DRAFT - ICANN Capacity Building Initiative ccTLD Registry Operations Curriculum Secure Registry Operations Course Course Overview: (24 hours) The Secure Registry Operations Course (SROC), course #3 of the Registry Operations Curriculum, instructs the basics of security, stability and resiliency in registry operations. Students will learn network and computer security principles and their application to registry functions, processes, and infrastructure. Through a creative use of hands-on exercises, students will gain an operational understanding of detecting, responding and recovering from cyber risks associated with TLD operations. Students will gain perspectives with real-world experience from networking with other students and through sharing of best practices. Course Objectives Students will: Understand current and emerging risks to registry operations Understand and apply methods of securing internal registry processes and operations Install, configure and operate registry monitoring, detection and response tools See principles of cyber attack detection and response through hands-on exercises Understand the concepts of a secure registry infrastructure Pre-requisites: Students must have attended the Initial Registry Operations Course AND the Advanced Registry Operations Course - or - have experience installing and configuring DNS server software, registry operations software, and network monitoring software. Target Audience: ccTLD registry operators, technicians and administrators ccTLD management with technical background and experience (CTO, CIO, CSO) DRAFT - ICANN Capacity Building Initiative COURSE OVERVIEW: (24 hours) The Secure Registry Operations Course (SROC) instructs the basics of security, stability and resiliency in registry operations. Students will learn network and computer security principles and their application to registry functions, processes, and infrastructure. Through creative use of hands-on exercises, students gain an operational understanding of detecting, responding to, and recovering from cyber risks. TOPIC Course Infrastructure & Tools HOURS X Student Presentations X Core Concept Review X Operating System & Application Hardening Secure Registry Architecture X Principles of Conducting Secure Registry Operations X Cyber Threats & Attacks X Emerging Threats X Mitigation Strategies Capstone Exercise X X Course Exam X X DESCRIPTION Familiarizes students with the in-class registry network and tools. Hands-on exercises reinforce topics from previous courses. Allows students to introduce themselves, discuss their registry operation, and their expectations to their peers. Introduces students to building a professional network. Re-familiarizes students with core concepts that are integral to this course. Introduces operating system security and hardening for Cisco devices, Microsoft Windows and Ubuntu Linux. Introduces registry architecture components and their purpose related to security and attack mitigation. Provides comparison of available implementations. Discusses hardware, software, redundancy, protocols, and standards. Discusses a structured approach to conducting baselining, monitoring, detection, response and recovery of cyber attacks tailored to ccTLDs. Introduces concepts of logging, monitoring, analysis, well-defined procedures, and prioritization. Introduces threats, actors, and motivations related to cyber attacks. A staged approach allows students to see evolution of attacks from start to finish and of varying complexities. Subtopics include: Foothold, Reconnaissance & Enumeration, Privilege Escalation, Corruption, Disruption, Data Exfiltration, and Persistence. Discusses detection, response, and recovery actions. Hands-on exercises demonstrate attacks to students, and allow them to detect, respond and recover. Introduces emerging threats to registry operations. Provides students the foundation for understanding future attacks. Surveys technical methods for conducting attacks and actor rationale for each threat. Surveys additional strategies for mitigating cyber threats and attacks. Hands-on exercise allows students to operate their newly built registry and perform management, monitoring, and troubleshooting. Assess student’s grasp of fundamentals taught during the course. Instruction Block Detailed Description: 1) Course Infrastructure & Tools Describes the in-class network, provides time for students to familiarize themselves with the infrastructure, introduces tools installed on the in-class network that students should be familiar with. Provides time for instructors to ensure all students have connectivity. 2) Student Presentations This block continues the concept of building a professional network. Allows students to introduce themselves and give a short presentation on their registry and its operation. Students may address their current operation, future plans, current issues, or anything else they feel is relevant to their peers. DRAFT - ICANN Capacity Building Initiative 3) Core Concept Review This block re-familiarizes students with concepts from previous courses that are integral to understanding and performing secure registry operations. Topics include Ubuntu command line usage, overview of network management, and network monitoring tool usage. 4) Operating System & Application Hardening This block introduces operating system security and hardening for Cisco devices, Microsoft Windows servers and workstations, and Ubuntu Linux servers and workstations. Topics include securing services and applications, host-based firewalls, anti-virus, patching, and user privilege security. 5) Secure Registry Architecture Introduces additional registry architecture components and concepts related to security and attack mitigation. Provides comparison of available implementations and discusses when one implementation may be better than another. Topics include hardware / software redundancy, protocols, standards, IPv6 and DNSSEC. 6) Principles of Conducting Secure Registry Operations Introduces students to a structured approach to conducting security registry operations through baselining, monitoring, detecting, responding and recovering. Discusses the concepts of logging, monitoring, analysis of attacks in progress (bandwidth spikes, non-standards or malformed queries, non-standard responses, etc), and open-source proactive analysis (CERTs, threat discussion sites, etc) in attack recognitions and detection. Introduces the rationale for welldefined procedures, checklists, plans and methods for responding to attacks, suggests use of informal trust relationships and networks with other ccTLDs, discusses use of communication tools. Introduces concepts of business objectives, prioritization, and methods for responding and recovering from attacks. This block is threat agnostic and strives to discuss concepts only. 7) Cyber Threats & Attacks Introduces threats, actors, and motivations for select cyber threats. Staged approach allows students to see evolution of attacks from start to finish and of varying complexity. Discusses detection, response and recovery actions. Hands-on exercises allow students to see the attack first-hand and how it affects the in-course architecture, conduct monitoring, detection, and response actions, and implement recovery actions. Topics include Foothold (e.g. zero-day attacks, phishing, SQL Injection, social engineering, weaknesses in implementations of customer front-end applications, scripts, and business processes), Reconnaissance & Enumeration (e.g. Insider attacks, port scanning, service enumeration, firewall port walking, zone transfers), Privilege Escalation (e.g. direct operating system and application attacks, username/password brute forcing), Corruption (e.g. internal and external cache poisoning, customer stub resolver resolution path modification, ISP nameserver poisoning), Disruption (e.g. single points of failure, prefix hijacking, misconfiguration, amplifications attacks, DDoS, and DoS, name server redirection), Data Exfiltration (e.g. SCP, mail attachments, USB pen drives), and Persistence (e.g. root kits, stealth methods, Windows service, Ubuntu daemon). 8) Emerging Threats Introduces emerging threats to registry operations that may not be able to be demonstrated on the in-course architecture due to technical or time limitations. Describes the threat, how it is accomplished, provides likely attack vectors and methods, identifies the likely actors involved, and discusses the motivations for conducting the attack. Discussion of emerging threats focuses on classes of attacks that may not be currently in the wild, but operators should be on the lookout for. DRAFT - ICANN Capacity Building Initiative 9) Mitigation Strategies Surveys additional strategies for mitigating cyber threats and attacks that may not be able to be discussed or demonstrated due to technical or time limitations. 10) Capstone Exercise Hands-on exercises allow students to operate their newly built registry, and perform baselining, monitoring, detection, analysis, response and recovery actions during scenario –based attacks. 11) Course Exam Assess the students’ grasp of fundamental taught during the course through a multiple choice and fill-in-the blank exam. Students are allowed to use notes, materials, and the Internet during the exam. DRAFT - ICANN Capacity Building Initiative In-Course Architecture Students will be divided into groups of two, and each will be provided with their own “ccTLD” within the in-course architecture. Each “ccTLD” will be in a separate routed subnet from the other “ccTLDs”. Students or Host Organization must provide student laptops, one for every student. All other infrastructure will be provided by the instructors. Block Descriptions: Internet access, unfiltered and able to serve 20 students with email, web surfing, instant messaging, occasional VoIP or Skype call. Highly desired but not required Student WiFi – 802.11g/n wireless access for connecting student laptops to the architecture GroupX Laptop – a laptop capable of web browsing and running a secure shell (SSH) client Course Support – file, web, and wiki server for publishing materials to students for use in class GroupX – replicates a “ccTLD” network for student use, providing nameserver, backend database, monitoring, and business process functionality “ISP” router – provides connectivity between GroupX subnetworks and the core servers “ISP” DNS – an open resolver, used by the external users, to query the root and “ccTLD” nameservers External users – allows students to query (graphically and via command line) the root and the ccTLD nameservers from the perspective of an end-user DNS Root – replicates the root DNS zone functionality Traffic Generator – provides large-scale traffic generation capability for DDoS attack and background noise Attack Platform – platform for launching attacks against the root, ISP, “ccTLD” and external users External Users Traffic Generator DNS Root “ISP” DNS Group1 Attack Platform “ISP” Router Group2 GroupX TLD Rtr TLD Rtr TLD Rtr NS Monitor NS Monitor NS Monitor DB Business DB Business DB Business Internet Student WiFi Group1 Laptop Group2 Laptop GroupX Laptop Course Support (wiki, web, file)