you’re not done (yet) turning securable applications into secure installations using scap

27
© 2011 The MITRE Corporation. All rights Reserved Approved for Public Release: 11-2634. Distribution Unlimited You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP Charles Schmidt Sept 23, 2011

Upload: essien

Post on 25-Feb-2016

28 views

Category:

Documents


0 download

DESCRIPTION

You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP. Charles Schmidt Sept 23, 2011. Who Am I. The MITRE Corporation A U.S. non-profit research company chartered to work in the public interest No products – what we are talking about is free - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited

You’re Not Done (Yet)Turning Securable Applications into Secure Installations using SCAP

Charles SchmidtSept 23, 2011

Page 2: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited2

Who Am I

The MITRE Corporation– A U.S. non-profit research company

chartered to work in the public interest

– No products – what we are talking about is free

■ Other companies can and have productize this work

Charles Schmidt– 11 years of work in security

automation standards

Page 3: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited3

Engineers Cannot Create Secure Applications

■ Perfect engineering will not produce secure applications– “secure applications” = do their part in protecting an enterprise

■ No flaws, no weaknesses, no bugs - Still not secure

Page 4: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited4

Perfect Engineering

A very well engineered barrier…

… in a sub-optimal configuration

Page 5: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited5

Security

■ Security = well built software that is correctly deployed and managed given an enterprise’s mission needs– Developed using good security engineering practices– Placed in a user environment, configured, and maintained

■ At best, engineering makes an application securable

■ Why should you care?– Because you want your customers & yourself to have actual

security, not the illusion thereof■ Otherwise you wouldn’t be here

– Because most examples of bad configuration are not as obvious as the picture

– Because you can help

Page 6: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited6

The Missing Link

■ Between the mission experts (users) and the tool experts (engineers)– Tool experts know how the app and supporting infrastructure

works– Mission experts know the local constraints of their enterprise– Not perfect alignment, but there is alignment - otherwise app

would not be usable in the enterprise■ Engineers may not know the mission of the destination enterprise■ Engineers do know their general use cases

■ There must be a link for security to be achieved

Page 7: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited7

Documentation vs. Guidance

■ Documentation is the complete guide to an app■ Guidance is a set of suggestions for how to configure it

■ Analogy:– Documentation is a map– Guidance is a route

■ Guidance cannot be a straightjacket - variances in mission must be allowed– Users can take detours, but let them detour from a well-planned

route

Page 8: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited8

Automated Security Guidance

■ Automated security guidance – Guidance in a format that supports automated assessment

■ A route and an auto-pilot– User gets a list of all compliance and non-compliance

■ User only becomes involved when there is a need to change something– In most enterprises, this will be a minority of items

■ User now can focus on critical elements– Where their mission requires special configurations– Where their configurations do not meet best security practices– Use documentation to tell which is which

Page 9: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited9

SCAP

■ US Government’s approach to automated guidance is SCAP– Security Content Automation Protocol– The unification of a suite of smaller focused standards

■ Identifies how these standards work together to support security automation

■ All component standards are usable alone – SCAP just shows how to connect

OCILSCAP

Page 10: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited

■ Enumerate software vulnerabilities – provide common name■ Minimal description and references

– Expanded descriptions available at http://nvd.nist.govE.g. CVE-2009-1045:

Common Vulnerabilities and Exposures (CVE)

Page 11

From http://cve.mitre.org

Page 11: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited

■ Scores a given vulnerability based on its likely danger– Score runs between 0 (no danger) and 10 (extreme danger)

■ Three parts– Base – the inherent danger of the vulnerability

■ A provider can fill this out ahead of time– Temporal – changes over time

■ Depends of maturity of exploits and remediations– Environmental – reflects specific dangers to an enterprise

■ Depends on how critical the threatened component is and the impact of failure

■ CVSS Vectors describe factors contributing to scores– E.g., (AV:N/AC:M/Au:N/C:C/I:C/A:C) = 9.3

■ Exploitable over the network■ Exploit is moderately difficult■ No authentication needed■ Critical impact to confidentiality, integrity, and availability

Common Vulnerability Scoring System (CVSS)

Page 12

Page 12: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited

■ Enumerate configuration functions in software■ Minimal description, possible ways to configure, and

references

■ CCEs do not contain recommendations – policy neutral

Common Configuration Enumeration (CCE)

Page 13

Page 13: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited

■ Means of naming pieces of software/hardware– Allows recommendations, vulnerabilities, etc. to be tied to

specific software or software sets■ CPE names are composed of a descriptive URI

– cpe:/{part}:{vendor}:{product}:{version}:{update}:{edition}:{language}– Part is “o” for Operating System, “a” for Application, or “h” for

Hardware– Empty blocks cover all possible values (e.g. all versions or all editions)

■ Examples:– cpe:/o:microsoft:windows_xp::sp1

■ Microsoft Windows XP Service Pack 1 (all versions, editions, and languages)

– cpe:/a:apache:http_server:2.3.6■ Apache Software Foundation Apache HTTP Server 2.3.6

Common Platform Enumeration (CPE)

Page 14

Page 14: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited15

■ Standard format for security guidance– XML format is machine readable and can be converted to

human-readable documents– Can drive automated assessment of system compliance

■ Tailoring structures allow users to easily customize recommendations & assessments

■ Standardized format allows content to be used by tools from multiple vendors

Extensible Configuration Checklist Description Format (XCCDF)

Page 15: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited16

Sample XCCDF<Rule id="mlom_service" weight="10.0">  

<title>MLOM_Service automatically enabled</title>  <description>The MLOM_Service is required to support the MakeLotsOfMoney

web application. Ensure automatic startup to prevent application failure.</description><check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">

<check-export export-name="oval:developer.com:var:10000" value-id="mlom_service_var"/>  

<check-content-ref href="mlom_guidance_oval.xml“ name="oval:developer.com:def:142"/>

</check></Rule>

<Value id="mlom_service_var" type="number"><title>MLOM_Service automatically enabled </title><description>Defines the startup state of the service</description><value>2</value><value selector="automatic">2</value><value selector="manual">3</value><value selector="disabled">4</value>

</Value>

Page 16: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited17

■ Standardized format to express assertions about system state– Describe how to locate system artifacts (registry keys,

configuration files, RPM packages, etc.)– Describe assertions about the state of these system artifacts– Can combine to create sophisticated assertions with many factors

■ Public repositories of OVAL content exist– http://www.redhat.com/security/data/oval/ (RedHat Errata)– http://oval.mitre.org (Public OVAL repository – many platforms)

■ Many uses– Vulnerability detection– Inventory– Configuration assessment– Patch detection

■ Many vendor tools ingest OVAL content and produce OVAL results

Open Vulnerability Assessment Language (OVAL)

Page 17: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited18

Sample OVAL (1)

<definition id="oval:developer.com:def:142"><metadata>

<title>MLOM_Service State</title><affected family="windows">

<platform>Microsoft Windows 7</platform></affected><description>MLOM_Service start state = automatic</description>

</metadata><criteria>

<extend_definition comment="Windows 7 is installed" definition_ref="oval:gov.nist.cpe.oval:def:1"/>

<criterion comment="Registry key mlomserv!Start = automatic" test_ref="oval:developer.com:tst:10001"/>

</criteria></definition>

Page 18: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited19

Sample OVAL (2)

<registry_test id="oval:developer.com:tst:10001" version="1" comment="Registry key mlomserv!Start = variable">

<object object_ref="oval:developer.com:obj:10000"/><state state_ref="oval:developer.com:ste:10000"/>

</registry_test>

<registry_object id="oval:developer.com:obj:10000" version="1"><hive>HKEY_LOCAL_MACHINE</hive><key>SYSTEM\CurrentControlSet\Services\mlomserv</key><name>Start</name>

</registry_object>

<registry_state id="oval:developer.com:ste:10000" version="1"><type>reg_dword</type><value datatype="int" var_check="all"

var_ref="oval:developer.com:var:10000"/></registry_state>

Page 19: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited20

■ Standardized format for user questionnaires– Can express question trees, with follow-on questions based on

prior responses– Can also be used to guide the collection of system findings and

evidence■ Used for…

– Collection of non-technical assessment information– User assessment

■ Newer standard– Limited vendor support but expected to grow

Open Checklist Interactive Language (OCIL)

Page 20: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited21

Current SCAP-Validated Vendors

■ List of validated vendors and products available at http://nvd.nist.gov/scapproducts.cfm

Information current as of May 13, 2011 Logos are trademarked by their respective corporations

Page 21: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited22

Security Guidance Use Case

■ Publish guidance for an application– Authors might be application engineers or third-party

integrators– Guidance not just for app, but relevant underlying

infrastructure■ E.g. Web framework or server

– Reflect applications requirements as well as security recommendations

– May include multiple postures for different cases■ E.g., DMZ installation vs. interior installation

■ From SCAP– XCCDF for guidance framework– OVAL for technical checks/OCIL for non-technical checks– If a public application, use CCE and CPE to annotate

■ Users utilize for initial configuration and ongoing maintenance– Can tailor policy for local needs

Page 22: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited23

Inventory Management Use Case

■ Name and detect application presence– Identify relevant software and versions– Identify necessary supporting architecture

■ From SCAP– If a public application, register a CPE– Define OVAL checks for detection

■ Users can automatically detect instance/version– Alert to rogue instantiations– Alert to obsolete versions– Correlate to alerts and other information

Page 23: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited24

Vulnerability Management Use Case

■ Alert users to discovered software flaws– Provide a means for users to understand and respond

appropriately■ From SCAP

– If a public app, register a CVE■ If a custom application, CVE is unnecessary

– Use CVSS to alert users as to nature of threat– Create OVAL definitions to determine when the flaw has (not)

been patched■ Users gain rapid understanding of the threat (if any)

– Know the number of issues– Know the magnitude of the necessary response– Know when their environments are vulnerable and when not

■ Patching failures are a major cause of enterprise vulnerabilities – using automated tools lowers the bar

Page 24: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited25

OWASP Project

■ OWASP OVAL Content Project– A recently created project to create OVAL content of interest to the

OWASP community– Gaurav Kumar – Project leader– https://www.owasp.org/index.php/OWASP_OVAL_Content_Project

■ This will provide content that can then be part of customized guidance bundles

Page 25: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited26

Conclusion

■ Cannot just provide well built applications– Need to provide link to user and their enterprise

■ Do not just describe features/use to users– Better to provide guidance that covers common cases– User gets to work from a baseline instead of first principles

■ Automated guidance is best of all– User only needs to pay attention to things that are not “normal”

■ SCAP is an easy, well tested way to provide automated guidance

■ We want to help– Mailing lists, documentation, online courses all available

Page 26: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited

■ More information on the standards– CVE – Vulnerabilities; http://cve.mitre.org– CVSS – Scores severity of vulnerabilities; http://www.first.org/cvss/– CCE – Configuration controls; http://cce.mitre.org– CPE – Platforms/applications; http://cpe.mitre.org– XCCDF – Structuring guidance; http://nvd.nist.gov/xccdf.cfm– OVAL – Checking language; http://oval.mitre.org– OCIL – Questionnaire language; http://scap.nist.gov/specifications/ocil– NVD – Resources for SCAP users; http://nvd.nist.gov/home.cfm– Making Security Measureable – More resources on SCAP and beyond;

http://measurablesecurity.mitre.org/■ MITRE provides free training on guidance development

– See our web site for more information: http://benchmarkdevelopment.mitre.org/

For More Information…

Page 27

Page 27: You’re Not Done (Yet) Turning Securable Applications into Secure Installations using SCAP

© 2011 The MITRE Corporation. All rights Reserved.Approved for Public Release: 11-2634. Distribution Unlimited28

Thank You