network architecture & active directory … architecture & active directory ......

23
Network Architecture & Active Directory Considerations for the PI System By: Bryan Owen - OSIsoft Joel Langill - SCADAhacker

Upload: vanxuyen

Post on 21-Jun-2018

350 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

Network Architecture &

Active Directory Considerations

for the PI System

By: Bryan Owen - OSIsoft

Joel Langill - SCADAhacker

Page 2: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

2 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Agenda

Moore‟s Law

Network Architecture

Domain Services in a DMZ

Page 3: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

3 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

HD Moore‟s Law

Corollary:

Metasploit won’t tell you you’ve done “enough”

but it just might prove if you haven’t.

Page 4: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

4 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Anatomy of an Attack Information

Gathering

Scanning Enumeration

Fingerprinting

Gaining

Access

Maintaining

Access

Covering

Tracks

Turning point …

When a threat

becomes an attack!

Page 5: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

5 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Attack Process

Source: US DHS Control System Security Program

Cyber Security for Control Systems

Engineers and Operators

Page 6: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

6 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Pivot Attacks

Metasploit

Client Side

Infection

Credentials

or Hashes

Remote

Exploit

Escalate

Privileges

Dump

Hashes

Take

Control

Pivot

Port forwarding and routing

through compromised target

Mission

Objective

Page 7: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

7 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Pass the Hash

• Well known pivot technique (1) – Many tools to crack or “pass” password hashes

– Even NTLM passwords susceptible

– As good as clear text password

• Password hashes are well protected except: – Administrators and users with „Debug programs‟ rights

– Processes with „Act as part of the operating system‟ rights

(1) SANS reading room: “Why Crack When You Can Pass the Hash?”

Page 8: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

8 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Finding the „Right‟ Balance

• Access to Information, Ease of Administration,

Scope of Accountability, Security – Many companies are moving the direction of a “single sign-on”

or SSO approach

– Authentication and Credential Management remain as a top

vulnerability within manufacturing systems

• Network segmentation, Domain services – Complex firewall rules and “dynamic ports”

Page 9: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

9 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Simplified Manufacturing Info Data Flow

ENTERPRISE “ZONE”

Consumer of Production Data

Producer of Production Data

PRODUCTION “ZONE”

Page 10: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

10 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

“In”secure Data Integration

192.168.1.0/24

10.0.1.0/24

.100

.10

.101

Local Account: .\User1 / Password1

Local Account: .\User1 / Password1

Security Risks:

• Compromise of “Enterprise” credentials

compromises internal, trusted networks

• Allows attacker to “pivot” across shared

devices

• Ease of enumeration of inside nets with valid

credentials

ENTERPRISE “ZONE”

PRODUCTION “ZONE”

Page 11: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

11 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Network Segmentation Standards

• DHS CSSP, ISA 99, NERC CIP, NIST 800-82

Page 12: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

12 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

“Less” Secure Data Integration

192.168.1.0/24

10.0.1.0/24

.100

.10

Domain Account: Domain1\User1 / Password1

Domain Account: Domain1\User1 / Password1

.200

.20

Security Risks:

• Care to protect domain credentials

• AD-DS requires significant Firewall openings

in both directions

• Trust relationships often “implicit” and

misconfiguration can lead to compromise

ENTERPRISE “ZONE”

PRODUCTION “ZONE”

Page 13: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

13 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Control

DMZ

Manufacturing Info Data Flow

Office

High Levels of Authentication

Little or No Authentication

Consumer 1

Producer 1 + Consumer 2

Producer 2 + Consumer 3

Producer 3

ENTERPRISE “ZONE”

PRODUCTION “ZONE”

Page 14: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

14 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

DMZ

Trust and the 3-Zone Model

Office

Control

O-Users

Resources for O/D

Resources for O/C

C-Users

O-Users “SSO”

Resources for C

Trusted

Trusting

(Implicitly or

Explicitly Managed)

Trusting

(Explicitly or

Implicitly Managed)

Trusted

Trusted

Trusting

(Explicitly Managed)

Select O-Users

Authenticated in C against

C-Resources

O-Users

Authenticated in O against

D-Resources

C-Users

Authenticated in C against

D-Resources

Page 15: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

15 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

PI System DMZ Practices

• Terminate cross boundary traffic in DMZ – No thru traffic bypass exceptions

– Block DMZ to internet

– Restrict local logons and RDP

• Control network – PI Interface node with buffering

– Minimize office and web protocols

– Monitor DMZ traffic

– Separate logon authority

Page 16: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

16 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Considerations for Authentication

• Level of Autonomy or Isolation

• Differences in Group Policies

• Separation of “General” & “Administrative” Rights

• Active Directory Replication

• Integrity of Global Catalog and Schema

• Kerberos or NTLM

Page 17: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

17 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Options to Authentication

1. Integrated Windows Authentication using

NTLMSSP or mirrored “local” accounts

2. Integrated Forest – Single Domain

3. Integrated Forest – Unique Domains

4. Unique Forests

Page 18: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

18 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Comparison between Options FEATURE IWA (NTLM) SINGLE FOREST MULITPLE FORESTS

Single Account to Manage No Yes Yes

Password Hashes Shared between Office/Production 2 1 n/a – Tickets

Segregation of Administrative Rights Yes No Yes

Trust Transitivity between Office/Production Domains n/a Transitive Non-Transitive

Trust Definition between Office/Production n/a Implicit

Explicit None

Trust Direction n/a 2-way 1-way

Scope of Authentication Local Any Domain in Forest Any Domain in Forest

Global Catalog / Schema n/a 1 2

Replication across Firewall n/a Yes No

Replication Requirements (DC to DC) 2 tcp / 2 udp 9 tcp / 3 udp (2003)

10 tcp / 6 udp (2008) 1 tcp / 1 udp

Page 19: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

19 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Page 20: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

20 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Summary

• Restrict access in and out of control networks – Enforce with a network DMZ and domain based services

• Caution on use of administrator accounts – Includes debug rights and highly privileged service accounts

• Decide on an approach you can sustain – Involve subject matter experts in your process

Page 21: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

21 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

Additional References

• Active Directory Replication Over Firewalls http://social.technet.microsoft.com/wiki/contents/articles/active-directory-replication-over-firewalls.aspx

• How to Configure a Firewall for Domains and Trusts http://social.technet.microsoft.com/wiki/contents/articles/active-directory-replication-over-firewalls.aspx

• Active Directory Domain Services in the Perimeter http://technet.microsoft.com/en-us/library/dd728034(WS.10).aspx

• Windows Server 2008 Security Resource Kit

Page 22: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

22 © C o p y r i g h t 2 0 1 1 O S I s o f t , L L C

[email protected]

ICS Security Specialist

SCADAhacker

@SCADAhacker

Bryan Owen

[email protected]

Cyber Security Manager

OSIsoft, LLC

@bryansowen

Joel Langill

Page 23: Network Architecture & Active Directory … Architecture & Active Directory ... contents/articles/active-directory-replication-over ... Network Architecture & Active Directory Considerations

Thank you

© C o p y r i g h t 2 0 1 1 O S I s o f t , L L C