Title: Administering Security
1Administering Security
- Vulnerabilities, Risk Analysis, and Security
Policy
2Vulnerabilities
3Vulnerabilities
- Security objectives
- Prevent attacks
- Detect attacks
- Recover from attacks
- Attacks against weaknesses in the information
systems - Need find weaknesses
4Identifying and Eliminating Weaknesses
- Vulnerability monitoring
- Secure system development
- User training and awareness
- Avoiding single point of failure
5I. Vulnerability Monitoring
- Identify potential weaknesses in existing
information systems - Reveal wide-range of vulnerabilities
6I. Security Flaws
- Secure software installation
- Correct installation of software
- Change default settings
- Validate upgrades/changes
- Patch new security flaws
7I. Vulnerability Detection Tools
- Computer Oracle and Password System (COPS) FREE
- Checks vulnerabilities of UNIX systems
- Secure Analysis Tool for Auditing Networks
(SATAN) FREE - SAFEsuite (Internet Security Systems, Inc.)
- Family of network security assessment tools (web
security scanner, firewall scanner, intranet
scanner, system security scanner) - Keyed to the IP address of the customer
8I. Keeping up with Security Publications
- Legal publications how to remove vulnerabilities
- CERT advisories
- SANS Security Digest
- Hacker publications how to exploit known
vulnerabilities - Security mailing lists
9II. Building Secure Systems
- 1960s US Department of Defense (DoD) risk of
unsecured information systems - 1981 National Computer Security Center (NCSC) at
the NSA - DoD Trusted Computer System Evaluation Criteria
(TCSEC) Orange Book
10II. National Information Assurance Partnership
(NIAP)
- 1997 National Institute of Standards and
Technology (NIST), National Security Agency
(NSA), and Industry - Aims to improve the efficiency of evaluation
- Transfer methodologies and techniques to private
sector laboratories - Functions developing tests, test methods, tools
for evaluating and improving security products,
developing protection profiles and associated
tests, establish formal and international schema
for CC.
11III. Security Awareness and Training
- Major weakness users unawareness
- Organizational effort
- Educational effort
- Customer training
- Federal Trade Commission program to educate
customers about web scams
12IV. Avoid Single Point of Failure
- Critical information resources
- Identification
- Backup
- Hiding
- Separation of duties
- Multi-person requirements
- Limit temptations
13Risk Analysis
14Overview
- Definition and Purpose Of Risk Analysis
- Elements of Risk Analysis
- Quantitative vs Qualitative Analysis
- Quantitative Example
- Qualitative Example
15Risk Management Cycle
From GAO/AIMD-99-139
16What is Risk Analysis?
- The process of identifying, assessing, and
reducing risks to an acceptable level - Defines and controls threats and vulnerabilities
- Implements risk reduction measures
- An analytic discipline with three parts
- Risk assessment determine what the risks are
- Risk management evaluating alternatives for
mitigating the risk - Risk communication presenting this material in
an understandable way to decision makers and/or
the public
17Benefits of Risk Analysis
- Assurance that greatest risks have been
identified and addressed - Increased understanding of risks
- Mechanism for reaching consensus
- Support for needed controls
- Means for communicating results
18Basic Risk Analysis Structure
- Evaluate
- Value of computing and information assets
- Vulnerabilities of the system
- Threats from inside and outside
- Examine
- Availability of security countermeasures
- Effectiveness of countermeasures
- Costs (installation, operation, etc.) of
countermeasures
19Who should be Involved?
- Security Experts
- Internal domain experts
- Knows best how things really work
- Managers responsible for implementing controls
20Critical Assets
- People and skills
- Goodwill
- Hardware/Software
- Data
- Documentation
- Supplies
- Physical plant
- Money
21Threats
- Attacks against key security services
- Confidentiality, integrity, availability
- One threat classification
- Disclosure
- Deception
- Disruption
- Usurpation
22Example Threat List
- T35 Operating System Penetration/Alteration
- T36 Operator Error
- T37 Power Fluctuation (Brown/Transients)
- T38 Power Loss
- T39 Programming Error/Bug
- T40 Sabotage
- T41 Static Electricity
- T42 Storms (Snow/Ice/Wind)
- T43 System Software Alteration
- T44 Terrorist Actions
- T45 Theft (Data/Hardware/Software)
- T46 Tornado
- T47 Tsunami (Pacific area only)
- T48 Vandalism
- T49 Virus/Worm (Computer)
- T50 Volcanic Eruption
- T17 Errors (All Types)
- T18 Electro-Magnetic Interference
- T19 Emanations Detection
- T20 Explosion (Internal)
- T21 Fire, Catastrophic
- T22 Fire, Major
- T23 Fire, Minor
- T24 Floods/Water Damage
- T25 Fraud/Embezzlement
- T26 Hardware Failure/Malfunction
- T27 Hurricanes
- T28 Injury/Illness (Personal)
- T29 Lightning Storm
- T30 Liquid Leaking (Any)
- T31 Loss of Data/Software
- T32 Marking of Data/Media Improperly
- T33 Misuse of Computer/Resource
- T34 Nuclear Mishap
- T01 Access (Unauthorized to System - logical)
- T02 Access (Unauthorized to Area - physical)
- T03 Airborne Particles (Dust)
- T04 Air Conditioning Failure
- T05 Application Program Change
- (Unauthorized)
- T06 Bomb Threat
- T07 Chemical Spill
- T08 Civil Disturbance
- T09 Communications Failure
- T10 Data Alteration (Error)
- T11 Data Alteration (Deliberate)
- T12 Data Destruction (Error)
- T13 Data Destruction (Deliberate)
- T14 Data Disclosure (Unauthorized)
- T15 Disgruntled Employee
- T16 Earthquakes
23Vulnerabilities
- Flaw or weakness in system
- Security Procedures
- Design
- Implementation
- Threats trigger vulnerabilities
- Accidental
- Malicious
24Example Vulnerabilities
- Physical
- V01 Susceptible to unauthorized building access
- V02 Computer Room susceptible to unauthorized
- access
- V03 Media Library susceptible to unauthorized
- access
- V04 Inadequate visitor control procedures
- (and 36 more)
- Administrative
- V41 Lack of management support for security
- V42 No separation of duties policy
- V43 Inadequate/no computer security plan policy
V47 Inadequate/no emergency action plan (and 7
more) Personnel V56 Inadequate personnel
screening V57 Personnel not adequately trained
in job ... Software V62 Inadequate/missing
audit trail capability V63 Audit trail log not
reviewed weekly V64 Inadequate control over
application/program changes
Communications V87 Inadequate communications
system V88 Lack of encryption V89 Potential for
disruptions ... Hardware V92 Lack of hardware
inventory V93 Inadequate monitoring of
maintenance personnel V94 No preventive
maintenance program V100 Susceptible to
electronic emanations
25Controls
- Mechanisms or procedures for mitigating
vulnerabilities - Prevent
- Detect
- Recover
- Understand cost and coverage of control
- Controls follow vulnerability and threat analysis
26Example Controls
- C01 Access control devices - physical
- C02 Access control lists - physical
- C03 Access control - software
- C04 Assign ADP security and assistant in writing
- C05 Install-/review audit trails
- C06 Conduct risk analysis
- C07Develop backup plan
- C08 Develop emergency action plan
- C09 Develop disaster recovery plan
- ...
- C21 Install walls from true floor to true
ceiling - C22 Develop visitor sip-in/escort procedures
- C23 Investigate backgrounds of new employees
- C24 Restrict numbers of privileged users
- C25 Develop separation of duties policy
- C26 Require use of unique passwords for logon
C27 Make password changes mandatory C28 Encrypt
password file C29 Encrypt data/files C30
Hardware/software training for personnel C31Prohi
bit outside software on system ... C47 Develop
software life cycle development program C48
Conduct hardware/software inventory C49
Designate critical programs/files C50 Lock
PCs/terminals to desks C51 Update communications
system/hardware C52 Monitor maintenance
personnel C53 Shield equipment from
electromagnetic interference/emanations C54Identi
fy terminals
27Risk Control Trade Offs
- Only Safe Asset is a Dead Asset
- Asset that is completely locked away is safe, but
useless - Trade-off between safety and availability
- Do not waste effort on efforts with low loss
value - Dont spend resources to protect garbage
- Control only has to be good enough, not absolute
- Make it tough enough to discourage enemy
28Types of Risk Analysis
- Quantitative
- Assigns real numbers to costs of safeguards and
damage - Annual loss expectance (ALE)
- Probability of event occurring
- Can be unreliable/inaccurate
- Qualitative
- Judges an organizations risk to threats
- Based on judgment, intuition, and experience
- Ranks the seriousness of the threats for the
sensitivity of the asserts - Subjective, lacks hard numbers to justify return
on investment
29Qualitative Risk Analysis
- Generally used in Information Security
- Hard to make meaningful valuations and meaningful
probabilities - Relative ordering is faster and more important
- Many approaches to performing qualitative risk
analysis - Same basic steps as quantitative analysis
- Still identifying asserts, threats,
vulnerabilities, and controls - Just evaluating importance differently
30Key Points
- Key Elements of Risk Analysis
- Assets, Threats, Vulnerabilities, and Controls
- Most security risk analysis uses qualitative
analysis - Not a scientific process
- Companies will develop their own procedure
- Still a good framework for better understanding
of system security
31Security Policy
32Overview
- Understanding why policy is important.
- Defining various policies.
- Creating an appropriate policy.
- Deploying policies.
- Using policy effectively.
33Understanding Why Policy is Important
- The two primary functions of a policy are
- It defines the scope of security within an
organization. - It clearly states the expectations from everyone
in the organization.
34Understanding Why Policy is Important
- Policy defines how security should be
implemented. - It includes the system configurations, network
configurations, and physical security measures. - It defines the mechanisms used to protect
information and systems. - It defines how organizations should react when
security incidents occur. - Policy provides the framework for employees to
work together. - It defines the common goals and objectives of the
organizations security program. - Proper security awareness training helps
implement policy initiatives effectively.
35Defining Various Policies
- Information policy.
- Security policy.
- Computer use policy.
- Internet use policy.
- E-mail policy.
- User management procedures.
- System administration procedures.
- Backup policy.
- Incident response policy.
- Configuration management procedures.
- Design methodology.
- Disaster recovery plans.
36Information Policy
- Identification of sensitive information.
- Classifications.
- Marking and storing sensitive information.
- Transmission of sensitive information.
- Destruction of sensitive information.
37Identification of Sensitive Information
- Sensitive information differs depending on the
business of the organization. - It may include business records, product designs,
patent information, and company phone books. - It may also include payroll, medical insurance,
and any other financial information.
38Classifications
- Only the lowest level of information should be
made public. - All proprietary, company sensitive, or company
confidential information is releasable to
employees. - All restricted or protected information must be
made available to authorized employees only.
39Marking and Storing Sensitive Information
- The policy must mark all sensitive information.
- It should address the storage mechanism for
information on paper or on computer systems. - Incase of information stored on computer systems,
the policy should specify appropriate levels of
protection. - Use encryption wherever required.
40Transmission of Sensitive Information
- The policy addresses how sensitive information
needs to be transmitted. - It specifies the encryption method to be used
while transmitting information through electronic
mail. - Incase of hardcopies of information, request a
signed receipt.
41Destruction of Sensitive Information
- To destroy sensitive information
- Shred the information on paper.
- Use cross-cut shredders that provide an added
level of protection. - PGP desktop and BCWipe can be used to delete
documents placed on a desktop.
42Security Policy
- Identification and authentication.
- Access control.
- Audit.
- Network connectivity.
- Malicious code.
- Encryption.
- Waivers.
- Appendices.
43Identification and Authentication
- The security policy defines how users will be
identified. - It defines the primary authentication mechanism
for users and administrators. - It defines stronger mechanism for remote access
such as VPN or dial-in access.
44Access Control
- The security policy defines the standard
requirement for access control of electronic
files. - The requirement includes the required mechanism
and the default requirements for new files. - The mechanism should work with authentication
mechanism to allow only authorized users to
access the information.
45Audit
- Security policies must frequently audit the
following events - Logins (successful and failed).
- Logouts.
- Failed access to files or system objects.
- Remote access (successful and failed).
- Privileged actions.
- System events (such as shutdowns and reboots).
46Audit
- Each event should also capture the following
information - User ID (if there is one)
- Date and time
- Process ID (if there is one)
- Action performed
- Success or failure of the event
47Network Connectivity
- The security policy specifies the rules for
network connectivity and the protection
mechanisms. It includes - Dial-in connections.
- Permanent connections.
- Remote access of internal systems.
- Wireless networks.
48Malicious Code
- The security policy specifies where security
programs that look for malicious code need to be
placed. - Some appropriate locations are file servers,
desktop systems, and electronic mail servers. - It should specify the requirements for security
programs. - It should require updates of signatures for such
security programs on a periodic basis.
49Encryption
- The security policy should define the acceptable
encryption algorithms for use. - It can refer to the information policy to choose
the appropriate algorithms to protect sensitive
information. - It should also specify the procedures required
for key management.
50Waivers
- The security policy should provide a mechanism
for risk assessment and formulating a contingency
plan. - For each situation, the system designer or
project manager should fill a waiver form. - The security department reviews the waiver
request and provides risk assessment results and
recommendations to minimize the risk. - The waiver should be approved by the
organizations officer in charge of the project.
51Appendices
- The security policy appendices should have
details of - Security configurations for various operating
systems. - Network devices.
- Telecommunication equipments.
52Computer Use Policy
- Ownership of computers - States that all
computers are owned by the organization. - Ownership of information - States that all
information stored on or used by the
organizations computers is proprietary to the
organization. - Acceptable use of computers - States all
acceptable and unacceptable use of the
organizations computers. - No expectation of privacy - States that the
employee have no expectation of privacy for any
information stored, sent, or received on the
organizations computers.
53Internet Use Policy
- The Internet use policy is a part of the general
computer use policy. - It can be a separate policy due to the specific
nature of the Internet use. - The Internet use policy defines the appropriate
uses of the Internet within an organization. - It may also define inappropriate uses such as
visiting non-business-related web sites.
54E-mail Policy
- Internal mail issues - The electronic mail policy
should not be in conflict with other human
resource policies. - External mail issues - Electronic mail leaving an
organization may contain sensitive information.
Therefore, it may be monitored.
55User Management Procedures
- New employment procedure - Provides new employees
with the proper access to computer resources. - Transferred employee procedure - Reviews
employees computer access when they are
transferred within the organization. - Employee termination procedure - Ensures removal
of users who no longer work for the organization.
56System Administration Procedure
- Software upgrades - Defines how often a system
administrator will check for new patches or
updates. - Vulnerability scans - Defines how often and when
the scans will be conducted by security. - Policy reviews - Specifies the security
requirements for each system. - Log reviews - Specifies configuration of
automated tools that create log entries and how
exceptions must be handled. - Regular monitoring - Documents when network
traffic monitoring will occur.
57Backup Policy
- Frequency of backups - Identifies how often
backups actually occur. - Storage of backups - Defines how to store backups
in a secure location. It also states the
mechanism for requesting and restoring backups. - Information to be backed up - Identifies which
data needs to be backed up more frequently.
58Incident Response Procedure
- Incident handling objectives - Specifies the
objectives of the organization when handling an
incident. - Event identification - States corrective actions
for an intrusion or user mistake. - Escalation - Specifies an escalation procedure
such as activating an incident response team. - Information control - Specifies what information
is classified and what can be made public. - Response - Defines the type of response when an
incident occurs. - Authority - Defines which individual within the
organization or the incident response team has
the authority to take action. - Documentation - Defines how the incident response
team should document its actions. - Testing of the procedure - Tests the IRP once it
is written. It also identifies the loop holes in
the procedure and suggests corrective actions.
59Configuration Management Procedures
- Initial system state - Documents the state of a
new system when it goes into production. It
should include details of the operating system,
version, patch level, application details, and
configuration details. - Change control procedure - Executes a change
control procedure when a change is to be made to
an existing system.
60Design Methodology
- Requirements definition - Specifies the security
requirements that need to be included during the
requirement definition phase. - Design - Specifies that security should be
represented to ensure that the project is secured
during the design phase. - Test - Specifies that when the project reaches
the testing phase, the security requirement
should also be tested. - Implementation - Specifies that the
implementation team should use proper
configuration management procedures.
61Disaster Recovery Plans
- Single system or device failures - Includes a
network device, disk, motherboard, network
interface card, or component failure. - Data center events - Provides procedures for a
major event within a data center. - Site events - Identifies the critical
capabilities that need to be restored. - Testing the DRP - Identifies key employees and
performs walkthroughs of the plan periodically.
62Creating an Appropriate Policy
- To create an appropriate policy
- Identify which policies are most relevant and
important to an organization. - Conduct a risk assessment to identify risk areas.
- Define all acceptable and unacceptable employee
behavior. State all restrictions clearly. - Identify individuals and other stakeholders who
will be affected by the policy. State
expectations clearly. - Define a set of possible outlines.
- Draft the policy based on the outline.
- Include stakeholders during discussions and
invite suggestions. - Brainstorm before developing the final policy.
63Deploying the Policy
- Every department of the organization that is
affected by the policy must accept the underlying
concept. - Conduct security awareness training where
employees are informed of the intended change. - Make well-planned transitions rather than radical
changes while implementing the policy.
64Using Policy Effectively
- Identify security requirements early in the
process. Security should be a part of the design
phase of the project. - Examine existing systems to ensure it is in
compliance to new policies. - Conduct periodic audits to ensure compliance with
the policy. - Review policies regularly to ensure they are
still relevant for the organization.
65Summary
- Policies define how security is implemented
within an organization. - Each policy must have a purpose, scope, and
responsibility. - An organization must establish information
policy, security policy, computer use policy,
Internet and e-mail policy, and a backup policy. - An organization must also define user management,
system administration, incident response, and
configuration management procedures. - The disaster recovery plan details recovery
action for various levels of failures. - While creating a policy ensure that it will be
relevant and important to an organization. - Involve stakeholders in policy discussions.
Conduct security awareness trainings regularly. - Include security issues at each development phase
of a project.