1
Developing a Comprehensive Active Directory Security Metric
Friedwart Kuhn, Heinrich Wiederkehr, Nina Matysiak
Friedwart Kuhn
Digitally signed by Friedwart Kuhn Date: 2018.03.15 13:54:43 +01'00'
Security Metric Friedwart Digitally signed by Friedwart Kuhn, - - PowerPoint PPT Presentation
Developing a Comprehensive Active Directory Security Metric Friedwart Digitally signed by Friedwart Kuhn, Heinrich Wiederkehr, Nina Matysiak Friedwart Kuhn Date: 2018.03.15 Kuhn 13:54:43 +01'00' 1 Agenda Who We Are o Introduction:
1
Developing a Comprehensive Active Directory Security Metric
Friedwart Kuhn, Heinrich Wiederkehr, Nina Matysiak
Friedwart Kuhn
Digitally signed by Friedwart Kuhn Date: 2018.03.15 13:54:43 +01'00'2 2
Agenda
3
Security Team @ERNW
security assessments, administration, publications and trainings
with a strong focus on Active Directory Security
Security Team @ERNW
assessments and trainings
with a focus on Windows Security and Active Directory Security
Who We Are
Security Team @ERNW
assessments
professional with a focus on Windows Security and Active Directory Security
4
Introduction
Problem Statement & Why Security Metrics
5
Memo From: CEO To: ISO
“Dear John, I am under renewed pressure from the board to clarify a few things about your budget proposals for the financial year ahead. Please, would you address the following issues in writing before the next board meeting: A) We have spent a small fortune on information security in the past three years: naturally, this seemed justified at the time, but it is perfectly reasonable for the board to ask what we have actually achieved in the way of a return
you demonstrate the value?
6
…Continuation of the Memo
B) How does our inform rmat ation security y stack ck up a again ainst st our peers in the industry ry? How secure are we, and how secure do w we need to be? Some of the more cynical members of the board are starting to express the opinion that we are going for gold when silver will do, and I must admit I have some sympathy for that viewpoint. C) If budget cuts are necessary (which looks increasingly likely), in which ch areas as can we safely ly trim m back k on security spending without jeopardizing the excellent progress we have already made? Looki king g forwar ard d maybe e three to five years, , can you please se give ve us a a clear arer r picture re of how the informa mation
y managem gemen ent system m will ll pan out? ? Regards, Fred B (CEO)” From [2], p. xvii
7
What do you feel…?
Why??
8
Reasons for a (Security) Metric
improve it.” (Lord Kelvin)
9
Reasons for an Active Directory Security Metric?
10
The Goal
security metric that:
a)
‘looks’ at the security-relevant indicators of Active Directory
b)
and that measures these indicators in a meaningful way
responsible personnel and experts
11
Reasons for an Active Directory Security Metric?
thus being enabled to answer the awkward questions.
12
Terminology
measurement” (Oxford American Dictionary)
13
Terminology (well-known)
ure: (verb) action to determine one or more parameters of something
uring g point nt: is the “location”, where the measure is taken (‘height’ of a door)
urement: is the result of the action of measuring, the value of a parameter for something, ideally expressed in defined units (the height of the door is 2 meters)
uring g Instrum trument ent: in short “instrument” is, a “device“ for measuring (‘measuring tape’)
14
Terminology - Key Security Indicator (KSI)
the security state of an IT security-relevant component
the measurement) or it can be the result of a (mathematical and/or logical) operation applied to the measurement
fiable ble measure re used to evaluat luate e the security stat ate of a a security-rele releva vant item m of a an AD
15
KSIs Are Derived/Defined From…
Corresponding Security Best Practices
Professionals’ Experience
ACL of the AdminSDHolder object
permissions on the object that differ from the default
16
KSIs Are Derived/Defined From…
DMZ
17
Prerequisites of a Well-Designed AD Security Metric
18
Attributes of a Good Metric
collected via PS script
user rights (including GPOs with UAC settings)
disabled per Domain
19
Prerequisites of a Well-Designed Active Directory Security Metric
(operations/algorithms) to measure these KSIs (How do you measure the security of UAC?)
20
Disclaimer
where we want to go
21
Development of an Active Directory Security Metric
22
Before the Idea of an AD Security Metric
23
Initial Situation
gather and analyze information of multiple AD environments
assess the security of an AD
24
What does an environment of this size look like?
25
Implications of the Project Goals for the Assessment
beforehand
permissions
26
Assessed Areas
DESIGN AD (security) architecture. ORGANIZATIONAL AD (security) processes. TECHNICAL AD (security) configuration.
27
security
Practice
Management
Handling
Assessment Tools We Created I
Title: AD Assessment Questionnaire Organization: AD Responsibility: Respondent: Date: How to use this questionnaire?
This questionnaire is divided into five different sections (Documentation, Security Design, Administrative and Operational Practices, Patch and Vulnerability Management, Monitoring and Incident Management). For questions regarding each section, there is a distinct
If you would like to add further information in the annex, please state the index number of the question to which you refer.
28
domain user permissions
configuration
Assessment Tools We Created II
29
Assessment Tools We Created III
data could lead to 34 possible pre-defined findings
questionnaire
text may differ depending on the evaluation
1 Group Policy Preferences Contain Passwords 2 High Privileged Accounts Not Marked as Sensitive 3 (Large Number of) User Accounts With Non-Expiring Passwo 4 Pre-Windows 2000 Compatible Access Group Has Security-Cr 5 Multiple Hosts Running End-of-Life OS 6 Clear Text Password in Account Description 7 Insufficient LAN Manager Authentication Level on Multiple S 8 Large Number of High-Impact Accounts 9 Weak Default Domain Password Policy 10 No or Insufficient Account Lockout Policy 11 Insufficient Forest Functional Level 12 Insufficient Domain Functional Level 13 UAC Disabled on Multiple Systems 14 Use of Cryptography Algorithms Compatible with Windows N 15 Insecure Configuration of the AdminSDHolder ACL 16 High Privileged Group Is Member Of "Allow Password Replic 17 SID Filtering Disabled On External Trusts 18 Missing or Outdated Security Relevant Active Directory Docu 19 Domain Controller of the Internal AD placed in the DMZ 20 Member Computers of the internal AD are placed in the DMZ 21 No or Insufficient Implementation of Administrative Tiers 22 No Dedicated Secure Administration Hosts 23 No Account Management Process For Privileged AD User Acc 24 No Account Management Process For Privileged Local User A 25 No or Insufficient Administrative Role Seperation 26 Administrative Accounts are Internet-Browsing and/or Email 27 Not all Domain Controllers are Located in a Physically Secure 28 Missing Baseline Security Hardening for AD integrated Syste 29 No or Insufficient Backup Management for Domain Controlle 30 No or Insufficient Patch-Management for the Operating Syste 31 No or Insufficient Patch-Management for Third Party Applica 32 No or Insufficient Antimalware Solution Management 33 No or Insufficient Logging and Monitoring 34 User Passwords Stored with Reversible Encryption
30
Presentation of Results
31
Presentation of Results
32
Project Summary: Lessons Learned
benefitted from the standardized and automated approach
metric were indirectly satisfied
questionnaire)
measured
33
Project Summary: Lessons Learned
assessment in style of an audit
misunderstandings)
between different ADs
34
How To: Translate Audit Findings into Security Metrics
35
How To: Translate Audit Findings into Security Metrics
metrics
user-defined text fields from the questionnaire)
(only qualitative labels used as ratings)
36
Finding Measuring Point(s) Security Problem(s) Measurement(s) Security Question(s)
abstract abstract measure define answer with
Security Metric
KSI(s)
37
Security Metric: Measuring Point(s)
points can be abstracted
measuring instruments
Finding Measuring Point(s)
abstract
38
Security Metric: Measuring Instruments
Measuring Point(s) Measurement(s)
measure
39
Security Metric: Measurement(s)
process
measurements
set of measurements
Measuring Point(s) Measurement(s)
measure
40
Security Metric: Security Question(s)
relevant answers
measurements
answered with measurements coming directly from the measuring points
Measurement(s) Security Question(s)
answer with
KSI(s)
41
Security Metric: Levels of Measurement(s)
points do not always answer the security question posed
with one or more other measurements
tertiary measurements
Primary Measurements Secondary Measurements Mathematical/ Logical Operation
42
Re-evaluate Measuring Points and Security Questions
answered this can be due to two reasons:
wrong
Measuring Point(s) Security Question(s)
re-evaluate
43
Example: Audit Finding to Metric(s)
„Insufficient LAN Manager authentication level on multiple systems“
44
Audit Finding
authentication level on multiple systems“
enabling the use of the LM or NTLMv1 authentication protocol
45
Abstraction from Finding to Measuring Points and Measurements
level and where they are linked
security if negotiated”, “Send NTLM response only”, “Send NTLM LMv2 v2 response only”, “Send NTLMv2 response only\refuse LM”, “Send NTLMv2 response only\refuse LM & NTLM”}
triggered
46
Security Problems Behind the Finding
Insufficient LAN Manager authentication level on multiple systems Possible use of
hash) Possible use of
authentication (LM, NTLMv1) Security Problems Finding
47
Security Questions Defined by the Security Problems
Possible use of
hash) Possible use of
authentication (LM, NTLMv1) Security Problems Security Questions What is the percentage
environment which may support LM hashes? What is the percentage
environment which may support LM authentication? What is the percentage
environment which may support NTLMv1 authentication?
48
Security Questions Fully Answered…?
and where GPOs with this setting are linked?
solely on the “Send NTLMv2 response only” setting?
50
From Additional Influencing Factors to Additional Measuring Points
“OperatingSystemVersion“
51 Insufficient LAN Manager authentication level on multiple systems Possible use of
hash) Possible use of
authentication (LM, NTLMv1) Security Problems Finding Initial Measuring Points GPOs with the setting “LAN Manager authentication level” Links of the GPOs Additional Measuring Points Attributes on computer objects Patch management questionnaire Security Questions What is the percentage
environment which may support LM hashes? What is the percentage
environment which may support LM authentication? GPOs with the setting setting “Minimum password length” + Links What is the percentage
environment which may support NTLMv1 authentication? Measurements Measurements Multiple KSIs
52
ment of the Finding ding
authentication level on multiple systems“
tement nt of the Metric tric (= KSI)
systems that may support LM hashes
systems that may support LM auth
systems that may support NTLMv1 auth
Statement of Finding vs. Statement of Metric (KSI)
53
Consistently measured Cheap to gather Expressed as a cardinal number or percentage Expressed using at least one unit of measure Contextually specific
54
Obstacles in the Translation Process
55
Encountered Obstacles
56
Encountered Obstacles
Example: “User Account Control Disabled on Multiple Systems”
57
The Starting Point
Disabled on Multiple Systems “
started by an administrator runs in the user and privilege context of the administrator.
58
Asking the Wrong Question
environment?
to the criteria for a good metric
59
Getting Lost in Data
60
Getting Lost in Data
61
Getting Lost in Data
answer the broad question: How good is the UAC configuration in the environment?
UAC
measurements
62
Trying to Fix the Unfixable
taken approach and the question asked:
63
Consistently measured Cheap to gather Expressed as a cardinal number or percentage Expressed using at least one unit of measure Contextually specific
64
How to Make it Better
metrics.“
See [2], p.15.
way around
65
Examples For Better UAC Related Security Questions
not used (for every high-privileged user/operation)?
“OperatingSystemVersion“
according to Security Best Practices?
66
Where Do We Stand?
67
Where Do We Stand?
metric’) KSIs: 22
68
Where Do We Want to Go?
69
Where Do We Want to Go?
thereby create more KSIs)
70
Lessons Learned
experience (e.g. Psychology)
in your mind ;-)
71
Call to Action
improve Active Directory security measurably!
72 #72
@DirectoryRanger
73
www.ernw.de www.insinuator.net
Thank you for your attention!
fkuhn@ernw.de hwiederkehr@ernw.de nmatysiak@ernw.de
74
Sources
Fear, Uncertainty, and Doubt. Addison-Wesley, March 2007
PRAGMATIC Security Metrics. CRC Press, 2013