windows 2000 security policies & practices: how to build your plan mandy andress, cissp...

21
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Upload: silvester-willis-mcdaniel

Post on 11-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Windows 2000 Security Policies & Practices:How to build your plan

Mandy Andress, CISSPPresidentArcSec Technologies

Page 2: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

What will be covered today

Understanding information assets

Capturing core values and security needs

Performing risk assessment

Formulating security policy

Implementing Windows security policy

Page 3: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

What are Information Assets?

Documents, data or information of value

Primary components• Customer information, history, preferences, etc.

• Product or service description, content, components, etc.

• Process & procedure descriptions (“how you run the

business”)

Anything you don’t want to share, give away

or disclose freely to everyone = asset in

need of protection

Page 4: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Recognizing Risk

“Possibility of harm or loss”

Probability of experiencing loss resulting

from a threat event

Risk assessment = associating value or

cost with specific loss

PURPOSE OF SECURITY IS TO MANAGE

RISK!!

Page 5: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Risk Assessment Lingo

Threat Agent

Exposure Factor

Single Loss Exposure Value

Probability of Loss

Annualized Loss Expectancy

Page 6: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Managing Risk

Removing risk

Mitigating risk

Transferring risk

Page 7: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Performing Risk Assessment – Part 1

What can go wrong?

If it happened, how bad would it be?

How often might it happen?

How sure are answers to preceding questions?

What to do to remove, mitigate or transfer risk?

How much will it cost?

How efficient is it?

Page 8: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Performing Risk Assessment – Part 2

Inventory, definition, requirements

Vulnerability and threat assessment

Evaluation of Controls

Analysis, Decision, and Documentation

Communication

Monitoring

Insurance

Page 9: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Understanding Security Policy

Not technology specific

Three primary functions• Reduce or eliminate legal liability to employees & 3rd

parties

• Protect confidential or proprietary information from theft, misuse, unauthorized disclosure, loss or modification

• Prevent waste of company computing resources

Internal policy (inward focus) is key to proper formulation!

Page 10: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Security Policy Lifecycle

Policy development

Policy enforcement

Policy monitoring, review, and

maintenance

Page 11: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Developing Security Policy

Identifying key business resources & policies

Defining organizational roles

Determining capabilities/functionality matrix for each role

Important standards• ISO 17799 (formerly known as BS 7799)

• RFCs 2196 and 2504

Page 12: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Avoiding Policy Pitfalls

Always consider organization culture when creating information security policies

Develop realistic policies explicitly endorsed by management

Never underestimate the importance of teaching policy awareness

Develop policies, compliance monitoring procedures, and define consequences for noncompliance in tandem

ld

Root Domain

Page 13: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Key Security Policy Components

Numerous documents make up a security

policy, including:

• Acceptable Use Policy User Account Policy

• Remote Access Policy Information Protection

Policy

• Firewall Mgmt Policy Special Access Policy

• Netwk Connection Policy Business Partner Policy

• Customer Policy Service Provider Policy

Page 14: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Procedures Implement Policy

Step-by-step technical discussions of

how policy will be implemented

Important Procedures• Configuration Management

• Backup and Off-site Storage

• Incident Response

• Business Continuity and Disaster Recovery

Page 15: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Sample Security Policies & Info

SANS Security Policy Project

CMU Octave Framework

Murdoch Univ “Information Technology Security Policy” report

UC Davis Security Policies

NIH IT Security Policy & related documents

Security Policies Made Easy

ISO 17799

Page 16: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Windows Security Policy

No direct mapping from security policy

to implementation

Requires strong working knowledge of

both sides (policy & OS)

Applies through numerous controls,

consoles, & utilities

Page 17: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Windows 2000 Group Policy

GPO: Active Directory construct,

collection of policies

• Address user and computer configuration

• Address security settings defined in security

templates

Provides controls over many aspects of

security

Page 18: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Key Group Policy Topics & Tools

Group Policy tools

GPO components (what can be modified using Group Policy)

Using Security Configuration & Analysis tools with Group Policy editors

Default Group Policy Objects (GPOs)• Local Security Policy, DC Security Policy, Domain Security Policy

Group Policy inheritance (how Group Policy applies)

Group Policy with Windows NT &/or Windows 9x systems

Page 19: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Proper Implementation Strategy

Start with non-production test environment

Introduce changes slowly & in controlled

manner

Best use of Group Policy occurs within AD

environments

Proceed carefully with production deployment

Be ready to roll back as needed

Page 20: Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies

Key Microsoft Resources

Microsoft Security Site

Introduction to Microsoft Windows 2000 Group

Policy

White Paper: Windows 2000 Group Policy

Step-by-Step Guide to Understanding the Group

Policy Feature Set

Windows 2000 Resource Kit: Group Policy

Search on “Group Policy” view Best Bets results!