace.com/products/solutions/government.aspx)
Cost:
Bouncer costs around $50 per client. (6)
9
Top Three Recommendations
Based upon our review of the marketplace, we have developed a top three list of
finalists for management review. Each solution has strengths and weaknesses as well
as specific considerations for GIAC Enterprises.
Option 1 – Upgrade our existing solution, Norton 2008 to the current version.
Reasons For:


Very minimal change for end users and support staff. People are generally
comfortable with the interface and our system administrators have a comfort
level with the product
Up to the minute updates provide the quickest signature updates on the
market today.
Reasons Against:


Cost – The upgrade cost will actually be more than several new products.
While the system has made several technical improvements, the issue of
unknown malware still appears to be a large problem.
Option 2 – Purchase Check Point ZoneAlarm Internet Security Suite 2009
Reasons For:

Firewall capabilities are very impressive and would be helpful in securing
remote worker laptops and protecting internal systems from network
compromise.

The Check Point suite contains all the standard protection mechanisms you
would expect from an endpoint security suite.
Reasons Against:


The antivirus engine is licensed via an OEM agreement with Kaspersky. The
Kaspersky engine is highly thought of; however we have some concern as to
the long term viability of their agreement. What happens to our investment if
the OEM agreement ends and is not renewed? Further investigation is
necessary into this issue.
Again, while this product has made strides, it still relies heavily on signature
based technologies which does not address our unknown malware concern.
10
Option 3 – Purchase Bit9 Parity Application Whitelisting Solution
Reasons For:





This solution addresses our concern regarding the detection of unknown
malware by blocking the execution of unknown programs.
This product also helps with workstation lockdown and concerns over
employee productivity loss due to non-work related applications.
Bit9 has the industry’s leading database of file intelligence with over 6 billion
files cataloged to date. Files are both malicious and non-malicious. This tool
helps to accurately define whitelisting policies, quickly create necessary
exceptions and research potential malicious code.
Bit9 makes policy development easier by providing the administrator the
ability to whitelist applications based upon the digital signature. For instance
we could easily allow all our GIAC Enterprises custom applications to be run
since our developers digitally sign all their code.
At around $30 per workstation, the price is very comparable, if not less, than
many signature based endpoint security solutions.
Reasons Against:




Application Whitelisting is still an evolving technology and with that comes
some risk of what future threats could pose to the model.
Bit9 appears to be a strong company; however they are also ripe for purchase
by one of the existing players in the market. The founders of Bit9 previously
founded and sold Okena to Cisco.
Bit9 cannot protect workstations from attacks against vulnerable applications.
For instance, an older copy of Apple Quicktime would still be vulnerable to
certain attacks. Signature based tools may be able to address some of these
vulnerabilities in the host based intrusion prevention modules.
Possible productivity loss due to incorrectly configuring the Bit9 system. If
incorrectly configured, Bit9 will block required business applications. GIAC
Enterprises will need to provide an efficient process for addresses and
responding to those concerns.
11
Recommendation
Our recommendation is for GIAC Enterprises to purchase Bit9 Parity for all end user
workstations. We feel that application whitelisting is the only way to truly reduce the risk
of un-known malware to a suitable level. We also liked the added benefit of eliminating
applications which impact employee productivity.
From a technical perspective, we chose Bit9 for several reasons. First and foremost on
the list was Bit9’s robust database of application intelligence. This system will allow our
administrators to quickly create baseline policies and adapt those policies to the
changing needs of our business. Second, the Bit9 solution will be able to control our
entire workstation environment centrally from a single console. We need this ease of
management given the size of our company and IT staff.
Certainly this recommendation is not without some level of risk as it is a significant
change in thinking from a protection standpoint. We would like to address to potential
weaknesses discussed in our top three recommendation section. First, we would like to
address the issue of application whitelisting’s inability to protect against vulnerabilities
within known good applications. We feel that this risk has already been mitigated to an
acceptable level since GIAC Enterprises already has a proven security patch
management system. We simply would note that continued diligence in this area is
required. Second, we would like to address the issue of potential loss of productivity
due to blocking a business critical application. We recommend that GIAC Enterprises
implement a new Help Desk process by which any incoming support call which
indicates that one of our business critical applications has been blocked is given a high
priority ticket so that these issues can be addressed as quickly as possible. Any issues
such as this would likely have an impact on multiple employees and departments and
needs to be addressed quickly.
We believe that this quote sums up the current state of malware protection best and is
interesting given it come from the CTO of Symantec, the maker of our current solution,
Norton 2008. “"If the trend continues and bad programs outnumber good ones, then
scanning for legitimate applications (whitelisting) makes more sense from both an
efficiency and effectiveness perspective." Mark Bregman, CTO, Symantec
Corporation (7)
12
Project Costs – Assuming 250 Workstations
Description
Unit Cost
Total Cost
Bit9 Parity Software Purchase
$30
7500
Annual Subscription to Parity Console
10% of purchase price
Annual Support
20% of purchase price
Server Hardware – Parity Console
750
750
1500
1500
5,000
5,000
Total Cost Year 1 – 14,750
Total Cost Year 2 – 17,000
Total Cost Year 3 – 19,250
13
Implementation Plan – GIAC Enterprises Bit9 Implementation
Objective: Implement Bit9 Parity as a single tool to protect user workstations from
malware.
Phase 1
Start date: September 27, 2008
End date: September 28, 2008
Milestones:
 Executive summary
 Market survey
 Top Three Recommendations
 Final Recommendation
 Determine Costs
 Project plan
 Oral presentation of the proposal.
 Acceptance of proposal
Resources assigned: 2 Full Time Employees (FTEs)
Phase 2
Start date: October 1, 2008
End date: October 15, 2008
Milestones:
 Contact Bit9
 Install evaluation versions of their product and test thoroughly
Resources assigned: 2 Full Time Employees (FTEs)
Phase 3
Start date: October 16, 2008
End date: October 31, 2008
Milestones:
 Assuming positive evaluation, contact Bit9 to begin purchase process
 Negotiate contract, pricing and support
 Purchase product
Resources assigned: 2 Full Time Employees (FTEs)
14
Phase 4
Starting date: November 01, 2008
End date: November 30, 2008
Milestones:
 Install and configure full version in lab environment
 Create various application whitelisting policies with the Bit9 system
 Perform pre-production testing of system performance
 Perform analysis of the compatibility with existing production programs in lab
Resources assigned: 2 Full Time Employees (FTEs)
Phase 5
Starting date: December 01, 2008
End date: December 15, 2008
Milestones:
 Install full version on production desktops
 Address any unforeseen issues in production
 Ensure Help Desk process for noting any problems with business critical
applications has been deployed.
Resources assigned: 2 Full Time Employees (FTEs)
15
Summary
Thank you GIAC Enterprises staff for taking the time to review our proposal. We feel
that the proposed solution and project plan will provide the protection required of our
desktop computers while not inhibiting system performance or employee effectiveness.
We would be happy to address any additional question or concerns you have a look
forward to hearing your decision regarding the proposed project.
16
References
1 Alex Eckelberry, Sunbelt Software Blog,
http://sunbeltblog.blogspot.com/2008/03/march-test-results-of-antivirus.html
2 http://www.coretrace.com/news/press_releases/press_release_defcon16.aspx
3 http://www.cnet.com/topic-reviews/antivirus.html
4 Matthew D. Sarrel, PC Magazine, “Symantec Endpoint Protection 11”
http://www.pcmag.com/article2/0,1895,2234123,00.asp
5 Justin Peltier, SC Magazine, “Bit9 Parity” http://www.scmagazineus.com/Bit9Parity/Review/2548/
6 http://products.enterpriseitplanet.com/security/anti-virus/1221159869.html
7 http://www.coretrace.com/products/benefits/malware_viruses.aspx
17
Download