Windows Vista Security

advertisement
Securing
WINDOWS VISTA
Agenda
 Hard Drive Encryption
 User Account Permissions
 Root Level Access
 Firewall Protection
 Malware Protection
BitLocker Drive Encryption
Available in Windows Vista Ultimate - $400.00
Why is BitLocker Needed?
 Reduces the threat of data theft or exposure from lost, stolen,
or recycled computers
 Statistics
 A laptop is stolen every 53 seconds in the USA - Symantec
 Over 600,000 laptops are stolen each year in the USA - Safeware




Insurance Agency
97% of these laptops are never recovered – FBI
The second most common crime, just after identity theft, is
laptop theft – FBI
Lost or stolen laptops are the top culprit of data leaks/breaches,
accounting for 45% (of all the incidents studied) - The Identity
Theft Resource Center
Laptops are the number-one item stolen in San Francisco - San
Francisco Police Department
BitLocker Drive Encryption
Requires a version 1.2 Trusted Platform Module for
its two main security services
BitLocker Volumes Schematic
Typical Disk Partitioning
OS Volume
(active)
(Drive C:)
Drive 0
OEM
Maintenance
Volume
Disk Partitioning with BitLocker
System Volume
(Active)
(Drive D:)
OS Volume
(Unencrypted)
(Encrypted with
OEM
Bitlocker)
Maintenance
(Drive C:)
Volume
Drive 0
What are BitLocker’s services?
 Boot file integrity
 Completed using the TPM
 Creates a unique fingerprint of the system
 TPM provides access to the encryption keys only if
fingerprint is verified
 Once unique fingerprint is verified BitLocker uses
TPM to unlock the OS Volume and permits
Windows to boot normally
What are BitLocker’s services?
 OS volume encryption
 BitLocker can encrypt the entire OS volume
 EFS cannot encrypt system files
 The OS volume contains:
 Windows OS and it support files
 Page files
 Hibernation files
What if a TPM does not exist
on the PC?
 A USB flash drive can be used to store a
startup key
 The startup key is needed during each boot or
return from hibernation
 When using a USB flash drive BitLocker
cannot perform the OS Integrity Check
BitLocker Drive Encryption
Additional Authentication Modes
What other authentication is
there with BitLocker?
 PIN
 This forces BitLocker to use a PIN (entered by the user) and
the TPM to decrypt the information on the OS Volume
 If forgotten then the recovery console must be used to
recover the BitLocker Keys
 Startup Key
 A long string of numeric characters that is unique for each
computer usually stored on a USB flash drive but not a
smart card
 BIOS must be able to detect USB device prior to OS starting
up
 Should be removed after boot or return from hibernation
BitLocker Drive Encryption
Recovery
What if something goes
wrong?
 BitLocker has built in recovery capabilities.
 This will recover the BitLocker keys needed to
decrypt the OS Volume
 Recovery involves a 48-bit recovery key
 Randomly generated during BitLocker Setup
 Recovery key can be stored:
 USB Flash drive
 Printed
BitLocker Drive Encryption
Restriction and Limitations
What are BitLocker’s
limitations?
 Offline Protection
 BitLocker only protects the PC when it is offline
 Only OS Volume encrypted
 Lost recovery key = lost data
BitLocker Drive Encryption
Availability and Requirements
What is necessary to use
BitLocker?
 Windows Vista Ultimate
 BitLocker with OS integrity checking
 A version 1.2 TPM and a BIOS compliant with
version 1.2 TCG (trusted computing group) to
establish the chain of trust for pre-OS boot
 Support for TCG-specified static root trust
measurement
 Partitioning into at least 2 volumes (OS Volume,
BitLocker Boot Partition)
What is necessary to use
BitLocker?
 Windows Vista Ultimate
 BitLocker without OS integrity checking
 BIOS support for Class 2 USB mass-storage devices
 Must include capabilities to read and write in the preOS boot environment
 Be partitioned to include 2 volumes (OS Volume,
BitLocker Boot Partition)
Agenda
 Hard Drive Encryption
 User Account Permissions
 Root Level Access
 Firewall Protection
 Malware Protection
User Account Control
What are user account controls
and how do they work?
 Enables a user to have a non-administrator
account and still be productive
 All users operate a lowest possible privileges
 Vista has a special account that runs in AAM
(admin approval mode)
 Means that the user either supplies administrative
credentials or consents (depending on group
policy settings) to perform typical admin functions
 EXAMPLE: install a program
UAC continued
 Microsoft places a high value on application
compatibility
 Microsoft has tried to ensure that existing
applications can run without administrative
privileges
UAC continued
 Determining privileged tasks
 Temporarily elevating privileges
 Isolating system messages
 Ensuring existing applications run
Agenda
 Hard Drive Encryption
 User Account Permissions
 Root Level Access
 Firewall Protection
 Malware Protection
Root Level Access
User
Admin
Services
Service
…
Service
…
Service
A
Kernel
Service
1
D D
D Service
2
Service
3
Service
B
D Kernel Drivers
D User-mode Drivers
Restricted services
D D D
Low rights
programs
What can operate at root level?
 Microsoft has included the ability for file and
registry virtualization.
 This pulls all programs away from operating at
the kernel level
 Only trusted and “signed” programs can operate
at root or kernel level
 To get signed a VeriSign Class 2 Commercial
Software Publisher Certificate must be received
 This is coded into the binary of the program therefore
removing performance hampering validation
Agenda
 Hard Drive Encryption
 User Account Permissions
 Root Level Access
 Firewall Protection
 Malware Protection
Windows Vista Firewall
Improvements for IT
Departments?
 The Windows Vista firewall will now have the
ability to block outgoing traffic
 Windows XP only blocked incoming traffic
 Provides the ability to stop peer-to-peer
connections
 Provides the ability to stop instant messaging
programs
Agenda
 Hard Drive Encryption
 User Account Permissions
 Root Level Access
 Firewall Protection
 Malware Protection
Windows Defender
What does windows defend against?
 Spyware
 Uses automatic definition updates provided
by Microsoft to remove known spyware from
the windows vista system
QUESTIONS
Download