Practica de Encryptacion
Practica de Encryptacion
Many encryption utilities and even devices are available that can help
you secure your critical and sensitive information assets. Some
encryption technologies are even built into operating system, such as the
Encrypting File System (EFS), and the newer disk-encryption technology
from Microsoft, BitLocker, GuardianEdge Technologies
(http://www.guardianedge,com/) and PGP Corporation (http://pgp.com/)
provide third-party encryption tools. L-3 Titan Group (http://titan.com/)
manufactures encryption devices.
. 1
The Encrypting File System.
(EFS)
Windows 2000 and above provides security for file in storage on NTFS
volumes. This is called the Encrypting File System (EFS). EFS operates as
an additional layer of security complementing both the NTFS and share-
point permissions on Windows systems.
EFS should be implemented for any sensitive data. Because of the
increased frequency of portable devices being lost or stolen, it is
especially important to implement EFS on laptop computers.
Scenario
-------
You are responsible for the protection of sensitive information that
often gets produced and utilized on company-owned laptop computers. On
occasions, these laptops and sensitive files must be shared among several
top-level executives of the company.
Scope of Lab
-------
Duration
-------
This lab should take approximately 2 hours.
Setup
-------
You will create secured (encrypted) content and confirm that it is
secure. Then you will provide access to this content for selected other
user(s).
Caveat
-------
With the addition of any securing technology, there will be an increase
in administrative overhead to support that technology. It is possible
that users will lock themselves out of their sensitive content, requiring
a preconfigured Data Recovery Agent (Local Administrator for Workgroup
mode systems, configured manually, or the administrator of the domain for
domain members, automatically configured) to decrypt the content.
Procedure
-------
For this lab, you must first create the Data Recovery Agent Policy.
Then you will need to create two standard (nonadministrator) users: User1
and User2. User1 will create and secure sensitive content. You will then
log on as User2 and confirm that even though NTFS permissions should
allow access to the content, EFS does not allow User2 to access the
content.
Next you’ll log on as User1 again, and add User2 to the list of users who
can access the encrypted file.
Then you’ll log back on as User2 and confirm that you can access the
encrypted content as User2.
Equipment Used
-------
For this lab, you need the following equipment:
o Windows XP Pro system with the following configuration:
A member of Workgroup (not a member of domain).
At least one NTFS volume.
o Local Administrator access.
Details
-------
Configuring the Volume for EFS
6. In the right pane, right-click in the white area and select New >
Folder. Name the folder GOODSTUFF.
8. In the Properties dialog box, select the Security tab. Under Group Or
User Name, Select Users ComputerName\Users on the list of Group Or User
Names, where ComputerName is the name of your computer.
NOTE: In this case shown, the computer name is My Computer
9. Enable the Write permission under Permissions For Users. Click OK. You
have now confirmed that the volume supports EFS and you created a storage
location for the local users of the system.
Create Users.
3. In the right pane, right-click in the white space and select New User.
4. Type User1 for both User Name and Full Name. Type Password1 in the
Password and confirm Password fields. Clear the option User Must Change
Password At Next Logon, and enable the options User Cannot Change
Password and Password Never Expires. Click Create.
5. You will see a new, empty, New User dialog box. Type User2 for User
Name and Full Name. Type Password1 in the Password and Confirm Password
fields. Clear the option User Must Change Password At Next Logon, and
enable both User Cannot Change Password and Password Never Expires. Click
Create.
6. Click Close. Confirm the existence of the two new accounts for User1
and User2.
1. To define and EFS Data Recovery Agent (DRA) policy, you must produce a
DRA certificate for the local administrator. Still logged on as Local
Administrator, open and command windows by selecting Start > Run and
entering CMD. Then click OK.
2. You will create a location to hold the certificates and view the
properties of the command (Cipher) used to create the certificates. At
the command prompt, enter the command cd\. Press enter, which returns you
to the root of the C:\ drive.
3. At the command prompt, enter the command md AA. Press Enter to create
a new folder called C:\AA.
4. At the command prompt, enter the command cd AA. Press Enter to place
your focus in the new C:AA folder.
5. To create the certificates required for EFS Data Recovery, at the
command prompt enter this command:
Cipher /R:c:\AA\AdminEFSDRA
7. To Confirm the password, type Password1 a second time and press Enter.
The two certificates for DRA ara produced in the C:\AA folder.
9. Select Start > Programs > Administrative Tools > Local Security
Policy.
10. In the Local Security Settings dialog box, expand Public Key Policies
and select Encrypting File System.
11. Right-click on Encrypting File System and select Add Data Recovery
Agent. This launches the Add Recovery Agent Wizard. Click Next.
12. On the select Recovery Agents screen, click the Browse Folders button
and browse to C:\AA.
13. Select the AdminEFSDRA.cer file that you just created with the Cipher
command. Click Open. This pulls the certificate file into the Add
recovery Agent Wizard.
14. Click the Next button, and then click Finish.
20. Confirm the Certificate file with the .PFX extension is entered in
the File Name field. Click Next.
21. Enter the password Password1 to access the private key associated
with the certificate.
22. Leave the two checkboxes deselected and click Next in the wizard.
24. Click Finish. You should see message reporting that the import was
successful. Click OK to clear the message.
25. Log off as Local Administrator by selecting Start > Log Off
Administrator.
27. You have now confirmed and configured the C:\ drive for EFS, you have
created two users to implement ESF, and you have successfully configured
the local administrator as the EFS Data Recovery Agent.
Creating EFS Content as User1
5. Right-click in the white space in the right pane and select New > Text
Document.
9. Close Notepad.
12. In the Advanced Attributes dialog box, enable the option Encrypt
Contents to Secure Data.
14. Click Apply in the Properties dialog box. You will be prompted to
select between encrypting the folder and all content, or encrypting this
one file. Select The File Only.
15. Select the Security tab of the Properties dialog box. Select the
Users group in the top pane. Notice that users of the local system have
Read & Execute, Read, and Write permissions inherited from parent
folders. Click OK.
16. Open Secrets.txt with Notepad and view your message to confirm that
you can access the data, even though the file is now encrypted.
5. Close Notepad.
7. Click Advanced.
10. Click Apply in the Properties dialog box. You will be prompted to
select between encrypting the folder and all content, or encrypting this
one file. Select The File Only.
11. Select the Security tab of the Properties dialog box. Select the
Users group in the top pane. Notice that users of the local system have
Read & Execute, Read, and Write permissions inherited from parent
folders.
14. Open User2Secrets.txt with Notepad and view your message to confirm
that you can access the data logged on as User2, even though the file is
now encrypted.
5. Open Secrets.txt with notepad to confirm that User1 has access to the
EFS content.
6. Close Notepad.
14. Click View Certificate. This certificate for User2 holds User2’s
encrypting key. With this key, User1 can grant User2 access to the EFS
content, Secrets.txt. Close the certificate.
20. Open and view Secrets.txt to confirm that you still have access to
the data.
Scenario
-------
As a security administrator, you are responsible for protecting sensitive
information and implementing EFS. After cleaning up the User Account
database, you realize there is critical data that has been encrypted by a
deleted user account. You must recover the data and provide access to
that data to another user.
Scope of lab.
Duration
-------
This should take approximately 2 hours
Setup
-------
EFS is enabled through the user of a Public Key Infrastructure (PKI) and
digital certificates that contain an encryption key. If the decryption
key is lost, the user may never regain access to the EFS content.
A safety mechanism to minimize data loss is the EFS Data Recovery Agent.
By default, the administrator for the domain is the EFS Default Data
Recovery Agent in a system in Domain mode. Typically the Local
Administrator is configured as they EFS Data Recovery Agent on a system
in Workgroup mode. This must be done manually on a system in Workgroup
mode.
Procedure
-------
For this , you will delete a user (User2) that you created in .1. User2
created a secure data file called User2Secret.txt. You will the log on as
User1 and confirm that eve thought permissions should allow access to the
content, EFS does not allow User1 to access the User2 secured content.
You will then walk through the steps to decrypt the content and grant
ownership of the critical data to another user. This new owner should
implement EFS using their encryption key to secure this sensitive data.
Equipment Used
--------
For this , you need the following equipment:
Windows XP Pro system with the following configuration.
o A member of a workgroup (not a member of a domain).
o At least one NTFS volume.
Local Administrator access.
Completion of 1, “The Encrypting File System”.
Details
--------
Losing an EFS Encryption Key.
6. Close the Computer Management console. You have just deleted User2,
the only user account that had access to User2Secrets.txt.
10. Click the Advanced button. This opens the Advanced Attributes dialog
box. In this dialog box, click the Details button, which takes you to the
Encryption Details dialog box. To transfer access to User1, you must add
User1 to the Users Who Can Transparently Access This File list. Click the
Add button.
11. Select User1 in the Select User dialog box and click OK.
12. To tighten up the EFS security on this sensitive file, select User2,
the deleted user, in the Users Who Can Transparently Access This File
list, and then click the Remove button.