Operating Systems Security
Operating Systems Security
System
security begins Initial
Should stage
installation
with the should install and validate all
installation of the minimum Critical that the patches on the
system be kept
the operating necessary for
up to date, with
test systems
system the desired before
all critical
system deploying them
security related
patches installed in production
Full installation
Ideally new and hardening
systems process should
should be occur before the
constructed system is
on a protected deployed to its
network intended location
Remove
Unnecessary
Services, • When performing the
Applications, initial installation the
Protocols supplied defaults should
not be used
• Default configuration is set
to maximize ease of use and
• If fewer software packages functionality rather than
security
are available to run the risk
is reduced • If additional packages are
• System planning process needed later they can be
installed when they are
should identify what is required
actually required for a
given system
• System planning process
should consider:
Configure
• Categories of users on the system
Users, Groups,
and • Privileges they have
Generates significant
Range of data acquired
Information can be volumes of information
should be determined
generated by the system, and it is important that
during the system planning
network and applications sufficient space is allocated
stage
for them
Automated analysis is
preferred
Data Backup and Archive
Performing regular Needs and policy
backups of data is Backup Archive relating to
a critical control backup and
that assists with archive should be
maintaining the The process of The process of determined
integrity of the making copies of retaining copies of
during the system
data over extended
system and user data at regular
periods of time in planning stage
intervals
data order to meet legal
and operational
requirements to
May be legal or access past data
operational Kept online or
requirements for offline
the retention of
data
Stored locally or
transported to a
remote site
• Trade-offs include
ease of
implementation and
cost versus greater
security and
robustness against
different threats
Linux/Unix Security
• Patch management
• Keeping security patches up to date is a widely recognized and critical
control for maintaining security
Users administration
Patch and access controls
management •Systems implement
discretionary access controls
• “Windows Update” and resources
“Windows Server
•Vista and later systems include
Update Service” assist mandatory integrity controls
with regular
•Objects are labeled as being of
maintenance and should
low, medium, high, or system
be used integrity level
• Third party applications •System ensures the subject’s
also provide automatic integrity is equal or higher than
update support the object’s level
•Implements a form of the Biba
Integrity model
Windows Security
Users Administration and Access
Controls
Windows systems also define Combination of share and
privileges NTFS permissions may be
•System wide and granted to user used to provide additional
accounts security and granularity when
accessing files on a shared
resource
• Free, easy to use tool that checks for compliance with Microsoft’s security
recommendations
Virtualization
• A technology that provides an abstraction of the
resources used by some software which runs in a
simulated environment called a virtual machine (VM)
• Benefits include better efficiency in the use of the
physical system resources
• Provides support for multiple distinct operating systems
and associated applications on one physical system
• Raises additional security concerns
Hypervisor
• Software that sits between the hardware and the VMs
• Acts as a resource broker
• It allows multiple VMs to safely coexist on a single
physical server host and share that host’s resources
• Virtualizing software provides abstraction of all physical
resources and thus enables multiple computing stacks,
called virtual machines, to be run on a single physical
host
• Each VM includes an OS, called the guest OS
• This OS may be the same as the host OS, if present, or a
different one
Hypervisor Functions
• Execution management of VMs
• Devices emulation and access control
• Execution of privileged operations by
hypervisor for guest VMs
• Management of VMs (also called VM
The principal lifecycle management)
functions performed • Administration of hypervisor platform and
by a hypervisor are: hypervisor software
Virtualized Systems
• In virtualized systems, the available hardware resources must
be appropriately shared among the various guest OS’s
• These include CPU, memory, disk, network, and other
attached devices
• CPU and memory are generally partitioned between these,
and scheduled as required
• Disk storage may be partitioned, with each guest having
exclusive use of some disk resources
• Alternatively, a “virtual disk” may be created for each guest,
which appears to it as a physical disk with a full file-system,
but is viewed externally as a single ”disk image” file on the
underlying file-system
• Attached devices such as optical disks, or USB devices are
generally allocated to a single guest OS at a time
Software Defined
Networks (SDNs)
SDNs enable network segments to logically span multiple servers
within and between data centers, while using the same underlying
physical network
• These abstract all layer 2 and 3 addresses from the underlying physical network into
whatever logical network structure is required
• This structure can be easily changed and extended as needed
• The IETF standard DOVE (Distributed Overlay Virtual Network) which uses
VXLAN (Virtual Extended Local Area Network) can be used to implement such an
overlay network
• With this flexible structure, it is possible to locate virtual servers, virtual IDS, and
virtual firewalls anywhere within the network as required
Containers
• A recent approach to virtualization is known as container
virtualization or application virtualization
• In this approach, software known as a virtualization container,
runs on top of the host OS kernel and provides an isolated
execution environment for applications
• Unlike hypervisor-based VMs, containers do not aim to
emulate physical servers
• All containerized applications on a host share a common OS
kernel
• For containers, only a small container engine is required as
support for the containers
• Containerization sits in between the OS and applications and
incurs lower overhead, but potentially introduces greater
security vulnerabilities
Virtualization Security
Issues
• Security concerns include:
• Guest OS isolation
• Ensuring that programs executing within a guest OS may
only access and use the resources allocated to it
• Guest OS monitoring by the hypervisor
• Which has privileged access to the programs and data in
each guest OS
• Virtualized environment security
• Particularly image and snapshot management which
attackers may attempt to view or modify
Securing Virtualization
Systems
• Carefully plan the
Organizations security of the
virtualized system
using • Secure all elements of
a full virtualization
virtualization solution and maintain
their security
should:
• Ensure that the
hypervisor is properly
secured
Access must
be limited to
just the
appropriate
guest OSs
Systems
manage access
to hardware
resources
Virtual Firewall
Provides firewall capabilities for the network traffic flowing
between systems hosted in a virtualized or cloud
environment that does not require this traffic to be routed
out to a physically separate network supporting traditional
firewall services
VM Host-Based
VM Bastion Host Hypervisor Firewall
Firewall