Securing The Server: Prepared
Securing The Server: Prepared
the
server
Prepared by
• Physical Security Methods and Concepts
• Server Hardening Techniques
Physical Security Methods and Concepts
• There are many logical security methods that can be used to protect the data on a server, if users
can attain physical access to the server, the options available to them to compromise the server
increase dramatically.
• Multifactor Authentication:- There are three factors of authentication. When more than one of
these factors is required to authenticate, it is called multifactor authentication. It is not
multifactor if it uses two forms of the same factor of authentication.
• Something You Have
• Something You Know
• Something You Are(Prone to False Positive and False Negative)
Security Concepts
• A Mantrap is a series of two doors with a small room
between them. The user is authenticated at the first door
and then allowed into the room. At that point additional
verification will occur (such as a guard visually identifying
the person) and then the user is allowed through the
second door. Mantraps also typically require that the first
door is closed, prior to enabling the second door to open.
• An increasingly popular method of tracking physical assets is to tag them with radio frequency
identification (RFID) chips . This allows for tracking the location of the asset at any time.
• The main components of this are
• RFID Reader This device has an antenna and an interface to a computer.
• Transponder This is the tag on the device that transmits its presence wirelessly.
• The tags can be one of two types: passive and active.
• Active tags have batteries whereas
• passive tags receive their energy from the reader when the reader interrogates the device.
• All users should possess and wear Identification Cards, but it becomes even more
important when those users have access to the server room.
• Biometric
• Keypad
• Access List
• Security Guard
• Security Camera
• Key and Locks
• Cabinet
Server Hardening Techniques
• It involves hardening the system logically
—that is, hardening the operating system and applications
—and hardening the server physically by ensuring the device cannot be tampered with by
someone who can touch the server
OS Hardening
Involves a series of steps that should result in a server that offers a minimum of
attack points to a hacker.
Stopping Unneeded Services/Closing Unneeded Ports
The easiest way to do this is to install a host firewall on the system and adopt a “disable by
default” policy with respect to services. Then manually enable any you need
Installing Only Required Software
You should examine all installed applications and retain only those you need.
Installing Latest Operating System Patches
Always keep the server updated with all operating system patches and service packs.
• Implementing Application Hardening
• Applications can have many features and embedded programs that you may not make use of.
Determine which of these you require.
• Installing Latest Patches
• Applications can have many features and embedded programs that you may not make use of.
Determine which of these you require.
• Disabling Unneeded Services/Roles/Features
Endpoint Security
• Therefore, the process of providing endpoint security is the process of ensuring that
every endpoint (including servers) has been secured in the same way in which you would
secure the network gateway.
• There are two main issues to consider when providing endpoint security:
• Identifying intrusions when they occur and preventing the spread of malware.
A host-based intrusion detection system (HIDS) is installed on the device (for the purpose
of our discussion, a server) and the system focuses solely on identifying attacks on that
device only.
These systems can use several methods of detecting intrusions.
• Signature Based Analyzes traffic and compares patterns, called signatures, that reside
within the IDS database. This means it requires constant updating of the signature
database.
• Anomaly Based Analyzes traffic and compares it to normal traffic to determine if the
traffic is a threat. This means any traffic out of the ordinary will set off an alert.
There are drawbacks to these systems:
• A high number of false positives can cause a lax attitude on the part of the security team.
• Constant updating of signatures is needed.
• A lag time exists between the release of the attack and the release of the signature.
• An HIDS cannot address authentication issues.
• Encrypted packets cannot be analyzed.
• In some cases, IDS software is susceptible itself to attacks.
Hardware Hardening
• Disabling Unneeded Hardware and Physical Ports/Devices
The closing of any software ports that are not in use is part of digital hardening, but the
disabling of any physical ports or connections on the server is a part of physical hardening.
Some of the items that should be considered for disabling are
USB ports
NICs
Serial ports
Firmware ports
Disabling the Network Adaptor in Windows
Server 2012 R2
1. Open the Server Manager tool if it is not already open.
2. From the Tools menu select Computer Management.
3. In the Computer Management
console select Device Manager.
4. Locate and expand the Network
Adaptors device category as
shown in fig
5. Right click the network adaptor you wish to disable (this server has only one, but your
server may have more than one) and select Disable from the menu.
6. You can verify your work by looking for the black down arrow next to the adaptor as
shown in Figure
BIOS Password
• This can prevent someone with physical access to the server from booting to the BIOS,
changing the boot order, and enabling a boot device for the purpose of booting to an
external OS that they can use to take data off the hard drive.
Which authentication mechanism is an example of
something you have?
A. Password
B. Username
C. Smart card
D. Retina scan
Which authentication mechanism is an example of
something you have?
A. Password
B. Username
C. Smart card
D. Retina scan
Which of the following is not a drawback of using
active RFID chips?
A. A high number of false positives can cause a lax attitude on the part
of the security team.
B. An HIDS cannot address authentication issues.
C. Encrypted packets cannot be analyzed.
D. An HIDS monitors all traffic that goes through it looking for signs of
attack on any machine in the network.
Which of the following is not true of an HIDS?
A. A high number of false positives can cause a lax attitude on the part
of the security team.
B. An HIDS cannot address authentication issues.
C. Encrypted packets cannot be analyzed.
D. An HIDS monitors all traffic that goes through it looking for signs of
attack on any machine in the network.
Which of the following is not an example of
physical hardening of the server?
• Network-Based firewalls are one of the first lines of defence in a network. There
are different types of firewalls, and they can either be standalone systems or they
can be included in other devices such as routers or servers.
Firewalls function as one or more of the following:
• ■ Packet filter
• ■ Proxy firewall
• ■ Stateful inspection firewall
• Packet Filter Firewalls A firewall operating as a packet filter passes or blocks traffic to
specific addresses based on the type of application. The packet filter doesn’t analyze the
data of a packet; it decides whether to pass it based on the packet’s addressing
information.
• A Proxy firewall can be thought of as an intermediary between your network and any
other network. Proxy firewalls are used to process requests from an outside network and
those outbound from inside the network.(This Process includes hiding IP addresses).
• Stateful inspection is also referred to as stateful packet filtering. Most of the devices
used in networks don’t keep track of how information is routed or used.
How Firewall Works
• Port Security
• 802.1x
• NAC
Port Security
• Port security applies to ports on a switch, and since it relies on monitoring the MAC
addresses of the devices attached to the switch ports, we call it Layer 2 security.
There are several things you can accomplish with port security. It can be used to
• Set the maximum number of MAC addresses that can be seen on a port.
• Define exactly which MAC addresses are allowed on the port.
• Take a specific action when a port violation occurs.
802.1x
• The IEEE 802.1x security standard describes a method of centralizing the authentication,
authorization, and accounting of users that connect either locally or remotely to the
network.
• It is sometimes called port-based access control because in an 802.1x architecture, the
user’s port to the network is not opened until the processs is complete.
• The 802.1x architecture can be applied to both wireless and wired networks and uses
three components:
1. Supplicant The user or device requesting access to the network
2. Authenticator The device through which the supplicant is attempting to access the network
3. Authentication Server The centralized device that performs authentication
NAC
• Network Access Control (NAC) is a service that goes beyond authentication of the user.
NAC includes an examination of the state of the computer the user is introducing to the
network when making a remote access or VPN connection to the network.
• These services are called Network Access Protection(NAP) in Microsoft world. The goal
to examine all the devices requesting network access for malware, missing security
updates any other security issues the device could potentially introduce to network.
• The health state of the device requesting access is collected and sent to the Network
Policy Server (NPS), where the state is compared to requirements. If requirements are
met, access is granted and if requirements are not met access is usually limited or
denied.
Router Access List
• If you want to prevent users in the Sales subnet from accessing data in the Finance
subnet. In these scenarios, you can use access control lists (ACLs) on the router.
• The inherent limitation of ACLs is their inability to detect whether is occurring. IP
spoofing
• The hacker alters the IP address as it appears in the packet. This can sometimes allow the
packet to get through an ACL that is based on IP addresses.
• It also can be used to make a connection to a system that only trusts certain IP addresses
or ranges of IP addresses.
NIDS
• A network-based IDS (NIDS) monitors network traffic on a local network segment. This is
in contrast to a host-based IDS (HIDS) that monitors a single machine.
• For example, if only one device should be able to connect to the Finance server,
the device and the Finance server could be placed in a VLAN separate from the
other VLANs.
Thank you