Microsoft Security "Beyond Patching"

advertisement

Beyond Patching

Dean Iacovelli

Chief Security Advisor – State and Local Government

Microsoft Corporation deaniac@microsoft.com

Objectives

Address your concerns about security

Update on current trends

Current initiatives at Microsoft

Future security product/solution roadmap

Agenda

1.

Defining and managing the risk

2.

System Integrity

3.

Identity management

4.

Trustworthy Identity

5.

Client protection

6.

Server protection

7.

Network protection

8.

Summary, Q&A

My Role as SLG CSA

Overall security policy and strategy for MS SLG

MS spokesperson to/from SLG customers

Information broker – resources, best practices, programs

Coordinator for incident response communication, security readiness

Not goaled on revenue

Basically: Help ensure SLG customers have a good experience dealing with security on the MS platform

Your Feedback ?

Challenges

Worms / viruses

Spyware

Spam

Patch management

Network access control

Identity management

Best practices / guidance

Looking at Linux for security reasons ?

Understanding Your Adversary

National Interest

Spy

Personal Gain

Personal Fame

Curiosity

Vandal

Script-Kiddy Hobbyist

Hacker

Thief

Trespasser

Author

Fastest growing segment

Tools created by experts now used by less skilled attackers and criminals

Expert Specialist

State and Local Security Trends

Attacks becoming less numerous, more nasty

Viruses/worms still lead in financial cost BUT

6x increase in $ lost from unauthorized information access from 2004 to

2005 (FBI/CSI)

2x increase in $ lost from theft of proprietary information from 2004 to

2005 (FBI/CSI)

Botnets (used for cyber extortion) have jumped from average of 2500 machines in 2004 to 85,000 in 2006

Why sniff the net when you can hack the site or the password?

95% reported 10+ website incidents last year (FBI/CSI)

15% of enterprise hosts have had keystroke loggers detected, 3x in 1 year (Webroot and Sophos)

Major NT4/Win 98 supportability issues

Enterprise patching and management still not under control

What your neighbor isn’t doing IS your problem

Real cost is lost of trust

Closer Look at Malware Data (MSRT)

Release

January

February

March

April

May

June

Total

Days

Live

28

28

35

28

35

28

362

Executions

124,613,632

118,209,670

145,502,003

125,150,400

164,283,730

162,763,946

1,804,565,652

Disinfections

Value

239,197

%

0.1920%

351,135 0.2970%

443,661 0.3049%

590,714

1,154,345

0.4720%

0.7027%

642,955

0.3950%

8,679,656 0.481%

Exploit

Worm s

15%

Mass

Mailing

Worm s

15%

Instant

Msg.

Worm s

1%

Trojans

1%

Bots

58%

Rootkits

10%

Source: Microsoft

Machines

Cleaned

(log)

1000000

100000

10000

1000

100

10

1

1 2 3 4 5 6

Malware per Machine

7 8 9

Video game cheats

#3 in previous chart

Celebrities

Song lyrics

70

60

50

40

30

20

10

0

0 100 200 300 400

Site ranking based on number of hosted exploit URLs

Trends in Security Spending

$497 per employee

$354 operations

$143 capital

Even worse for smaller agencies - as much as

$650

No economies of scale

SLG spends ~10x

Federal and most of private sector

Lack of centralized strategy / tools

Getting worse

Federal trending down from CY05

SLG trending up

Various new state infosec laws may be impacting costs but still serious issue

MS Security Statistical Snapshot

263M

downloads of XP SP2

75M

downloads of Microsoft Anti-Spyware beta

9.7M

consumers using SP2 Firewall

332M

machines using Automatic Update or

Windows Update

135

legal actions against spammers worldwide

121

phishing sites sued

578

Microsoft CISSPs (and counting…)

Microsoft Security Strategy

Overview

Threat and Vulnerability Mitigation

Client

Protection

Protect PCs

& devices from malicious software

Server

Protection

Protect servers from malicious software

Network

Protection

Protect network from malicious software & inappropriate access

Identity and Access Management

Allow legitimate users secure access to machines, applications and data

System Integrity

Make systems inherently safer and more secure

Security Development Lifecycle

Security Development Lifecycle

Security Response Center

Better Updates And Tools

Threat Modeling Example

MS03-007

The underlying DLL

(NTDLL.DLL) not vulnerable

Code made more conservative during Security Push

Even if it was vulnerable

IIS 6.0 not running by default on

Windows Server 2003

Even if it was running IIS 6.0 doesn’t have WebDAV enabled by default

Even if it did have

WebDAV enabled

Even if the buffer was large enough

Even if it there was an exploitable buffer overrun

Maximum URL length in IIS 6.0 is 16kb by default

(>64kb needed)

Process halts rather than executes malicious code, due to buffer-overrun detection code (-GS)

Would have occurred in w3wp.exe

which is now running as ‘network service’

89

50

11

16

Service Pack 3

3

7

2003

Bulletins in period prior to release

Bulletins since

TwC release

SQL Server 2000 SP3 released 1/17/2003

Released

11/29/2000

Released

09/28/2003

1027 Days After Product Release

* As of February 14, 2006

Released

05/31/2001

Released

11/17/2003

Bulletins 820 Days

After Product Release

Case Study

How We Tested WMF Patch

415 apps (ms & third party)

6 supported version of the o/s in 23 languages

15k print variations, 2800 print pages verified

2000 wmf’s analyzed, 125 malicious wmf’s tested

12k images verified for regressions

22,000 hours of stress testing

450k total test cases

Patch Management Initiative

Progress to Date

Informed & Prepared

Customers

Consistent & Superior

Update Experience

Superior Patch Quality

Best Patch & Update

Management Solutions

Better security bulletins and KB articles

IT SHOWCASE: How Microsoft IT Does Patch Management

Standardized patch and update terminology

Moved from 8 installers to 2 (update.exe and MSI)

Standardized patch naming and switch options

Improved patch testing process and coverage

Expanded test process to include customers

Reduced reboots by 10%, targeting 50% in Vista

Microsoft Update

WSUS

SMS 2003

Update Impact Analyzer

Determine How Patches Will Affect Critical Apps

Download update profiles

Microsoft

Customer

Administrator

`

Enter data & get reports

Upload application profiles

`

`

`

Fundamentals

“You can only manage what you can measure”

…and you can only secure what you can manage (and find  )

Decentralization may be a reality but it’s not a best practice

Set policy

Active Directory

Central policy, local defense

Delegate back business-specific policy control

Audit policy

Turning it on AFTER the incident much less useful

Don’t wait for the incident to look at the logs

Standardize builds, supported applications

Enterprise assets are not toys

Vista will make this easier, possible in XP too: http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/ luawinxp.mspx

Beyond Patching: The Problem

• Patching is no longer strategic

• Moving from security to operations like backups

• New threats require new models

• Internal network is NOT trusted

• Medieval castle model is the only response

• Automated attacks require automated defenses

Microsoft Security Strategy

Overview

Threat and Vulnerability Mitigation

Client

Protection

Protect PCs

& devices from malicious software

Server

Protection

Protect servers from malicious software

Network

Protection

Protect network from malicious software & inappropriate access

Identity and Access Management

Allow legitimate users secure access to machines, applications and data

System Integrity

Make systems inherently safer and more secure

Allow only legitimate users secure, policy-based access to machines, applications and data

Trustworthy

Identity

Access Policy

Management

Information

Protection

Directory Services

Ensure users are

Lifecycle Management who they claim

Role-based Access Control

Provide access

Group Policy Management based on policy

Rights Management Services

Services lifecycle

Fundamentals

Reduce

Consolidate to fewer identity stores

Leverage metadirectories to simplify sign on, automate/standardize identity business rules

Reuse

Leverage globally relevant attributes across all applications

Place non-globally relevant attributes in app-coupled

LDAP stores

Recycle

Leverage federation to use your credentials on business partner networks

Microsoft Security Strategy

Overview

Threat and Vulnerability Mitigation

Client

Protection

Protect PCs

& devices from malicious software

Server

Protection

Protect servers from malicious software

Network

Protection

Protect network from malicious software & inappropriate access

Identity and Access Management

Allow legitimate users secure access to machines, applications and data

System Integrity

Make systems inherently safer and more secure

Fundamentals

Medieval castle model

The internal network is NOT trusted

Central policy, local defense

Leverage tools you already own

Windows firewall

Active Directory group policy

Phishing filters

Encrypting file system

IPSec logical segmentation

Isolate what you can’t defend

Helps protect the system from attacks from the network

Enables more secure Email and

Instant Messaging experience

Enables more secure Internet experience for most common Internet tasks

Provides system-level protection for the base operating system

Internet Explorer 7

Social Engineering Protections

Phishing Filter and Colored Address Bar

Dangerous Settings Notification

Secure defaults for all settings

Protection from Exploits

Protected Mode to prevent malicious software

Code quality improvements

ActiveX Opt-in

Application Compatibility Toolkit V5.0

Analyze your portfolio of

Applications, Web Sites, and Computers

Evaluate operating system deployments or impact of operating system updates

Rationalize and Organize by Applications, Web Sites, and Computers

Prioritize compatibility efforts with filtered reporting

Add and manage issues and solutions for your personal computing environment

Deploy automated mitigations to known compatibility issues

Send/Receive compatibility information to Online Compatibility

Exchange

Remove most prevalent viruses

Remove all known viruses

Real-time antivirus

Remove all known spyware

Real-time antispyware

Central reporting and alerting

Customization

IT Infrastructure

Integration

MSRT

Windows

Defender

Windows

Live Safety

Center

Windows

OneCare

Live

Microsoft

Client

Protection

FOR INDIVIDUAL USERS FOR BUSINESSES

Shared Computer Toolkit for

Windows XP

Windows Disk Protection

Prevent unapproved changes to the

Windows partition

Allow critical updates and antivirus updates

Profile Manager

Create “persistent” user profiles on unprotected partitions

Delete locked user profiles

User Restrictions

Restrict untrusted users from files and settings

Lock user profiles for protection and privacy

Accessibility

Accessibility settings & utilities when restricted

Quick access for repeat use

Getting Started

• Use and learn about the Toolkit

• Quick access toolbar

Tools are scriptable. Additional command-line tools included.

Comprehensive Help and Handbook with supplemental security guidance.

Next Generation Security and Compliance

Fundamentals

Threat & Vulnerability

Mitigation

Identity & Access Control

Engineered for the future

Security Development Lifecycle

Threat Modeling

Code Scanning

Service Hardening

Protect against malware and intrusions

Code Integrity

IE Protected Mode

Windows Defender

IPSEC/Firewall integration

Network Access Protection

Enable secure access to information

User Account Control

Plug and Play Smartcards

Granular auditing

Simplified Logon architecture

Information Protection

BitLocker Drive Encryption

EFS Smartcard key storage

RMS client

Control over removable device installation

XPS Document + WPF APIs

InfoCard Overview

Secure sharing of your info online

Simple user abstraction

Manage compartmentalized versions of your identity

Strong computer generated keys instead of human generated passwords

Relates to familiar models

Gov’t ID card, driver’s license, credit card, membership card, …

Flexible issuance

Self-issued – eBay, Amazon

Issued by external authority – Visa, Government

Implemented as secure subsystem

Protected UI, anti-spoofing techniques, encrypted storage

Built on WS-Federation web standards

Microsoft Security Strategy

Overview

Threat and Vulnerability Mitigation

Client

Protection

Protect PCs

& devices from malicious software

Server

Protection

Protect servers from malicious software

Network

Protection

Protect network from malicious software & inappropriate access

Identity and Access Management

Allow legitimate users secure access to machines, applications and data

System Integrity

Make systems inherently safer and more secure

Security Configuration Wizard

Windows Server 2003 SP1

Security lockdown tool for

Windows Server 2003

Roles-based paradigm

Focused on Attack

Surface Reduction

Disables unnecessary services

Disables unnecessary web extensions

Blocks unnecessary ports

Configures audit SACLs

Operational infrastructure

Client-Server deployment infrastructure

Support for Group Policybased deployment

Compliance Analysis

Rollback support

Microsoft Antigen Line of Products

Threat & Vulnerability

Mitigation

Highlights

Unique multi-engine approach for faster detection and broader protection

Integrated virus and spam protection

Integrated Microsoft AV engine

RTM in Q2 2006

Microsoft Security Strategy

Overview

Threat and Vulnerability Mitigation

Client

Protection

Protect PCs

& devices from malicious software

Server

Protection

Protect servers from malicious software

Network

Protection

Protect network from malicious software & inappropriate access

Identity and Access Management

Allow legitimate users secure access to machines, applications and data

System Integrity

Make systems inherently safer and more secure

Network Access Protection

Longhorn Server (2007)

Policy Validation

Determines whether the computers are compliant with the company’s security policy. Compliant computers are deemed “healthy.”

Network Restriction

Restricts network access to computers based on their health.

Remediation

Provides necessary updates to allow the computer to

“get healthy.” Once healthy, the network restrictions are removed.

Ongoing Compliance

Changes to the company’s security policy or to the computers’ health may dynamically result in network restrictions.

Network Access Protection Walkthrough

Corporate Network

Restricted Network

Remediation

Servers

System Health

Servers

Here you go.

Can I have updates?

May I have access?

health status.

Ongoing policy updates to IAS Policy Server

Should this client be restricted based on its health?

Client

You are given restricted access until fix-up.

Network

Access

Device

(DHCP, VPN) client, request it to

IAS Policy

Server

Client is granted access to full intranet.

NAP - Enforcement Options

Unhealthy Client Enforcement Healthy Client

DHCP

Full IP address given, full access

VPN (MS and 3 rd

Party)

Full access

Restricted set of routes

Restricted VLAN

802.1X

IPsec

Full access Restricted VLAN

Can communicate with any trusted peer

Healthy peers reject connection requests from unhealthy systems

Complements layer 2 protection

Works with existing servers and infrastructure

Flexible isolation

NAP Partner Community

Getting Started

Beta available now

Preparing for NAP will take effort and time!

Deployment preparation tasks:

Health Modeling

Health Policy Zoning

IAS (RADIUS) Deployment

Zone Enforcement Selection

Exemption Analysis

Change Process Control

Phased rollout

Rollout VPN solution to test health policy

Rollout IPSec segmentation to test wired enforcement

Roadmap

Frontbridge hosted services for antivirus and anti-spam filtering

(for businesses)

Windows Live OneCare

(for consumers)

Next generation of services

ISA Server 2004

Sybari Antigen antispam and anti-virus for Email, IM and

SharePoint

Windows XPSP2

Windows Server 2003 SP1

Anti-malware tools

Microsoft Update

Windows Server

Update Services

Microsoft Client Protection

Microsoft Antigen Anti-virus and Anti-spam for messaging and collaboration servers

ISA Server 2006

Content filtering services

Next generation of security products

Windows AntiSpyware

Windows Vista

Firewall

Services Hardening

Network Access

Protection

IPSec Enhancements

Audit Collection Services

Summary

It’s all one network. Period.

Need to be securing for tomorrow’s threats, not yesterday’s

Defense in depth is and has always been the only effective strategy

Enterprise patch management will free us for more strategic work

Every machine deserves a good defense

Contact info:

Dean Iacovelli

Chief Security Advisor -

State and Local Government

Microsoft Corporation deaniac@microsoft.com

Slides available at: www.iacovelli.info/work/secgtc.ppt

Appendix

Tools / Products

Application Compatibility Toolkit 5.0 beta sign up http://connect.microsoft.com/

Network Access Protection http://www.microsoft.com/nap

Microsoft Baseline Security Analyzer (MBSA) http://www.microsoft.com/mbsa

Windows Server Update Services (WSUS) http://www.microsoft.com/wsus

Windows Server Update Services (WSUS) http://www.microsoft.com/wsus

IE 7 http://www.microsoft.com/windows/ie/default.mspx

Client Protection http://www.microsoft.com/windowsserversystem/solutions/security/clientp rotection/default.mspx

Vista security http://www.microsoft.com/technet/windowsvista/security/default.mspx

Security Configuration Wizard http://www.microsoft.com/windowsserver2003/technologies/security/confi gwiz/default.mspx

Guidance and Training

MICROSOFT

Security Development Lifecycle: http://msdn.microsoft.com/security/default.aspx?pull=/library/enus/dnsecure/html/sdl.asp

Security Guidance Centers http://www.microsoft.com/security/guidance

Security Online Training https://www.microsoftelearning.com/security/

XP SP2 deployment training: https://www.microsoftelearning.com/xpsp2

Microsoft IT Security Showcase http://www.microsoft.com/technet/itsolutions/msit/default.mspx#EDBAAA

Security Newsletter http://www.microsoft.com/technet/security/secnews/default.mspx

Security Events and Webcasts http://www.microsoft.com/seminar/events/security.mspx

Security Notifications via e-mail http://www.microsoft.com/technet/security/bulletin/notify.mspx

MS Security blogs: http://www.microsoft.com/technet/security/community/articles/art_malwarefaq.mspx

Security Bulletin Search Page http://www.microsoft.com/technet/security/current.aspx

Security Bulletin Webcast http://www.microsoft.com/technet/security/bulletin/summary.mspx

Writing Secure Code, 2nd edition http://www.microsoft.com/mspress/books/5957.asp

Building and Configuring More Secure Web Sites http://msdn.microsoft.com/library/enus/dnnetsec/html/openhack.asp

Windows XP Security Guide, includes SP2 http://www.microsoft.com/technet/security/prodtech/winclnt/secwinxp/default.mspx

Security Risk Management Guide http://go.microsoft.com/fwlink/?LinkId=30794

Windows NT 4.0 and Windows 98 Threat Mitigation Guide http://go.microsoft.com/fwlink/?linkid=32048

Microsoft Identity and Access Management Series http://go.microsoft.com/fwlink/?LinkId=14841

OTHER

FBI / CSI 2005 security survey: http://www.gocsi.com/forms/fbi/csi_fbi_survey.jhtml;jsessionid=KPE5WYV1ICYNCQSNDBECKH

0CJUMEKJVN

Age

(days)

02.00

10.94

09.66

09.13

03.10

01.04

10.93

08.07

01.02

10.34

08.96

UNK

Name nubela.net

winnt.bigmoney.biz (randex)

PS 7835 - y.eliteirc.co.uk

y.stefanjagger.co.uk (#y) ganjahaze.com

PS 8049 - 1.j00g0t0wn3d.net

pub.isonert.net

irc.brokenirc.net

PS 8048 - grabit.zapto.org

dark.naksha.net

PS 7865 - lsd.25u.com

PS ? - 69.64.38.221

Server dns.nubela.net

winnt.bigmoney.biz

y.eliteirc.co.uk

y.stefanjagger.co.uk

ganjahaze.com

1.j00g0t0wn3d.net

pub.isonert.net

irc.brokenirc.net

grabit.zapto.org

dark.naksha.net

lsd.25u.com

69.64.38.221

MaxSize

10725

2393

2061

1832

1507

3689

537

649

62

UNK

UNK

UNK

As of 6 March 2006:

Tracking 13053 bot-nets of which 8524 are active

Average size is 85,000 computers

Defense In Depth – Factoring/Profiling

Reduce size of high risk layers

Segment the services

Increase # of layers

D Kernel Drivers

D User-mode Drivers

Service

A

Service

Service

Service

1

D

D D

Service

3

Service

2

Service

B

D

D

D

Vista Service Changes

Services common to both platforms

Windows XP SP2

LocalSystem

Vista client

LocalSystem

Firewall Restricted

Wireless Configuration

System Event

Notification

Network Connections

(netman)

COM+ Event System

NLA

Rasauto

Shell Hardware

Detection

Themes

Telephony

Windows Audio

Error Reporting

Workstation

ICS

RemoteAccess

DHCP Client

W32time

Rasman browser

6to4

Help and support

Task scheduler

TrkWks

Cryptographic Services

Removable Storage

WMI Perf Adapter

Automatic updates

WMI

App Management

Secondary Logon

BITS

LocalSystem

Demand started

Network Service

Fully Restricted

Network Service

Network Restricted

Local Service

No Network Access

Network

Service

DNS Client

Local Service SSDP

WebClient

TCP/IP NetBIOS helper

Remote registry

Local Service

Fully Restricted

Removable Storage

WMI Perf Adapter

Automatic updates

BITS

DNS Client

ICS

RemoteAccess

DHCP Client

W32time

Rasman

TrkWks

Cryptographic Services

Wireless Configuration

System Event Notification

Network Connections

Shell Hardware Detection

Telephony

Windows Audio

TCP/IP NetBIOS helper

WebClient

SSDP

WMI

App Management

Secondary Logon browser

6to4

Task scheduler

IPSEC Services

Server

NLA

Rasauto

Themes

COM+ Event System

Error Reporting

Event Log

Workstation

Remote registry

Windows Vista Firewall

Combined firewall and IPsec management

New management tools – Windows

Firewall with Advanced Security

MMC snap-in

Reduces conflicts and coordination overhead between technologies

Firewall rules become more intelligent

Specify security requirements such as authentication and encryption

Specify Active Directory computer or user groups

Outbound filtering

Enterprise management feature – not for consumers

Simplified protection policy reduces management overhead

User Account Control (UAC)

Previously known as “LUA”

Users will logon as non-administrator by default

Protects the system from the user

Enables the system to protect the user

Consent UI allows elevation to administrator

Applications and administrator tools should be UAP aware

Differentiate capabilities based on UAP

Apply correct security checks to product features

Start testing your software against Vista now!

Standard UAC Prompt

Application Installation as a Standard User

Group Policy

Device Restriction

BitLocker™ Drive Encryption

Designed specifically to prevent malicious users from breaking Windows file and system protections

Provides data protection on

Windows systems, even when the system is in unauthorized hands or is running a different or exploiting

Operating System

A Trusted Platform Module

(TPM) or USB flash drive is used for key storage

BitLocker

Trusted Platform Module

Smartcard-like module on system motherboard

Helps protect secrets

Performs cryptographic functions

Can create, store and manage keys

Performs digital signature operations

Holds Platform Measurements

(hashes)

Anchors chain of trust for keys and credentials

Protects itself against attacks

TPM 1.2 spec: www.trustedcomputinggroup.org

Download