Peter Leight and Richard Hammer August 2006 What is Defense-in-Depth? • There is no “silver bullet” when it comes to network security • Any layer of protection might fail • Multiple levels of protection must be deployed • Measures must be across a wide range of controls (preventive and detective measures) Security Leadership Essentials – Defense-in-Depth – © 2006 SANS What is Defense-in-Depth? Network security is a comprehensive integrated approach in which multiple solutions are tiered together to accomplish a goal. There is no single security solution that will make an organization secure because any single measure could be bypassed or compromised. In addition, a single solution could potentially be bypassed and miss an attack all together. When protecting any entity, such as the President, there are many people, measures and systems put in place to keep him secure. The same robust approach needs to be applied to your network or any critical asset at your organization. Coors light is the only silver bullet, when it comes to network security there is no single bullet. Multiple measures that compliment each other must be put in place and these measures must be across a variety of control options. For example, you would deploy a preventive measure such as a firewall, a detective measure such as an IDS and a deterrent measure, a guard at your front gate, just to name a few. Even if one of the measures failed the other measure would be able to detect the attack before there was a problem or catch an attack in action, to minimize the amount of damage caused. Peter Leight and Richard Hammer August 2006 Focus of Security is Risk • Security deals with managing risk to your critical assets • Security is basically an exercise in loss reduction • Impossible to totally eliminate risk, we settle for residual risk • Risk is the probability of a threat crossing or touching a vulnerability • Risk is managed by utilizing defense-in-depth (DiD) • Risk = threat x vulnerabilities Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Focus of Security is Risk Risks, threats, and vulnerabilities are highly interrelated. Their relationship can be expressed by this simple formula: Risk (due to a threat) = Threat x Vulnerability (to that threat) This formula shows that risk is directly related to the level of threat and vulnerability you, your systems, or your networks face. Here’s how the formula works: If you have a very high threat, but a very low vulnerability to that threat, your resulting risk will be only moderate. For example, if you live in a high crime neighborhood (thus, high threat) but you keep your doors and windows locked (so you have a low vulnerability to that threat), your overall risk is moderate. If you have a high vulnerability to a threat (by keeping your doors and windows unlocked), but the threat itself is minor (by living in a safe neighborhood), once again you have only a moderate risk factor. If, however, you have a high level of threat potential (a high crime area) and your vulnerability to that threat is very high (no locks), you have a very high risk factor. Peter Leight and Richard Hammer August 2006 Key Focus of Risk • Confidentiality / Disclosure • Integrity / Alteration • Availability / Destruction Integrity Confidentiality Availability Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Key Focus of Risk We’ll start by explaining some fundamental principles that you need to understand and apply everyday in securing your systems. We’ll progress from what exactly it is about our systems that we’re trying to protect – confidentiality, integrity and availability – to the risks our systems face. After looking at threats and vulnerabilities, we’ll talk about an overarching approach to protecting our systems. We’ll show you the importance of layering our protections, with defense-in-depth. This will give you a good foundation for evaluating and securing your systems. Confidentiality, Integrity and Availability What exactly about the system or information do we wish to protect? Traditionally, information security professionals focus on ensuring confidentiality, integrity, and availability. Simply “CIA” in “infosec” jargon, these are three bedrock principles about which we will be concerned. A good habit when first exploring any new business application or system is to think about confidentiality, integrity, and availability – and countermeasures or lack thereof for protecting these. Attacks may come against any or all of these. We will discuss a variety of threats that jeopardize our computer systems. To focus that discussion, we will consider some of the more famous attacks that have occurred. Now, information assurance can get really complex, but these kinds of problems decompose nicely. As we work our way through the material, we are going to be pointing out Peter Leight and Richard Hammer August 2006 aspects of confidentiality, integrity, and availability, in both the attacks and also the defenses we discuss. Let’s use an example: You’ve been assigned to oversee the security of your employer’s new e-commerce site, its first attempt at conducting business directly on the Internet. How do you approach this? What should you consider? What could go wrong? Think C-I-A – confidentiality, integrity, and availability. Customers will expect that the privacy of their credit card numbers, their addresses and phone numbers, and other information shared during the transaction be ensured. These are examples of confidentiality. They will expect quoted prices and product availability to be accurate, the quantities they order at the prices to which they agreed to not be changed, and anything downloaded to be authentic and complete. These are examples of integrity. Customers will expect to be able to place orders when convenient for them, and the employer will want the revenue stream to continue without disruption. These are examples of availability. Keep in mind that the dimensions we have been discussing can be interrelated. An attacker may exploit an unintended function on a web server and use the cgi-bin program “phf” to list the password file. Now, this would breach the confidentiality of this sensitive information (the password file). Then, in the privacy of his own computer system, the attacker can use brute force or dictionary-driven password attacks to decrypt the passwords. Then, with a stolen password, the attacker can execute an integrity attack when he gains entrance to the system. And he can even use an availability attack as part of the overall effort to neutralize alarms and defensive systems, so they can’t report his existence. When this is completed, the attacker can fully access the target system, and all three dimensions (confidentiality, integrity and availability) would be in jeopardy. Always think C-I-A. Now, we chose a very simple, well-known attack for a reason. A large number (in fact, an embarrassingly large number) of corporate, government, and educational systems that are compromised and exploited are defeated by these well-known, well-publicized attacks. An attack doesn’t have to be the latest and greatest in order to be successful most of the time. Countless numbers of attacks, covering years of experience, are detailed on the Internet and in books and courses. Often these are still viable, especially when defense-in-depth is not being practiced. Peter Leight and Richard Hammer August 2006 Prioritizing CIA • While all three areas of CIA are important to an organization, there is always one area that is more critical than others • Confidentiality – Health Care Organizations – Hospitals • Integrity – Financial Institutions – Banks • Availability – E-commerce based organizations – Online banking Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Prioritizing CIA Which pillar of the CIA triad is most important to your organization? At SANS, we rely on our online resources for class registration and online training, without which we are unable to provide services to our students. Since we can’t operate without students, our priority is availability. After availability, the next most important dimension of CIA is integrity. SANS is the most trusted source for computer security training so our information must be correct. Since the bulk of our information is protected by copyright, even though we have some trade secrets, confidentiality is the least important CIA pillar to SANS. Different organizations will have different priorities in the CIA triad. Confidentiality is usually very important to health care oriented organizations and integrity is important to financial institutions. Understanding what the priorities are for your organization is a tremendous help in prioritizing security plans for your organization, from design to incident response. Peter Leight and Richard Hammer August 2006 What is a Threat? • Validated data – – – – Business goals Validated data Past history Main point of exposure sm rori Ter – Intellectual property M are w al In sid er 5 Primary Threats Natural Disasters He Epid alth emi c • Possible danger • Protect against the ones that are most likely or most worrisome based on: Security Leadership Essentials – Defense-in-Depth – © 2006 SANS What is a Threat? We’ve been talking about what we need to protect, e.g. the confidentiality, integrity, and availability of our systems. Next, we’ll discuss from what we need to protect them – the threats to them and their vulnerabilities to those threats. We’ll see how risk is a function of threat and vulnerability. Now, not all the bad things that happen to computer systems are attacks per se. There are fires, water damage, mechanical breakdowns, accidental errors by systems administrators, and plain old user error. But all of these are called threats. We use threat models to describe a given threat and the harm it could do if the system has a vulnerability. There are a large number of approaches to threat models, but one that you should consider is the one used by Microsoft: http://www.microsoft.com/downloads/details.aspx?FamilyID=62830F95-0E61-4F8788A6-E7C663444AC1&displaylang=en (or type threat model into Google) Peter Leight and Richard Hammer August 2006 As you can see in the diagram, this is a vector oriented approach to Defense-in-Depth. The software tracks the entry points against the protected resources. The software then helps consider the impact threats would have in a structured way. In security discussions you will hear a lot about threats. Threats, in an information security sense, are any activities that represent possible danger to your information or operation. Danger can be thought of as anything that would negatively affect the confidentiality, integrity, or availability of your systems or services. Thus, if risk is the potential for loss or harm, threats can be thought of as the agents of risk. Threats can come in many different forms and from many different sources. There are physical threats, like fires, floods, terrorist activities, and random acts of violence. And there are electronic threats, like hackers, vandals, and viruses. Your particular set of threats will depend heavily on your situation – what business you are in; who your partners and adversaries are; how valuable your information is; how it is stored, maintained, and secured; who has access to it, and a host of other factors. Peter Leight and Richard Hammer August 2006 The point is that there are too many variables to ever protect against all the possible threats to your information. To do so would cost too much money and take too much time and effort. So, you will need to pick and choose against what threats you will protect your systems. Security is as much risk management as anything. You will start by identifying those threats that are most likely to occur or most worrisome to your organization. In this course we focus on five primary threats shown on your slide. Insider threat, is there to remind us that nation states target companies and systematically acquire their intellectual property. Peter Leight and Richard Hammer August 2006 Vulnerabilities • Weaknesses in a system • Vulnerabilities are inherent in complex systems, they will always be present • The majority of vulnerabilities are the result of poor coding practices – Lack of error checking • Vulnerabilities are the gateway by which threats are manifested • Vulnerabilities fall into two categories: – Known, those you can protect against – Unknown or “zero day” Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Vulnerabilities In security terms, a vulnerability is a weakness in your systems or processes that allow a threat to occur. However, simply having a vulnerability by itself is not necessarily a bad thing. It is only when the vulnerability is coupled with a threat that the danger starts to set in. Let’s look at an example. Suppose you like to leave the doors and windows to your house unlocked at night. If you live in the middle of the woods, far away from anyone else, this may not be a bad thing. There really aren’t many people who wander around, and, if you’re high enough on the hill, you’ll be able to see them coming long before they present a danger. So, in this case, the vulnerability of having no locks is there, but there really isn’t any threat to take advantage of that vulnerability. Now suppose you move to a big city full of crime. In fact, this city has the highest burglary rate of any city in the country. If you continue your practice of leaving the doors and windows unlocked, you have exactly the same vulnerability as you had before. However, in the city the threat is that much higher. Thus, your overall danger and risk is much greater. Vulnerabilities are the gateways by which threats are manifested. Therefore, we can think of threats as the agents of risk, the mathematical probability of loss. Without vulnerabilities, threats do not pose a risk to the organization. Of course, vulnerabilities Peter Leight and Richard Hammer August 2006 don’t have to exist solely in software flaws – vulnerabilities can be flawed configurations, poor physical security, poor hiring practices, etc. When we couple vulnerabilities with threats, we introduce risks to an organization. *** Begin Sidebar *** When we talk about identifying vulnerabilities, it is easy to focus on software vulnerabilities, and the difficulty of implementing all encompassing patch-management systems. However, we are introduced to vulnerabilities in a much broader scale, including electronic vulnerabilities from misconfigured software and problems introduced from the rapid deployment of software patches. We are also asked to manage vulnerabilities of the human type – accidental and intentional attacks against information and its storage for example. When assessing safety, we are also concerned about vulnerabilities in our physical structures including fire, water, temperature extremes, toxins and electrical vulnerabilities (loss of power). Assessing vulnerabilities can be a difficult task to complete – it is easy to assess obvious vulnerabilities, but a thorough assessment can take considerably more time. Only with a comprehensive vulnerability assessment can we accurately calculate our overall risk. *** End Sidebar *** Vulnerabilities can be reduced or even prevented, provided of course that you know about them. The problem is that many vulnerabilities lay hidden, undiscovered until somebody finds out about them. Unfortunately, the “somebody” is usually a bad guy. The bad guys always seem to find out about vulnerabilities long before the good guys. Peter Leight and Richard Hammer August 2006 Approaches to DiD • Deploy measures to reduce, eliminate or transfer risk • Five basic approaches – uniform protection – protected enclaves – information centric – threat vector analysis – role-based access control Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Approaches to DID The concept behind Defense-in-Depth is simple. The picture we have painted so far is that a good security architecture, one that can withstand an attack, has many aspects and dimensions. We need to be certain that if one countermeasure fails, there are more behind it. If they all fail, we need to be ready to detect that something has occurred and clean up the mess expeditiously and completely, and then tune our defenses to keep it from happening to us again. We will examine five approaches to Defense-in-Depth. Peter Leight and Richard Hammer August 2006 Uniform Protection - DiD • Most common approach to Defense-inDepth • Firewall, VPN, Intrusion Detection, Antivirus etc • All parts of the organization receive equal protection • Particularly vulnerable to malicious insider attacks Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Uniform Protection – Defense-in-Depth Uniform protection treats all systems as equally important. No special consideration, or protection, is made for the 'crown jewels' of an organization. As a result, this approach can be more vulnerable to malicious insiders, since the systems are not separated or categorized within the network. The majority of attacks succeed because they take advantage of well publicized vulnerabilities for which exploits have been created. The best answer is to patch the systems, but this takes time. Of all the approaches to Defense-in-Depth, this one can be the weakest unless you have a good uniform protection design. This is also by far the most common approach. Peter Leight and Richard Hammer August 2006 Protected Enclaves DiD • Work groups that require additional protection are segmented from the rest of the internal organization • Restricting access to critical segments • DOE “unclean” network • System of VPNs • Internal Firewalls • VLANs and ACLs Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Protected Enclaves – Defense-in-Depth Protected enclaves involve segmenting your network. This can be done by implementing many VPNs across a single network, VLAN segmentation of switches, or firewalls to separate out the network. Peter Leight and Richard Hammer August 2006 Information Centric Defense-in-Depth Network Host Application Info •Identify critical assets and provide layered protection •Data is accessed by applications •Applications reside on hosts •Hosts operate on networks Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Information Centric Defense-in-Depth This slide shows another way to think of the defense-in-depth concept. At the center of the diagram is your information. However, the center can be anything you value, or the answer to the question, “What are you trying to protect?” Around that center you build successive layers of protection. In the diagram, the protection layers are shown as blue rings. In this example, your information is protected by your application. The application is protected by the security of the host it resides on, and so on. In order to successfully get your information, an attacker would have to penetrate through your network, your host, your application, and finally your information protection layers. Information centric defense starts with an awareness of the value of each section of information within an organization. Identify the most valuable information and implement controls to prevent non-authorized employees from accessing. A good start point is to identify your organization's intellectual property, restrict it to a single section of the network, assign a single group of system administrators to it, mark the data, and thoroughly check for this level of data leaving your network. Peter Leight and Richard Hammer August 2006 Vector Oriented DiD • The threat requires a vector to cross the vulnerability • Stop the ability of the threat to use the vector – USB Thumb Drives – Disable USB – Floppy Drives – Disable – Auto Answer Modems – Digital phone PBX Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Vector Oriented Defense-in-Depth Vector Oriented Defense-in-Depth involves identifying various vectors by which threats can become manifest and providing security mechanisms to shut down the vector. For example, disabling USB thumb drives and floppy drives. Peter Leight and Richard Hammer August 2006 Role-Based Access Control Mary Jim rite ad/W Re ber Mem em be r Role: Engineer M Member Role: Engineer Team Leader Member nly Read/O Write Read/ ber Mem Member Role: Finance Department Joe Project Data Read/Write Financial Data Sam •People identified by their roles •Data is accessed by roles not people •People can have more than one role •More than one role can access the same data Jill Security Leadership Essentials – Defense-in-Depth – © 2006 SANS The last approach to defense-in-depth that we will cover is role-based access control (RBAC). This approach is relatively new and revolves around the use of roles. A role typically reflects a position or function within a company. Network engineer, finance manager, legal secretary, manager, and guest worker are all roles. Access to data is not granted to user accounts. Instead access is granted to one or more roles. Users are then assigned to appropriate roles in the organization For example; the network manager might be assigned the manager role, and the network engineer role. A user can access any data that their roles have access to. For example, this network manager, based on her assigned roles, would have access to generic management data, and network engineering data. If a user changes positions in the company her role changes and what data she can access changes depending on the new roles she is assigned. Users can be assigned more than one role and more than one role can access the same data. For example, the finance manager role and the human resources role might both have access to the salary data for finance employees. By determining access via roles, concepts like separation of duties can be enforced institutionally. It also becomes simpler to change and track access to data when employees are hired, dismissed, or change positions within the company. RBAC is the preferred approach for defense in depth by many government organizations. Peter Leight and Richard Hammer August 2006 Identity, Authentication, Authorization & Accountability • Identity is who you claim to be • Authentication is a process by which you prove you are who you say you are: – – – – Something you know Something you have Something you are Some place you are • Authorization is determining what someone has access to or is allowed to do, after they have been properly authenticated • Accountability deals with knowing who did what and when Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Identity, Authentication, Authorization & Accountability Emphasizing the importance of defense-in-depth lets briefly look at access control. In order to protect critical assets you have to be able to identify, verify, approve and track who has access to given piece of intellectual property (IP). Identification is the process of claiming to be a certain person. Typing in a userID is a form of identification. The problem is anyone could claim they are a given entity, so how do you know that they are who they say they are. This is accomplished through authentication. Authentication is proving that you are who you say you are and is done in one of four ways: Something you know – by remembering a piece of information and presenting it, you can prove that you are who you say you are. The best example of something you know is a password. Passwords are discussed in greater details in the Password Assessment Module. However, there are a number of schemes to encode the password while it resides on the system and when it is being transferred across the network. One of two common techniques is Base64 Encoding, often used by web servers defined by RFC 2045. Because this is a standard encoding method, it only protects against the most casual eavesdropping. Anyone who collects the password in transit can use algorhythm to decode it. In addition, most systems use some kind of cryptographic hash such as RSA or NTLMv2. Peter Leight and Richard Hammer August 2006 Something you have – by possessing something you can prove that you are a given entity. Token based schemes in which you carry a token that generates a new password is an example of something you have. If you have the token and can type in the number on the token screen you can authenticate, otherwise you cannot. Something you are – an alternative way to authenticate is by presenting a unique attribute tied to your physical make-up. This is often called biometrics. Hand scan, thumb prints and retina scans are all examples of biometrics. Someplace you are - GPS or global positioning systems can also be used to authenticate that you are in a given geographic area. With sensitive information you might want to only allow someone to open a document if they are in the walls of a certain five sided building in Washington, DC. Once you have been properly authenticated, you than have to determine what you are allowed or authorized to do on the system. Authorization should be based on a principle of least privilege were an entity is only given the minimal access they need to do their job. After you are allowed to do certain items on a system, you want to make sure individuals are held accountable for their actions and you can trace back what occurred on a system through detailed auditing. As you can see all of these measures work together in synergy to properly protect critical assets. Peter Leight and Richard Hammer August 2006 Controlling Access • Least Privilege – Give someone the least amount of access they need to do their job • Need to Know – Only give them the access when they need it and take it away when it is no longer required • Separation of Duties – Break critical tasks across multiple people to limit your points of exposure • Rotation of Duties – Change jobs on a regular basis to prevent anyone from being able to get comfortable in a position and be able to cover their tracks Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Controlling Access Now that we have looked at the role that identification, authentication, authorization and accountability play, we will look at some principles associated with access control that you would utilize to make sure your security is as robust as it can possible be. In assigning access you would give someone the least amount of access they need to do their job. However this access should not be given all of the time, the access should only be granted when it is needed to perform a job function. For example, if I am the director of HR, least privilege would say that I need access to every employees personnel file. On the other hand, need to know would say only give me that access when I have to review a performance assessment and not all of the time. With least privilege we are allowing people to do their job, however we are only given them the minimal access needed and no more. In some situations this works, but what happens in the case where the minimal access granted is still too great a risk and cannot be taken. In those cases, separation of duties needs to be performed, where a given task is split between two individuals so no single individual by themselves can make a decision. Separation of duties works but the more people work together the greater the chance they will collude in order to accomplish a crime. The more people work together the power of separation of duties erodes away because people build trust. To minimize the chance of this occurring, rotation of duties needs to be performed. This is where people are rotated out of certain jobs at set intervals so the chances of two people colluding is minimized.