Provide secure access to network resources Control user access User groups and control mechanisms 2 2 Document the created file system 5 Set network file system controls 5 Test user access 6 Establish virus protection for a network 7 Maintain security access registers 8 Summary 9 Check your progress 9 Reading: Provide secure access to network resources 1 2005 Control user access It is very inefficient to control access for every user. The most common way of administering users is to create groups and put users into the appropriate groups. Each group is then given or denied certain access rights (or privileges) which flows onto the members of that group. It is possible for a user to be a member of more than one group and this introduces more complexity. Note, the terms access ‘rights’ and ‘privileges’ are both used in networking to mean the same thing. User groups and control mechanisms To which type of group should users be added and what mechanisms might be employed for doing this? Various server operating systems offer various types of groups. Organisational units Organisational units are designed to reflect the manner in which an organisation arranges the divisions of its business. An organisational unit (OU) in a Windows environment is more like a Context in a Novell environment. In an international organisation an OU might be a country or a global region with subordinate OUs such as Accounting, Production and so forth underneath. By default in Windows 2003 the only OU set is the domain controller. See Figure 1. 2 Reading: Provide secure access to network resources 2005 Figure 1: Default organisational unit in Windows 2003 Domain local, global and universal group scope Domains are based on hierarchical tree structures like simple organisational charts. The scope of a user’s access authority will be based upon the scope of the group of which they are a member (remembering that users can be members of more than one group). A range of levels exist for the scope of a group, for example: lowest level — domain local, eg ‘server1.au.forth.com.au’ intermediate level — global scope, eg ‘au.forth.com.au’ highest level — universal scope, eg ‘forth.com.au’. Most smaller networks consist of a single, or lowest level, domain and consequently only have domain local available as a choice. Note, in Figure 2 below where there are options available, that the scope is selected by a radio button, so only one option is available at a time. For example, if the domain is single level then the global and universal scope are disabled (greyed out). Reading: Provide secure access to network resources 2005 3 Figure 2: Domain local, global and universal group scope Individual workstation connections Windows 2000 Professional and Windows XP workstations are known as ‘secure clients’ and contain functionality to facilitate secure connection to a server as a specific unit. Windows 9X clients, however, are not secure clients and therefore may allow users to attempt connection from regions not allowed by organisational guidelines. To resolve this potential threat, user configuration can be set to allow access from only particular workstations. Logon times It may be an organisational guideline that users may connect only at certain times of the day and specific days of the week. Most server systems allow for these timing requirements to be set for each user. 4 Reading: Provide secure access to network resources 2005 Document the created file system A network file system (NFS) allows administrators to manage files on several computers inside a network — as if they were on the local hard disk. So, there’s no need to know where the files are physically located in order to access them. It’s always important to have documentation for all IT systems, but very much so for the file system. Don’t rely on the characteristics of the operating system structure residing on the computer. If a computer fails it is important to be able to confirm that the restoration process has worked correctly. Additionally, when a decision is made to update a server system, it is important to recognise the structure of the existing system. All of this requires accurate documentation. Set network file system controls How would an administrator set the network file system controls and which operating systems support network file systems (NFS)? An administrator gives users and groups access rights to files and directories. These access rights can be as restrictive as ‘read only’ through to ‘changing and deleting files and directories’. The level of access control depends very much upon the operating system controlling the objects. For example, Novell and Linux allow total control of these objects down to the file level, whereas Windows allows total control of file access only on NFSformatted partitions. The higher the degree of detail, the simpler it is to completely replicate the file system. Therefore, if each access process is documented at the time it is performed, then the overall file system documentation is relatively simple to manage. Reading: Provide secure access to network resources 2005 5 Test user access Testing user access is to ensure that: users have access to the resources they should be able to access users are being denied access according to organisational guidelines. There is nothing worse for network staff than to have users complaining about being unable to access resources that they know they should be able to access. Testing user access should be complete, that is to say, testing for user connection locally is only half the story. On a domain, many users may need to have access via remote desktop, a virtual private network (VPN) or remote access via a modem. Telecommuting and roaming is a growing means of network access. Reflect Consider a situation where you have to test the access of six different classes of users. How might the user and group structure be configured to help you carry out tests efficiently? Feedback Setting users into appropriate groups and giving access privileges to the groups will help you to streamline the tests. This is the manner in which the users should be configured at all times for efficiency. Once a class of user has been tested for correct access then all other users in that group will have similar access privileges — as long as any particular user has not been given any other privileges elsewhere. Therefore, it is important to document any privileges given to individual users as well as the access rights for each group. 6 Reading: Provide secure access to network resources 2005 Establish virus protection for a network Virus infection can have a devastating effect on the functioning of networks and can cause irretrievable damage to data and other resources on a network. It is imperative to develop mechanisms to avoid virus infection. Detecting viruses and WORMs (Write Once Read Many), a virus-like class of infection, is a very sophisticated and well-defined process. Consequently, Network Administrators have to rely on third party products to manage this process. There are a variety of third party software packages available such as Symantec Anti-virus, McAffee and PC-Cillin. Symantec Corporate Antivirus is a commonly-used product by systems network managers. Reflect Consider a network with 20 workstations and one server. All the workstations are used during the standard working day and on occasions Saturdays. How would you protect the network resources from virus infection? Feedback Many people believe that virus infections are due to Internet activity but this is not necessarily so. Users may bring floppy disks, CDs or USB memory sticks to the work environment and contaminate the network in that way. It is for this reason that some network managers choose to disable the floppy disk drive while others choose to have completely diskless workstations. There are two basic methods to test for virus infections: 1 Firstly, virus scanning software can be installed on each machine, licensed and updated from each machine to facilitate up-to-date scanning. 2 Secondly, specialised virus scanning software, specifically designed for server management, automatically deploys and updates all configured clients with the appropriate scanning applications. Reading: Provide secure access to network resources 2005 7 Maintain security access registers A security access register contains the details of users who have privileges to access the network. The register holds the user’s personal details and other relevant data related to the organisational guidelines. Registers are often managed by a database, or, they may be a ‘pen and paper’ journal. They are usually maintained by a member, or members, of the IT network staff within the organisation. Reflect We have discovered that relevant data, according to organisational guidelines, will be kept about users and access privileges. What would be useful specific data about users and access configuration that can be kept in a security access register? Feedback It is important that a clear and transparent audit trail be available about users and their access privileges so that an organisation can gauge the level of security available. It’s also important to be able to defend the organisation’s position with regard to complaints from staff about too many or too few privileges, or even privacy issues. On privacy issues, many organisations will issue a disclaimer to staff stating that the organisation’s network is for organisational data and any private data stored cannot be guaranteed to be private. Specific data such as: user name, logon, who created the configuration for a user, who authorised the configuration, and the date of configuration might be headings used in a security register. These registers become important tools in managing security audits. 8 Reading: Provide secure access to network resources 2005 Summary In this reading we have covered the following aspects of providing secure access to network resources: Controlling user access — the methods built into the operating system that will allow you to take control Documenting the created file system — considering which file system is most appropriate and applicable and identify folder directory parameters Testing user access — creating procedures to test all the user needs in a variety of access scenarios Establishing virus protection for a network — methods and software packages that are used to prevent or minimise virus infection Maintaining security access registers — why such a register is needed and specific data it holds. All of this information needs to be interpreted by you into the context of whatever network operating system you are called to administer. Check your progress Now you should try to do the Practice activities in this topic. If you’ve already tried them, have another go and see if you can improve your responses. When you feel ready, try the ‘Check your understanding’ activity in the Preview section of this topic. This will help you decide if you’re ready for assessment. Reading: Provide secure access to network resources 2005 9