CS615 - Aspects of System Administration System Security Department - - PowerPoint PPT Presentation

cs615 aspects of system administration system security
SMART_READER_LITE
LIVE PREVIEW

CS615 - Aspects of System Administration System Security Department - - PowerPoint PPT Presentation

CS765 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration System Security Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu


slide-1
SLIDE 1

CS765 - Aspects of System Administration Slide 1

CS615 - Aspects of System Administration System Security

Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu https://www.cs.stevens.edu/~jschauma/615/

System Security April 24, 2017

slide-2
SLIDE 2

CS765 - Aspects of System Administration Slide 2

Where/how does ’security’ come into play?

System Security April 24, 2017

slide-3
SLIDE 3

CS765 - Aspects of System Administration Slide 3

Where/how does ’security’ come into play?

Lecture 02 (Filesystems, Disks, Storage) storage model (DAS, NAS, SAN, Cloud) partitions / mount options filesystem features (permissions, access control lists) DoS on disk space firmware compromise on hard drives Lecture 03 (Software Installation Concepts) software package management and updates VMs, containers, etc. patch management package integrity checking

System Security April 24, 2017

slide-4
SLIDE 4

CS765 - Aspects of System Administration Slide 4

Where/how does ’security’ come into play?

Lecture 04 (Multiuser Fundamentals) privileges and trust models authentication methods, multi-factor authentication file access controls raising privileges Lecture 05 / 06 (Networking) protocols and visibility of data on different layers tcpdump can read all packets location of attacker on network implies capabilities network censorship

System Security April 24, 2017

slide-5
SLIDE 5

CS765 - Aspects of System Administration Slide 5

Where/how does ’security’ come into play?

Lecture 07 (DNS; HTTP) If you control the DNS, you control the domain DNS registrars as attack points use of DNS as another channel for host verification (SSHFP records) trustworthiness of DNS (DNSSEC)

System Security April 24, 2017

slide-6
SLIDE 6

CS765 - Aspects of System Administration Slide 6

Where/how does ’security’ come into play?

Lecture 08 (HTTPS, Monitoring) cleartext vs ciphertext TLS authentication PKI, Certificate Authorities protocol downgrade and MitM attacks incident detection via events, metrics, and context sensitive data in logs

  • utsourcing monitoring services

System Security April 24, 2017

slide-7
SLIDE 7

CS765 - Aspects of System Administration Slide 7

Where/how does ’security’ come into play?

Lecture 09 (Writing System Tool) automation as a defensive weapon using the wrong tool for the job => writing insecure code understanding language / framework pitfalls simplicity reduces attack surface

System Security April 24, 2017

slide-8
SLIDE 8

CS765 - Aspects of System Administration Slide 8

Where/how does ’security’ come into play?

Lecture 10 (SMTP , Backup and Disaster Recovery) email as attack methods (spam, phishing) email privacy implications SMTP plain text vs. opportunistic encryption mail abuse and spam recipient and sender authentication, open relays disasters include security breaches safety of backups (encrypted backups?)

System Security April 24, 2017

slide-9
SLIDE 9

CS765 - Aspects of System Administration Slide 9

Where/how does ’security’ come into play?

Lecture 11 (Configuration Management) inherent trust, full control CAP theorem may impact security controls Lecture 12 (Ethics and Social Responsibility) privacy and responsibility lead by example implications of data retention transparency continuous education

System Security April 24, 2017

slide-10
SLIDE 10

CS765 - Aspects of System Administration Slide 10

How do we secure a system?

System Security April 24, 2017

slide-11
SLIDE 11

CS765 - Aspects of System Administration Slide 11

How do we secure a system?

It depends.

(Context required.)

System Security April 24, 2017

slide-12
SLIDE 12

CS765 - Aspects of System Administration Slide 12

What is security?

security NOUN: Freedom from risk or danger; safety.

System Security April 24, 2017

slide-13
SLIDE 13

CS765 - Aspects of System Administration Slide 13

What is risk?

risk NOUN: The possibility of suffering harm or loss; danger.

System Security April 24, 2017

slide-14
SLIDE 14

CS765 - Aspects of System Administration Slide 14

Suffering harm or loss of what?

access to data

System Security April 24, 2017

slide-15
SLIDE 15

CS765 - Aspects of System Administration Slide 15

Suffering harm or loss of what?

access to data integrity of data

System Security April 24, 2017

slide-16
SLIDE 16

CS765 - Aspects of System Administration Slide 16

Suffering harm or loss of what?

access to data integrity of data availability of services

System Security April 24, 2017

slide-17
SLIDE 17

CS765 - Aspects of System Administration Slide 17

Suffering harm or loss of what?

access to data integrity of data availability of services reputation

System Security April 24, 2017

slide-18
SLIDE 18

CS765 - Aspects of System Administration Slide 18

Suffering harm or loss of what?

access to data integrity of data availability of services reputation monetary loss due to any of the above

System Security April 24, 2017

slide-19
SLIDE 19

CS765 - Aspects of System Administration Slide 19

Suffering harm or loss of what?

access to data integrity of data availability of services reputation monetary loss due to any of the above monetary loss due to physical items of actual value

System Security April 24, 2017

slide-20
SLIDE 20

CS765 - Aspects of System Administration Slide 20

Suffering harm or loss of what?

access to data integrity of data availability of services reputation monetary loss due to any of the above monetary loss due to physical items of actual value ...

System Security April 24, 2017

slide-21
SLIDE 21

CS765 - Aspects of System Administration Slide 21

How to determine risk

“Risk Assessment” identify assets

System Security April 24, 2017

slide-22
SLIDE 22

CS765 - Aspects of System Administration Slide 22

How to determine risk

“Risk Assessment” identify assets identify threats

System Security April 24, 2017

slide-23
SLIDE 23

CS765 - Aspects of System Administration Slide 23

How to determine risk

“Risk Assessment” identify assets identify threats identify vulnerabilities

System Security April 24, 2017

slide-24
SLIDE 24

CS765 - Aspects of System Administration Slide 24

How to determine risk

“Risk Assessment” identify assets identify threats identify vulnerabilities determine likelihood of damage

System Security April 24, 2017

slide-25
SLIDE 25

CS765 - Aspects of System Administration Slide 25

How to determine risk

“Risk Assessment” identify assets identify threats identify vulnerabilities determine likelihood of damage estimate cost of recovery

System Security April 24, 2017

slide-26
SLIDE 26

CS765 - Aspects of System Administration Slide 26

How to determine risk

“Risk Assessment” identify assets identify threats identify vulnerabilities determine likelihood of damage estimate cost of recovery estimate cost of defense

System Security April 24, 2017

slide-27
SLIDE 27

CS765 - Aspects of System Administration Slide 27

How to determine risk

“Risk Assessment” identify assets identify threats identify vulnerabilities determine likelihood of damage estimate cost of recovery estimate cost of defense A risk is the likelihood of a threat successfully exploiting a vulnerability and the estimated cost (or potential damage) both in the short and long term you may incur as a result.

System Security April 24, 2017

slide-28
SLIDE 28

CS765 - Aspects of System Administration Slide 28

Threat Model

For each system/component/product/service/... identify what you’re protecting identify from whom you’re protecting it identify goals of the attacker identify motivation of the attacker identify capabilities of the attacker identify threats you cannot defend against (within this system or in general)

System Security April 24, 2017

slide-29
SLIDE 29

CS765 - Aspects of System Administration Slide 29

Threat Model

Your adversaries are determined human actors with specific goals.

System Security April 24, 2017

slide-30
SLIDE 30

CS765 - Aspects of System Administration Slide 30

Imperatives

Constantly seek to reduce your attack surface. Identify and eliminate attack vectors. You can’t do this alone: lead by example, seek allies.

System Security April 24, 2017

slide-31
SLIDE 31

CS765 - Aspects of System Administration Slide 31

Defense in Depth

Security is like an onion: the more layers you peel away, the more it stinks.

System Security April 24, 2017

slide-32
SLIDE 32

CS765 - Aspects of System Administration Slide 32

The biggest threat comes from the inside

System Security April 24, 2017

slide-33
SLIDE 33

CS765 - Aspects of System Administration Slide 33

The biggest threat comes from the inside

http://is.gd/6sREQh

System Security April 24, 2017

slide-34
SLIDE 34

CS765 - Aspects of System Administration Slide 34

Cryptography

Cryptography can help mitigate some of the risks sometimes.

System Security April 24, 2017

slide-35
SLIDE 35

CS765 - Aspects of System Administration Slide 35

Cryptography

Cryptography can help mitigate some of the risks sometimes. It may provide security in the areas of: Secrecy or Confidentiality Did/could anybody else see (parts of) the message?

System Security April 24, 2017

slide-36
SLIDE 36

CS765 - Aspects of System Administration Slide 36

Cryptography

Cryptography can help mitigate some of the risks sometimes. It may provide security in the areas of: Secrecy or Confidentiality Did/could anybody else see (parts of) the message? Accuracy or Integrity Was the message (could it have been) modified before I received it?

System Security April 24, 2017

slide-37
SLIDE 37

CS765 - Aspects of System Administration Slide 37

Cryptography

Cryptography can help mitigate some of the risks sometimes. It may provide security in the areas of: Secrecy or Confidentiality Did/could anybody else see (parts of) the message? Accuracy or Integrity Was the message (could it have been) modified before I received it? Authenticity Is the party I’m talking to actually who I think it is / they claim they are?

System Security April 24, 2017

slide-38
SLIDE 38

CS765 - Aspects of System Administration Slide 38

Cryptography

Note: Authentication != Authorization cryptography does not handle authorization you generally need all three: confidentiality, integrity, authenticity cryptography cannot prevent against incorrect use – usability is hard! Know your threat model!

System Security April 24, 2017

slide-39
SLIDE 39

CS765 - Aspects of System Administration Slide 39

Basic Security Concepts: Confidentiality

Alice and Bob agree on a way to transform plain text into ciphertext transformed data is sent over insecure channel Alice and Bob are able to reverse transformation

System Security April 24, 2017

slide-40
SLIDE 40

CS765 - Aspects of System Administration Slide 40

Basic Security Concepts: Confidentiality

Alice and Bob agree on a way to transform plain text into ciphertext transformed data is sent over insecure channel Alice and Bob are able to reverse transformation Different approaches: secret key cryptography (example: DES) Alice and Bob share a secret key public key cryptography (example: RSA) Alice has a private and a public key data encrypted with her private key can only be decrypted by her public key and vice versa public key can be shared with anybody (via insecure means)

System Security April 24, 2017

slide-41
SLIDE 41

CS765 - Aspects of System Administration Slide 41

Threats to Confidentiality

lack of authenticity key exchange key disclosure

System Security April 24, 2017

slide-42
SLIDE 42

CS765 - Aspects of System Administration Slide 42

Basic Security Concepts: Integrity

In order to protect against forgery or data manipulation, provide some sort of digest or checksum (often a one-way hash). Popular choices: 5f4dcc3b5aa765d61d8327deb882cf99 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62 a11ef721d1542d8 b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5 e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a 2ea6d103fd07c95385ffab0cacbc86

System Security April 24, 2017

slide-43
SLIDE 43

CS765 - Aspects of System Administration Slide 43

Basic Security Concepts: Integrity

In order to protect against forgery or data manipulation, provide some sort of digest or checksum (often a one-way hash). Popular choices: 5f4dcc3b5aa765d61d8327deb882cf99 (MD5) 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 (SHA-1) 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62 a11ef721d1542d8 (SHA256) b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5 e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a 2ea6d103fd07c95385ffab0cacbc86 (SHA512)

System Security April 24, 2017

slide-44
SLIDE 44

CS765 - Aspects of System Administration Slide 44

Basic Security Concepts: Integrity

Examples: host based IDS, package manager signatures Some possible threats: collisions in algorithm lack of authenticity (Where did I get the checksum?) lack of integrity (Was the checksum tampered to match the (tampered) data?) “verification” with compromised tools “rainbow tables” / internet search engines allow for easy reverse lookup of un-salted hashes.

System Security April 24, 2017

slide-45
SLIDE 45

CS765 - Aspects of System Administration Slide 45

Basic Security Concepts: Authenticity

Three general ways of proving that you are who you say you are: something you know something you have something you are

System Security April 24, 2017

slide-46
SLIDE 46

CS765 - Aspects of System Administration Slide 46

Basic Security Concepts: Authenticity

Three general ways of proving that you are who you say you are: something you know secret handshake, password can (easily) be given to and used by somebody else something you have something you are

System Security April 24, 2017

slide-47
SLIDE 47

CS765 - Aspects of System Administration Slide 47

Basic Security Concepts: Authenticity

Three general ways of proving that you are who you say you are: something you know secret handshake, password can (easily) be given to and used by somebody else something you have physical items: smart card, RSA token, ... private keys can (easily) be given to and used by somebody else something you are

System Security April 24, 2017

slide-48
SLIDE 48

CS765 - Aspects of System Administration Slide 48

Basic Security Concepts: Authenticity

Three general ways of proving that you are who you say you are: something you know secret handshake, password can (easily) be given to and used by somebody else something you have physical items: smart card, RSA token, ... private keys can (easily) be given to and used by somebody else something you are physical, physiological or behavioral traits cannot (easily or at all) be given to or used by somebody else cannot (easily or at all) be changed once compromised

System Security April 24, 2017

slide-49
SLIDE 49

CS765 - Aspects of System Administration Slide 49

Basic Security Concepts: Authenticity

Some possible threats: lack of confidentiality lack of integrity reliance on fragile infrastructure usability conflation with authorization

System Security April 24, 2017

slide-50
SLIDE 50

CS765 - Aspects of System Administration Slide 50

Principle of Least Privilege

System Security April 24, 2017

slide-51
SLIDE 51

CS765 - Aspects of System Administration Slide 51

It’s not just 1s and 0s

System security is not restricted to software security.

System Security April 24, 2017

slide-52
SLIDE 52

CS765 - Aspects of System Administration Slide 52

It’s not just 1s and 0s

The thing that makes security difficult is not the software or hardware components. It’s the human component.

System Security April 24, 2017

slide-53
SLIDE 53

CS765 - Aspects of System Administration Slide 53

It’s not just 1s and 0s

System Security April 24, 2017

slide-54
SLIDE 54

CS765 - Aspects of System Administration Slide 54

Secure by default

Users care about usability, not about security.

System Security April 24, 2017

slide-55
SLIDE 55

CS765 - Aspects of System Administration Slide 55

Secure by default

Users will not change their default settings.

System Security April 24, 2017

slide-56
SLIDE 56

CS765 - Aspects of System Administration Slide 56

Secure by default

Users will not change their default settings.

(Unless a less secure option is available.)

System Security April 24, 2017

slide-57
SLIDE 57

CS765 - Aspects of System Administration Slide 57

Hooray! 5 Minute Break

System Security April 24, 2017

slide-58
SLIDE 58

CS765 - Aspects of System Administration Slide 58

Security Fallacies and Pitfalls

Proving a Negative

(Evidence of Absences vs. Absence of Evidence)

System Security April 24, 2017

slide-59
SLIDE 59

CS765 - Aspects of System Administration Slide 59

Security Fallacies and Pitfalls

Security by Obscurity

System Security April 24, 2017

slide-60
SLIDE 60

CS765 - Aspects of System Administration Slide 60

Security Fallacies and Pitfalls

Perfect is the Enemy of the Good

(Differentiate between futile efforts and raising the bar.)

System Security April 24, 2017

slide-61
SLIDE 61

CS765 - Aspects of System Administration Slide 61

Security Fallacies and Pitfalls

One in a million is next Tuesday.

http://is.gd/Isb20K

System Security April 24, 2017

slide-62
SLIDE 62

CS765 - Aspects of System Administration Slide 62

Security Fallacies and Pitfalls

“Any person can invent a security system so clever that she or he can’t think of how to break it.”

Schneier’s Law http://is.gd/hW82dt

System Security April 24, 2017

slide-63
SLIDE 63

CS765 - Aspects of System Administration Slide 63

Security Fallacies and Pitfalls

Don’t invent your own crypto.

(Seriously, don’t.)

System Security April 24, 2017

slide-64
SLIDE 64

CS765 - Aspects of System Administration Slide 64

Security Fallacies and Pitfalls

Complexity is the worst enemy of security.

(The more secure you make something, the less secure it becomes.)

System Security April 24, 2017

slide-65
SLIDE 65

CS765 - Aspects of System Administration Slide 65

Whom do you trust?

http://cm.bell-labs.com/who/ken/trust.html

System Security April 24, 2017

slide-66
SLIDE 66

CS765 - Aspects of System Administration Slide 66

Outsourcing Services

you trust the provider/vendor to honor the agreement you “hope” they won’t change their agreement (once invested, changing back is hard) you trust the provider/vendor to keep their infrastructure safe you trust the provider/vendor’s employees you are ok with the traffic going across the public internet

System Security April 24, 2017

slide-67
SLIDE 67

CS765 - Aspects of System Administration Slide 67

Outsourcing Services

you trust the provider/vendor to honor the agreement you “hope” they won’t change their agreement (once invested, changing back is hard) you trust the provider/vendor to keep their infrastructure safe you trust the provider/vendor’s employees you are ok with the traffic going across the public internet Bottom-line: are you increasing or decreasing your attack surface?

System Security April 24, 2017

slide-68
SLIDE 68

CS765 - Aspects of System Administration Slide 68

Embrace Automation

Vulnerabilities are dense. Eliminate classes of attacks, not individual flaws.

System Security April 24, 2017

slide-69
SLIDE 69

CS765 - Aspects of System Administration Slide 69

Build Robust Infrastructures and Service

Your endpoint security model should assume the network is compromised; your network security model should assume the endpoint is. Both in fact are.

System Security April 24, 2017

slide-70
SLIDE 70

CS765 - Aspects of System Administration Slide 70

Toning down the Paranoia

Never attribute to malice that which can be adequately explained by stupidity.

Hanlon’s Razor

System Security April 24, 2017

slide-71
SLIDE 71

CS765 - Aspects of System Administration Slide 71

Sysadmin ∩ Infosec

https://www.netmeister.org/blog/infosec-basics.html

System Security April 24, 2017

slide-72
SLIDE 72

CS765 - Aspects of System Administration Slide 72

Sysadmin ∩ Infosec

Nothing is always absolutely so.

System Security April 24, 2017

slide-73
SLIDE 73

CS765 - Aspects of System Administration Slide 73

Two Questions

https://www.netmeister.org/blog/two-questions.html

System Security April 24, 2017

slide-74
SLIDE 74

CS765 - Aspects of System Administration Slide 74

Infosec Foundation

Don’t be lazy.

System Security April 24, 2017

slide-75
SLIDE 75

CS765 - Aspects of System Administration Slide 75

Final Project

Group project: Capture the Flag https://www.cs.stevens.edu/~jschauma/615/ctf.html

System Security April 24, 2017

slide-76
SLIDE 76

CS765 - Aspects of System Administration Slide 76

Additional Reading

https://www.slideshare.net/zanelackey/attackdriven-defense https://www.netmeister.org/blog/moving-the-needle.html https://twitter.com/jschauma/status/713118376550404096 https://t.co/DRHbEKXod8 https://danielmiessler.com/study/security_and_obscurity/ http://is.gd/sGnRVL

System Security April 24, 2017