Prague Security Architecture
Prague Security Architecture
Some definitions:
1
Security architecture objectives
• design,
• implementation,
• management,
• risk management.
2
Security architecture main aspects
3
Security investments
• Both.
• Security threats evolve, malware attacks and zero attacks are
constant.
• Thinking about incident response when it already happens is
poor strategy.
• Know your data, create backups, harden individual systems,
update software regularly, segment network into multiple
subnets, use firewall and monitor the activities.
4
Security architecture focus
5
Some security principles
• defense in depth,
• zero trust,
• least privilege access.
6
Defense in depth
7
Zero trust architecture
8
Zero trust
Zero trust concept evolved over the years. In the 90s this meant
providing a firewall, later on, with additional networks in place, it
involved hardening systems individually, then detection became the
principal focus.
Major changes in security happened with moving the services in
the cloud and with mobility, and remote work.
9
Least privilege access
10
Security Design Principles
12
CIS controls (2)
13
CIS controls (3)
14
https://www.sans.org/blog/cis-controls-v8
CIS benchmarks
15
CIS controls - Network infrastructure mgmt
16
CIS controls - Network monitoring
17
CIS benchmark - Network configuration Linux
18
CIS benchmark - Remove services
19
NIST standards
https://www.nist.gov/cybersecurity
20
NIST cybersecurity focus
21
NIST standards
22
ISO/IEC Standard 19249:2017
23
CIS controls eliminate risks?
24
Establish security policies
25
Hardware security
26
Hardware security considerations
• procurement process,
• supply chain,
• device security - physical security, software security,
• encryption.
27
OS Security
28
Essentials of operating system
security
30
Time to choose a strong password
Source: https://www.server-world.info
32
Login nodes and user interfaces
33
Too complex services
34
Configuration Management
35
Configuration Management Tools
36
Linux hardening tools
37
Nessus
Source: https://www.tenable.com/products/nessus/demo
38
OpenSCAP security standards
39
OpenSCAP report for CentOS 8
40
Lynis
• Security scan,
• file permissions checks,
• tips for additional OS hardening: kernel parameters (sysctl),
SSH configuration, PAM configuration etc.,
• vendor guides included,
• supports multiple standards, such as NIST and also CIS
benchmarks.
41
Lynis report
42
Devops and security
43
Logging
• what to log?
• problem are different formats, timestamps, timezones
• use centralised log management, then analyse
• normalise logs (same format for all)
• provide log rotation
• specify log rotation policy (diskspace, regulatory requirements)
• visualise vital logs
• software: NXlogs, ELK, Graylog, Loki, rsyslog, syslog-ng
44
Logging checklist
https://www.sans.org/brochure/course/log-management-in-depth/6
45
FIS and HIDS
46
Integrity monitoring
48
Firewall
49
Rootkit detectors
• rkhunter
• chrootkit
50
Rkhunter scan report
51
OS security summary
52
Physical security
53
Physical security
54
Network security
55
Essentials of secure network design
56
System and network hardening
57
Network segmentation
• access control/firewalls,
• VLANs (virtual local area network),
• SDN (software defined network).
58
How to segregate network?
59
Enterprise network
Eg. Problem with DHCP and flat networks: each device can send
DHCP reply
60
Common network segments
61
Basics for network topology design
62
Network topology example
63
Network attacks
Network and switches are some sort of network nodes, they are
target of malicious attacks and should be secured as any other
node and kept updated.
• DoS,
• packet sniffing,
• packet misrouting,
• SYN Flood,
• brute force attacks,
• MITM attack,
• ARP cache poisoning,
• etc.
64
How to prevent such network
attacks?
65
beginframe[Attack mitigation software]
Attack mitigation software
65
Usually appliances, deployed between router and network firewall,
commercial solutions. Prevent from DDoS attacks (blackholes,
scrubbing), brute force attacks, syn flood attacks etc.
66
Device Security
• autoconfiguration support
• IPv6 over IPv4 tunneling support, IPv4 over IPv6 support
• flexible protocol support: NDP (network discover protocol),
SLAAC (stateless address autoconfigration)
• support for encryption
• support for IPsec - authentication, integrity and protection
against replay attacks
• better QOS support (better availability)
• packet fragmentation is done by hosts only
• Snort
• tcpdump
• Wireshark
• dsniff (for switches)
• Kismet (for wireless)
• nmap
69
Network security tools
71
Network design recap
72
Data security
73
Privacy vs Security
74
Data privacy and security
considerations
75
Data lifecycle
76
Virtualisation security
77
Virtualisation and cloud
78
Why does cloud security matter?
79
Virtualisation security essentials
80
Cloud services
81
Cloud security challenges
82
Private vs private cloud
• Private cloud:
• security is a responsibility of the organisation,
• number of VMs is pretty stable,
• scalability is limited,
• bandwidth is limited,
• data storage and access under control of the organisation,
• potential of providing perfectly safe environment (behind a
firewall).
• Public cloud:
• shared responsibility between customer and cloud provider,
• seemingly infinite resources,
• main target for security attacks (security is big investment),
• no control over data for customer,
• customer needs to trust cloud provider.
83
Cloud models
84
Common threats in the cloud
85
How to prevent common attacks?
87
References
88
References (2)
90
References (4)