Hacking Exposed 7 Network Security Secrets & Solutions

advertisement
Hacking Exposed 7
Network Security Secrets & Solutions
Chapter 12 Countermeasure
Cookbook
1
Introduction
• Attack-centric view from this book vs. building
more secure systems
• Asymmetry of risk management
– Attacker’s advantage, defender’s dilemma
• Best countermeasure strategies
– General strategies
• Usability vs. security
• Increase the “cost” of attack
• (Re)move the asset, separation of duties, AAA (authenticate,
authorize, audit), layering, adaptive enhancement, orderly
failure, policy and training, simple/cheap/easy
– Example scenarios
• Desktop scenarios, sever scenarios, network scenarios, Web
application and database scenarios, mobile scenarios
2
(Re)move the Asset
• Remove the target of the attack
• Example: database index
– A website collects personally identifiable info like
government-issued identification number
• To more reliably index customers in a database
• But it is not needed by the business
– Why not use non-identifiable randomly generated
values to index?
– Better than encrypting the data that the business
doesn’t really need!
3
Separation of Duties
• Prevent, detect, and respond
– Parallel countermeasures, e.g. host intrusion protection,
network intrusion detection, incident response process
execution
• People, process, and technology
– Nature of parallel countermeasures
• Mix and match the above in a matrix!
• Checks and balances
– Coordination of duties
– Ask different accountable persons to work on the same
task
• Preventing collusion: e.g. detection folks & reaction folks
• Providing checks and balances: e.g. set firewall rules to block
access to a vulnerable service
4
Authenticate, Authorize, Audit
• Know users, limit what they can access, and check access
logs
• Off-the-shelf authentication solutions
– Multifactor solutions: RSA SecureID
– Online services: Windows LiveID and OpenID
– Frameworks: Oauth and SAML
• Customized authorization solutions
– Role-based, claims-based, mandatory vs. discretionary,
digital right management
– e.g. Microsoft’s Mandatory Integrity Controls (MIC)
• Protected Mode Internet Explorer (PMIE): isolate a compromised
web browser to a limited set of objects within the user’s
authenticated session
• Audit on authentication and authorization
– Who did what to which, when, and how
5
Layering
• Defense-in-depth or compensating controls
• Linear countermeasures vs. parallel
countermeasures
• Layer of IT stack
– Physical: secured facility
– Network: firewall, ACL
– Host: endpoint software, host-level firewall and
antimalware/antivirus
– Application: patch vulnerabilities
– Logical: access control on app’s capability and data
6
Adaptive Enhancement
• Turned on and off
• Examples
– WAF (Web Application Firewall) turned on if a certain
vulnerability cannot be patched until the next release
• Reactive compensation
– Additional challenge factor during authentication if a
user logs in less normally
• Predictive compensation
– Bank of America’s SafePass feature for online banking:
additional password for mobile devices
• Predictive compensation
7
Orderly Failure
• Risk management
– Plan your failure – self-defeating
– Worst-case scenario
• All or some components fail
• Security features fail
• Reactive countermeasures
–
–
–
–
Annual “fire drills”
Test people, process, and technology
Check failover mechanisms
After failure: fail closed or fail open?
8
Policy and Training
• Security policy
– Context where countermeasures are implemented
– System owner’s intent
– Countermeasures prescribed by security policy
• Training
– How can you do the right thing if you don’t know what
the right thing is?
– Integrated into daily workflows of affected parties
• Not disruptive hours of class training
• SecureAssist from Cigital: “security spell check” in code writing
9
Simple, Cheap, and Easy
• KISS (Keep it simple and stupid) for
countermeasure design
• 2012 Verizon Data Breach Report
– 63% of recommended preventive countermeasures
were simple and cheap
– 3~5% were difficult and expensive
– Identify and solve obvious problems
• Not necessarily “manual and home-grown”
– Often more cost-effective to deploy “umbrella”
countermeasures (e.g. firewall) to compensate for
vast sea of vulnerabilities
10
Desktop Scenarios
• Remove the asset
– Data leak prevention (DLP) across an enterprise
– AAA for consolidated remote access
• Instrument the endpoint
– Antimalware, configuration management, log shipping,
HIPS, file system integrity monitor (tripwire)
• Network-based countermeasures
– Signature-based detection
– Top talkers for data exfiltration
• Reactive countermeasures
– Most desktop malware install persistence mechanism
leveraging Windows ASEPs (AutoStart Extensibility Points)
hooks
• Orderly failure by a forensic agent
• Policy enforcement if possible
11
Server Scenarios (1/2)
• Administrative privilege restriction
– Strong AAA, e.g. Xsuite
– IAM (identity and Access Management): entitlement
review, e.g. Sarbanes-Oxley or SOX
– Hardening root access in UNIX: cracklib (password
composition tool), Secure Remote Password
(authentication and key exchange), OpenSSH,
pam_passwdqc (password length check), pam_lockout
(account lockout)
• Minimal attack surface
– Disabling unnecessary services: less listening
services/ports, less doors – legacy NetBIOS, SMB
– Using Windows Firewall to restrict access to services
12
Server Scenarios (2/2)
• Strong maintenance practices
– Windows security patching guidance
– Automated patch management tool, e.g. SMS
(System Management Server)
– Workaround in a window of exposure before
patch release: inbound port blocking
• Active monitoring, backup, and response
– Customized detection and response plans for new
vulnerabilities
13
Network Scenarios
• Lower-layer TCP/IP firewall: ports
• Upper-layer application firewall: SQL injection, crosssite scripting, etc.
• Deploy more granular firewalls with visibility and
control at higher layers
• Segment networks with higher risk from ones with
greater sensitivity: DMZ
• Attacks on network itself
– Eavesdropping and traffic redirection (ARP spoofing): limit
broadcast domains, authentication and encryption with
802.1X and WPA2 Enterprise
– DoS: asymmetrical attack pattern, Prolexic service
– DNS exploit: pay attention on configuration (restrict zone
transfers and recursive queries)
14
Web Application and Database Scenarios
• Off-the-shelf (OTS) components
– OTS packages: web servers, shopping carts, blog
management, social interaction (web chat), etc.
– Configure properly and patch religiously
– Strong DAM (Database Activity Monitoring) with
blocking capability
• Custom-developed application code
– Security program on code development
– BSIMM (Cigital’s Building Security In Maturity
Model): downloadable framework and tools to
assess yourself
15
Mobile Scenarios
• Impact due to device theft, remote hacking, malicious
apps, phone/SMS fraud, etc.
• Remove the data
– Whether the most sensitive data should be downloaded to
devices
– Physical control of attackers: device debug mode, rooting,
jailbreaking, etc.
• Keep a separate (physical or virtual) device for sensitive
activities
• Enable password lock and device wipe on successive
failed logins
• Keep system and application software up-to-date
• Be very selective about apps you download
• Install MDM (mobile device management) and/or
security software
16
Summary
• Usage vs. security
• Diversification in countermeasures: multiple
parallel or serial obstacles
• Keep it simple and stupid.
• Empirical studies by VDBR (Verizon Data
Breach Report)
17
Download