security assessments keith watson, cissp [email protected] research engineer center for...

54
Security Assessments Keith Watson, CISSP [email protected] Research Engineer Center for Education and Research in Information Assurance and Security

Upload: geraldine-carson

Post on 23-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Security Assessments

Keith Watson, [email protected]

Research EngineerCenter for Education and Research in Information Assurance and Security

Page 2: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Overview

Part 1: Introduction to Security Assessments

What is a security assessment? Why is it needed? How do you do an assessment?

Page 3: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Overview

Part 2: Conducting Security AssessmentsAsset IdentificationThreat AssessmentLaws, Regulation, and PolicyPersonnelSecurity Assessment ComponentsReporting and Follow-up

Page 4: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Overview

Part 3: The Assessment “Experience”Tools

• Demonstration of Nessus• Report Template

TrainingCertification

Page 5: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Part 1: Overview of Assessments

What?Why?How?

Page 6: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

What?

A security assessment is an evaluation of the security posture of an organization.

Page 7: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

What?

Evaluation of• Policy• Security practices• Management of systems and resources• Security perimeters• Handling of sensitive information

Provided in the form of • Report• Presentation

Page 8: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

What?

Security Assessments are…• A process

• Step-by-step (with variation)

• An examination• See how things work (or don’t work)

• An evaluation• Making a judgment on relative security

Page 9: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Why?: Need for Assessments

Due Diligence• Mergers and Acquisitions• Customer/Partnership Evaluation

Regulatory Requirement• Banks, Financial Institutions, Hospitals• Publicly Traded Companies• OMB, CBO, Federal Offices of the Inspector General

Insurance• Set premiums for “Hacker” Insurance

Just Good Security Management Practice• “Know your problems”

Page 10: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

How?

Negotiate Project Scope• Don’t make the project too big to finish

Spend time on site• Best examination made from the inside

Talk with everyone• A little insider knowledge goes a long way

Look at similar organizations• Useful in judging relative security posture

Make cost-effective recommendations• Don’t scare them with overpriced fixes and

complicated solutions

Page 11: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Part 2: Conducting Security Assessments

Project ManagementAsset IdentificationThreat AssessmentLaws, Regulations, and PoliciesPersonnelSecurity Assessment ComponentsReporting and Follow-up

Page 12: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Project Management

Page 13: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Project Management

Scope DefinitionSetting ExpectationsSchedulingTravelLogisticsCompletion

Page 14: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Asset Identification

Page 15: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Assets

An asset is anything that has some value to an organization.

Page 16: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Asset Identification

It is necessary to determine the assets that need protection, their value, and level of protection required

Two Types:• Tangible• Intangible

Page 17: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Tangible Assets

Tangible assets are physicalExamples:

• Personnel• Offices, workspaces, warehouses, etc.• Inventory, stores, supplies, etc.• Servers and workstations• Network infrastructure and external

connections• Data centers and support equipment

Page 18: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Intangible Assets

Intangible assets are intellectual propertyExamples:

• Custom software• Databases (the data, not the DBMS)• Source code, documentation, development

processes, etc.• Training materials• Product development and marketing

materials• Operational and financial data

Page 19: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Replace/Restore

What would it cost to restore or replace this asset in terms of time, effort, and money?

Tangible assets: • $?

Intangible assets: • $$$$?

Page 20: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Loss of Assets

Loss of key assets could result in harm to the organization• Damaged reputation• Lost customers• Lost shareholder confidence• Lost competitive advantage• Exposure to lawsuits• Government/Regulatory fines• Failure of organization

Page 21: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

For Organizations

It is important to know what assets are critical to the viability of the

organization so that they can be adequately protected.

Page 22: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

For Assessments

It is important to determine an organization’s assets* to see if there is

adequate protection in place

* Your list of assets may not be the same as the organization’s list.

Page 23: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Threat Assessment

Page 24: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Threats

An event that can impact the normal operations of an organization is a threat.

Page 25: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Threat Assessment

It is necessary to determine the threats, threat sources, and the likelihood of occurrence

Threat types:• Natural Events• Unintentional• Intentional

Page 26: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Natural Threats

Tornadoes, Hurricanes, TyphoonsEarthquakes, Mud SlidesFloodingLightning, Thunderstorms, Hail, Strong

WindIce Storms, Heavy SnowfallTemperature and Humidity Extremes

Page 27: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Intentional Threats

Alteration of DataAlteration of SoftwareDisclosureDisruptionEmployee SabotageTheftUnauthorized UseElectronic Vandalism

Page 28: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Unintentional Threats

Disclosure Electrical Disturbance (surges, dips, outage <1

hour) Electrical Interruption (outage >1 hour) Environmental Failure (HVAC, humidity) Fire Hardware Failure (disk, fan, server) Liquid Leakage (steam, water, sewage) Operator/User Error Software Error (bugs) Telecommunication Interruption (cable cut)

Page 29: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Threat Sources - Threat Agents

Murphy’s LawUnhappy CustomersDisgruntled EmployeesActivists (Hack-tivists)Script-KiddiesSophisticated Attackers

• Government/Foreign/Terrorist Agents• “Blackhats”

Page 30: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Likelihood of Occurrence

Qualitative• High, Moderate, Low

Quantitative• Sophisticated formulas needed• Provides useful data to “numbers” people

FBI Uniform Crime Reports• Crime Index data useful

Page 31: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Sample Threat Assessment

Threat Source Likelihood

Impact

Alteration of Data

“Hacker” Low Moderate

Alteration of Data

Disgruntled Employee

Moderate High

Power Loss (>6 hours)

Severe Weather

Low Moderate

Hardware Failure

Disgruntled Employee

Low High

Operator Error

Untrained Employee

Moderate High

Page 32: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Laws, Regulations, and Policies

Page 33: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Laws

Depending on the organization’s business, there may be several laws that govern the protection of information• CA Database Breach Notification Act • Sarbanes-Oxley Act of 2002• Health Insurance Portability and Accountability Act of

1996 (HIPAA)• Gramm-Leach-Bliley Act of 1999• Computer Security Act of 1987• Computer Fraud and Abuse Act of 1986• Federal Education Rights and Privacy Act (FERPA)• European Union Data Privacy Directive

Page 34: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Law Surveys

A survey may be necessary to determine which laws apply to an organization

Look for Federal “interest” systems, private data, health info, public company financials, market data, etc.

Organizations that operate operate on behalf of the government subject to various laws

Get a lawyer for the in depth stuff

Page 35: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Policy

Policies are statements of intentions and/or principles by which an

organization is organized, guided, and evaluated.

Page 36: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Policy Types

Organization ProgramIssue-SpecificSystem-Specific

Page 37: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Policy Reviews

Reviews are necessary to evaluate adequacy and compliance

Some organizations have no security policies at all

Most do not follow their own policiesMost employees are unaware of policiesMost policies are out-of-date

Page 38: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Personnel

Page 39: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Personnel

Interviews are needed to assess knowledge and awareness of information security

Valuable for determining unwritten rules

Employees should be divided into categories

Interview groups and ask questions relevant to the job function

Do not be adversarial or demanding

Page 40: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Security Assessment Components

Page 41: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Security Assessment Components

Network SecuritySystem SecurityApplication SecurityOperational SecurityPhysical Security

Page 42: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Network Security

Involves the actions taken and controls in place to secure the network and

networked systems

Page 43: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Network Security Assessment

Gather network maps, installation procedures, checklists; evaluate

Scan networks and networked systems• Vulnerability Scanners: Nessus (free), ISS• Port Scanners: nmap, hping• Application Scanners: whisker, nikto

Target Selection• Key systems (where the goodies are stored)• Exposed systems (where the bad guys play)• Gateway systems (intersection of networks)

Page 44: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

System Security

Involves the actions taken tosecure computing systems

Page 45: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

System Security Assessment

Gather software/system inventory info, security standards, checklists, management procedures; evaluate

Review configuration with admin Use a security checklist to evaluate current

configuration Target Selection:

• Database Systems and File Servers• Network Application Servers• A typical Desktop

Page 46: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Application Security

Consists of the requirements, specifications, architecture,

implementation, and test procedures used to secure applications

Page 47: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Application Security Assessment

Gather application and internal development docs, source code

Review source code for common programming flaws

Use static code analysis tools• Fortify, RATS, ITS4, FlawFinder

Skill dependent task; time consumingAt minimum, evaluate development

procedures

Page 48: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Operational Security

Consists of the day-to-day security management planning and actions taken to support the mission of the

organization

Page 49: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Operational Security Assessment

Gather procedures, contingency plansEvaluate overall security managementReview backup, disposal proceduresExamine business continuity, disaster

recovery plansLook at automated security tasks (virus

updates, patches, integrity checks)Look at administrator security practices

Page 50: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Physical Security

Consists of the planning and protective measures taken to prevent

unauthorized access to the facilities and damage to and loss of assets

Page 51: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Physical Security Assessment

Gather policy and procedure documents Examine facility and take pictures Building

• Life Safety (fire/smoke detection, alarms, suppression)• Burglar alarms, security guards, police response time

Security Perimeter• Strong doors, locks, visitor areas, sign-in procedures

Server Rooms• Environmental controls and monitoring• Sufficient power and HVAC• Locked cabinets and equipment

Page 52: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Reporting and Follow-up

Page 53: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Reporting and Follow-up

Once the assessment is complete, a report is needed to inform the client of issues found

Report should explain findings in simple terms (remember the audience)

Be available to answer questions and provide explanations

Page 54: Security Assessments Keith Watson, CISSP kaw@cerias.purdue.edu Research Engineer Center for Education and Research in Information Assurance and Security

Part 3: The Assessment “Experience”

Tools• Demonstration of Nessus• Report Template

TrainingCertification