Cs205 Information Security Lecture Handouts Full
Cs205 Information Security Lecture Handouts Full
Module: 2
What is information Security?
IT Security functions:
Network security
Systems security
Application & database security
Mobile security
InfoSec functions:
Governance
Policies & procedures
Risk management
Performance reviews
Module:3
Why is information security needed?
REF: TELEGRAPH
REF: GUARDIAN
Module:4
Who is information security for?
Personal:
Organizational:
Law enforcement
Legal and policy making
National database
Critical infrastructure
Regulation
Standards and certification
Capacity-building and coordination
Legal
Technical
Organizational
Capacity building
Cooperation
Module:5
How is information security implemented?
People
Process
Technology
Leadership commitment:
IT user:
Understand policies
Conduct security/risk assessment
Design effective security architecture
Develop SOPs and checklists
Implement controls
Report incidents
Conduct effective change management
Business user:
Module:6
Who are the players of information security?
Government
Industry & sectors
International organizations
Professional associations
Academia and research organizations
Vendors and suppliers
Government:
Policy making
Law enforcement
Legal system
National cyber security strategy and standards
International coordination
Computer Incident Response Team (CIRT)
Financial institutions
Telecoms
Armed forces
Federal and provincial IT boards
Enterprises
Various other sectors (manufacturing, automotive, health,
insurance, etc)
International organizations:
APCERT (www.apcert.org)
European Union Agency for Network & Information Security -
ENISA (www.enisa.org)
ITU IMPACT (http://www.impact-alliance.org)
https://www.itic.org/dotAsset/c/c/cc91d83a-e8a9-40ac-8d75-
0f544ba41a71.pdf
Professional associations:
ISACA (isaca.org)
ISC2 (www.isc2.org)
OWASP (www.owasp.org)
Cloud Security Alliance
Pakistan Cyber Security Association (PCSA)
http://cybersecurityventures.com/cybersecurity-associations/
http://cybersecurityventures.com/cybersecurity-associations/
Module:7
What are the four layers of information security
transformation framework?
1. Security hardening
2. Vulnerability management
3. Security engineering
4. Security governance
1: Security hardening:
Compile IT assets
Establish minimum security baseline (MSB)
Research security controls and benchmarks
Pilot (test)
Implement controls
Monitor and update controls
2: Vulnerability management:
3: Security engineering:
4: Security governance:
Modules:8
What is information security hardening?
http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-
21.html
Module:9
What is information security governance?
Module:10
What is the difference between an information security
policy, SOP, and guideline?
Policy:
https://www.linkedin.com/pulse/20140611162901-223517409-
difference-between-guideline-procedure-standard-and-policy
Policy:
Procedure / SOP:
https://www.slu.edu/its/policies
Guideline:
https://www.slu.edu/its/policies
Standard:
https://www.slu.edu/its/policies
In practice:
Examples:
Module: 11
What is an information security program?
Project definition:
A project has a defined start and end point and specific objectives
that, when attained, signify completion.
pmtips.net/blog-new/difference-projects-programmes
Program definition:
pmtips.net/blog-new/difference-projects-programmes
Security program:
pmtips.net/blog-new/difference-projects-programmes
https://www.gartner.com/doc/2708617/information-security-
program-management-key
Module: 12
What is the role of people, process, and technology in
information security?
People:
Firewalls
Antivirus
Email anti-spam filtering solution
Web filtering solution
Data loss prevention (DLP) solution
https://www.rsaconference.com/writable/presentations/
file_upload/tech-203.pdf
Module: 13
What is the role of information security manager?
http://www.shortinfosec.net/2009/11/role-of-information-security-
manager.html
Develop policy
Training & awareness
Design security architecture
Design security controls
Ensure controls are implemented
Module: 14
What is information security awareness?
https://www.pcisecuritystandards.org/documents/
Awareness
Training
Education
Awareness:
Training:
Education:
NIST-SP-800-50
IMPLEMENTATION STEPS
Don’ts:
Do’s:
Module: 15
What are the leading information security standards and
frameworks?
ISO27001:2013 (ISMS)
ISO27
001:2013 MANDATORY CLAUSES
https://chapters.theiia.org/bermuda/Events/ChapterDocuments/
Information%20Security%20Management%20System
%20%28ISMS%29%20Overview.pdf
ISO27
001:2013 DISCRETIONARY CONTROLS
https://chapters.theiia.org/bermuda/Events/ChapterDocuments/
Information%20Security%20Management%20System
%20%28ISMS%29%20Overview.pdf
PCI_Data_Security_Standard_(DSS):
https://www.pcicomplianceguide.org/pci-faqs-2/
PCI DSS:
https://www.pcisecuritystandards.org/documents/
https://www.pcisecuritystandards.org/documents/PCI%20SSC
%20Quick%20Reference%20Guide.pdf
https://www.pcisecuritystandards.org/documents/PCI%20SSC
%20Quick%20Reference%20Guide.pdf
COBIT:
Module: 16
What is information security risks?
Risk Assessment:
Module: 17
What is management commitment?
c. Resources
d. Communicating importance
e. Intended outcomes are achieved
f. Directing and supporting persons
g. Promoting continual improvement
h. Supporting other management roles
In practice:
Security policy
Security responsibility delegated to head (CISO) or dept
Security steering committee (board level)
Quarterly or frequent management reviews of information
security program
Module: 18
Whose responsibility is implementation of security?
Module: 19
What can happen if information security is not
implemented
http://video.foxnews.com/v/5435057924001/?#sp=show-clips
http://www.informationisbeautiful.net/visualizations/worlds-
biggest-data-breaches-hacks/
Module: 20
What are the challenges of information security
implementation?
Challenges Of IT:
Challenges of InfoSec:
InfoSec
Transformation Model
Module: 21
What is the role of a regulator?
Singapore:
Pakistan lacks:
Module: 22
What is the status of information security in Pakistan?
https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-
E.pdf
Superficial security
Reactive
Emphasis on governance
Security hardening of IT assets largely absent
Industry has been in denial for last decade
Pakistan needs:
Module: 23
What is the solution for improvement of information
security in Pakistan.
CHAPTER:2
Module: 24
What does the typical enterprise IT network look like?
Edge router
NGN FW
DMZ:
Web security GW/Proxy
Application security FW
Web server
Email antispam GW
Module: 25
What are the major components of the enterprise it
network?
Edge router
WAN interfaces
Edge filtering (access lists)
DDOS protection
NGN FW
DMZ:
IPS:
Distribution switch
Access switch
User connectivity
Switchport security & access switch security
NAC
SIEM
Vulnerability Manager
System AV
Server HIPS
UTM
Module: 26
What is the OSI security architecture?
http://www.cse.wustl.edu/~jain/cse571-11/ftp/l_01ov.pdf
https://cgi.csc.liv.ac.uk/~alexei/COMP522_10/COMP522-
SecurityArchitecture_07.pdf
https://cgi.csc.liv.ac.uk/~alexei/COMP522_10/COMP522-
SecurityArchitecture_07.pdf
Authentication
Access control
Data confidentiality
Data integrity
Non-repudiation
Availability
https://cgi.csc.liv.ac.uk/~alexei/COMP522_10/COMP522-
SecurityArchitecture_07.pdf
http://www.cse.wustl.edu/~jain/cse571-11/ftp/l_01ov.pdf
Security mechanism:
http://www.cse.wustl.edu/~jain/cse571-11/ftp/l_01ov.pdf
http://www.cse.wustl.edu/~jain/cse571-11/ftp/l_01ov.pdf
http://www.cse.wustl.edu/~jain/cse571-11/ftp/l_01ov.pdf
Module: 27
The new frontiers of enterprise it: cloud, mobile, social,
IOT
https://www.mcafee.com/us/resources/reports/rp-threats-
predictions-2016.pdf
https://www.mcafee.com/us/resources/reports/rp-threats-
predictions-2016.pdf
https://www.mcafee.com/us/resources/reports/rp-threats-
predictions-2016.pdf
https://www.mcafee.com/us/resources/reports/rp-threats-
predictions-2016.pdf
www.cloudsecurityalliance.org
www.owasp.org
Useful URLs:
https://www.owasp.org/index.php/
OWASP_Mobile_Security_Project
https://www.owasp.org/index.php/
OWASP_Internet_of_Things_Project
https://downloads.cloudsecurityalliance.org/assets/
research/security-guidance/csaguide.v3.0.pdf
https://downloads.cloudsecurityalliance.org/initiatives/
mobile/Mobile_Guidance_v1.pdf
https://downloads.cloudsecurityalliance.org/assets/
research/mobile/MAST_White_Paper.pdf
https://downloads.cloudsecurityalliance.org/whitepapers/
Security_Guidance_for_Early_Adopters_of_the_Internet_of_Thi
ngs.pdf
https://downloads.cloudsecurityalliance.org/assets/research/
internet-of-things/connected-vehicle-security.pdf
Module: 28
Virtualization and enterprise security
Architectural
Hypervisor software
Configuration
1. VM Sprawl
2. Sensitive data within VM
Module: 29
Case study of enterprise - small organization
Organizational characteristics:
Location: Karachi
70 total staff
10 IT staff
8 servers
1 main DC, no DR site
IT service-oriented business delivered to banks, Telco’s,
enterprises
Organizational culture:
IT setup:
Security posture:
Completely absent
No hardening done
No vulnerability management
No security management or governance
No policy or staff dedicated for
No management commitment (prior)
Security requirement:
Driving change?
Conclusion:
Module: 30
Case study of enterprise - medium sized organization
Organizational characteristics:
Location: Lahore
350 total staff (group)
15+ IT staff
25 servers
1 main DC, 1 DR site, 1 backup site
IT service business in media industry
Organizational culture:
IT setup:
Security posture:
Completely absent
No hardening done
No vulnerability management
Security requirement:
Driving change ?
Conclusion:
Module: 31
Case study of enterprise - large sized organization
Organizational characteristics:
Location: Karachi
10,000+ total staff
150 IT staff
200 servers
1 main DC, 1 DR site
Energy & distribution sector
Organizational culture:
IT setup:
Security posture:
Superficial
No hardening done
Weak vulnerability management
Poor security management/ governance
Security team exists
Security requirement:
Driving change?
Conclusion:
Module: 32
What is the typical structure of an it team?
Structure of An IT Team
GENERAL STRUCTURE
JOB FUNCTIONS
ADDITIONAL TASKS
LARGE ORG
(150 IT Staff)
Module: 33
What are the objectives and KPIs of a CIO and it team?
Performance KPIs:
Priorities of IT:
Security posture:
Module: 34
How do the it team interact with other stakeholders in the
organization?
External audit
Internal audit
Compliance
Information security & risk depts
Module: 35
Security overlay of an enterprise architecture - i
(components)
Module: 36
Security overlay of an enterprise architecture - ii (TrafÏc
Flow)
Module: 37
Security overlay of an enterprise architecture - iii (General
security design)
3.Web & email are important vectors to secure against malware and
attacks
6.Granular access list filtering in edge and data center FWs (source,
destination, and trafÏc type/port)
8.Monthly VM scans
•SIEM solution
•Server HIPS
•Network forensics
Module: 38
What is high availability
•Disaster Recovery:
Module: 39
High availability design.
Module: 40
How is site redundancy incorporated into enterprise
network design?
•RTO:
–Max amount of time, following a disaster, for an organization to
recover files from backup storage and resume normal operations
(max amount of downtime an organization can handle)
•RPO:
–Max age of files that an organization must recover from
backup storage for normal operations to resume after a disaster
(minimum frequency of backups)
•Example:
–If an organization has an RTO of two hours, it cannot be down for
longer than that.
–if an organization has an RPO of four hours, the system must
back up at least every four hours.
Module: 41
High availability and redundancy case study
Mid-sized enterprise
•3000 total staff
•2000 IT users
•30 IT team
•One DC, one secondary (regional) data center (warm site &
backup site), and one DR site
99.9 % uptime designed
•IT setup:
–Oracle ERP system
–Sharepoint portal for workflow automation
–Head ofÏce in Karachi
–Primary DC in Karachi (hosted with 3rd party)
–DR site in Lahore (hosted with 3rd party)
–Secondary DC in ISB
•Primary DC:
–Fully redundant (HA) design for network, systems, and storage
–Cisco HA (active-standby)
–Oracle cluster technology for servers and DBs (active-active)
•Secondary DC (ISB):
–All network, systems, and storage backups maintained here
(also mirrored in DR)
•DR site
–Bare minimum HA (as DR site) for network, systems, and storage
–Mirror of all backups from secondary site maintained here
–OfÏce working space
–Some additional computing capacity (minimum for unforeseen
events)
•DR site
–All critical systems and devices maintained in active mode (hot)
for immediate DR failover
–Data maintained as per org RTO/RPO for immediate utility
–Monthly DR testing/drill
•Backup strategy:
–Primary backup at secondary DR site
–Mirror at DR site
–For critical systems: monthly full backup, daily incremental
backup
–For critical network devices: weekly full backup; backups based
on change
Module: 42
Backup strategies
Backup considerations:
–What to backup ?
–Backup location ?
–Freq of backup ?
–Backup operator ?
•What to backup ?
–OS backups
•Backup location ?
•Backup frequency ?
–Encryption
–Access control
Module: 43
What is the role of security tools in securing the
enterprise
–Enterprise antivirus
–Vulnerability manager
–Logs management
–Automated backups
–Trouble-ticket system
–SIEM
–DLP
–Encryption software
–2FA
Module: 44
Typical security tools used in an enterprise IT network –
Part 1
•
View and read various industry reports for security tools
comparisons:
–Gartner
–Forrestor
–Security Awards
Module: 45
Typical security tools used in an enterprise IT network –
Part 2
Gartner
•Forrestor
•NSS labs
•ICSA Labs
Module: 46
What does the term “Box Security” mean?
•“Box Security” refers to a prevalent approach in the industry,
especially in larger organizations in which the solution for every
security challenge is in the form of a “box” or device
•Box for :
–Email security
–Web security
–FW
–IPS
–APT attack prevention
–DDOS prevention
–Network DLP
–Network Forensics
–Others
Module: 47
What is the best approach to secure the IT enterprise
architecture?
Module: 48
What is disaster recovery?
•What is a disaster?
•What is a DR plan?
–http://www.it.miami.edu/_assets/pdf/security/ITPol_A135-Disaster
%20Recovery%20Plan%20Example%202.pdf
Module: 49
What is business continuity?
•What is a BC plan ?
•What is a BC plan ?
Module: 50
How is DR accommodated into the enterprise architecture
– part 1
•DR considerations:
–DR plan
–RTO & RPO
•DR plan:
–A disaster recovery policy statement, plan overview and main
goals of the plan
–Key personnel and DR team contact information
•DR plan (contd)…:
–Description of emergency response actions immediately
following an incident.
–A diagram of the entire network and recovery site.
–Directions for how to reach the recovery site.
•DR plan (contd)…:
–A list of software and systems that will be used in the recovery.
–Sample templates for a variety of technology recoveries,
including technical documentation from vendors.
•DR plan (contd)…:
–Summary of insurance coverage.
–Proposed actions for dealing with financial and legal issues.
–Ready-to-use forms to help complete the plan.
•RTO:
–Max amount of time, following a disaster, for an org to recover
files from backup storage and resume normal operations; max
amount of downtime an org can handle.
•RTO:
–If an organization has an RTO of two hours, it cannot be down for
longer than that
•RPO:
–RPO is the max age of files that an organization must recover
from backup storage for normal operations to resume after a
disaster; it determines the minimum frequency of backups.
•RPO:
Module: 51
How is DR accommodated into the enterprise architecture
– part 2
•DR considerations:
–DR facility
–DR drills & testing
–DR testing checklist
–BC plan alignment
•DR facility:
–Location
–Media circuits and backup circuits
–Power and environment
–IT data center design
–Based on DR plan
–Operations & maintenance
•DR drills & testing:
–Frequency and execution of DR drills as per IT policy of the org
–Min twice a year and preferable quarterly for critical business
reqmts
–Backup testing
•DR testing checklist:
–Secure management approval and funding for the test.
–Provide detailed information about the test.
–Make sure the entire test team is available on the planned test
date.
•DR testing checklist …:
–Ensure your test does not conflict with other scheduled tests or
activities.
–Confirm test scripts are correct.
–Verify that the test environment is ready.
–Schedule a dry run of the test.
•DR testing checklist…:
–Be ready to halt the test if needed.
–Have a scribe take notes.
–Complete an after-action report about what worked and what
failed.
–Use the test results to update DR plan
Module: 52
What is the role of an IT set in securing the organization?
•What is an IT asset?
–Laptops
–Mobiles
–Web browsing
–Email usage
–Servers
–Company data
Module: 53
How to determine security posture of an organization
•Questions to ask:
–Information security policy ?
–Organization security culture and tone at the top ?
–Clearly designated responsibility for security ?
–How many staff in security team [10%] and their roles ?
Module: 54
How do you drive a successful information security
transformation?
Module: 55
Difference between security hardening and Patching
•Security hardening:
–IT assets such as hardware and software come with default
(insecure) configurations which become the basis for attacks
–Typical case in point: username and password: “admin, admin”
•Security hardening:
–Process of securing a system by reducing its surface of
vulnerability, which is larger when a system performs more
functions; in principle a single-function system is more secure
than a multipurpose one (Wikipedia)
Module: 56
Security hardening strategies
•Depending upon the size and type of the organization, there will
be dozens, hundreds, or even thousands of IT assets to secure
•Priority is a key factor in all security undertakings
•Prioritize what is most important and needs to be done first
•Cascade as we go along
Module: 57
Pre-requisites for the security hardening program
2.Consultant on board
–Expert consultants in security transformation can facilitate the
project success
–Third party & independent
–Bring a focus on delivering results
–Strong domain knowledge
Module: 58
Who will conduct security hardening?
•InfoSec team:
–Conduct validation of security controls implementation
–Acquire checklist of controls from relevant IT team
–Document the status of controls in the form of a checklist
–Forward validation report to ISMC
•IT management:
–Ensure IT operations teams receive required guidance and
support
–Sign-off on change management requests
–Assist with planning down-time and business related downtime
Module: 59
What is the 8-step methodology for security hardening?
Part- 1
•Purpose:
–Many assets need to be hardened at various times, by various
teams, for various requirements and projects
–Standardize and follow a consistent approach
•Benefits:
–Process for security hardening
–Discipline to always follow the same steps
–Helps avoid missing any steps in the process
–Gives team clarity on what to do and what sequence to follow
•If You Skip This Process:
–Will follow a new approach every time
–Every resource has their own method
–Dependence on resource rather than the process
–Complicate rather than simplify
–Divergence in security activities
Module: 60
What is the 8-step methodology for security hardening?
Part- 2
Module: 61
What is the 8-step methodology for security hardening?
Part-3
Module: 62
A look at CIS security benchmark part - 1
Module: 63
A look at CIS security benchmark part - 2
Module: 64
A look at CIS security benchmark part - 3
•Control content:
–Description
–Rationale
–Audit
–Remediation
–Default value
References
Module: 65
A look at CIS security benchmark part - 4
•Profile applicability:
–Level 1 domain controller
–Level 1 member server
–Level 2 domain controller
•Control content:
–Profile applicability (ASA 8.X, ASA 9.X)
–Description
–Rationale
–Audit
–Remediation
–Impact
–Default value
–References
Module: 66
A look at DISA security technical implement guides (STIGs)
– part - 1
•USA DoD
•Unclassified version
•http://iase.disa.mil/stigs/Pages/index.aspx
–http://iase.disa.mil/stigs/Pages/a-z.aspx
•STIG viewer:
–http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx
Module: 67
A look at DISA security technical implement guides (STIGs)
– part – 2
•STIG content:
–Discussion
–Check content
–Fix text
–CCI (References)
FILTER PANEL
CREATE CHECKLIST
CHECKLIST
•Checklist screens:
–Overall totals
–Target data
–Role
–Finding details
–Comments
–Not reviewed
–Open
–Not a finding
–Not applicable
Totals
Target Data
Status
Vuln Information
Module: 68
A look at DISA security technical implement guides (STIGs)
– part - 3
•Rule Title:
–The lockout duration must be configured to require an
administrator to unlock an account
–Severity: CAT II
•Discussion:
–The account lockout feature, when enabled, prevents brute-force
password attacks on the system. This parameter specifies the
period of time that an account will remain locked after the
specified number
•Discussion…:
–of failed login attempts. A value of 0 will require an administrator
to unlock the account.
•Check Content:
–Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
•Check Content:
Navigate to Local Computer Policy -> Computer Configuration ->
Windows Settings -> Security Settings -> Account Policies ->
Account Lockout Policy.
•Check Content…:
–If the "Account lockout duration" is not set to "0", requiring an
administrator to unlock the account, this is a finding.
•Fix Text:
–Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Account Policies ->
Account Lockout Policy -> "Account lockout duration" to "0"
minutes,
•Fix Text….:
–"Account is locked out until administrator unlocks it".
•CCI: NIST SP 800-53 Revision 4 :: AC-7 b
Module: 69
A look at DISA security technical implement guides (STIGs)
– part - 4
STIGVIEWER WINDOW
•General Information:
–Rule Title: The network devices must time out access to the
console port at 10 minutes or less of inactivity
–STIG ID: NET1624
–Severity: CAT II
•Discussion:
–Terminating an idle session within a short time period reduces
the window of opportunity for unauthorized personnel to take
control of a management session enabled on the console or
console…
•Discussion…:
–port that has been left unattended. In addition quickly
terminating an idle session will also free up resources committed
by the managed network device. Setting the timeout of the
session to 10 minutes
•Discussion…:
–or less increases the level of protection afforded critical network
components
•Check Content:
–Review the configuration and verify a session using the console
port will time out after 10 mins or less of inactivity.
–If console access is not configured to timeout at 10 minutes or
less, this is a finding.
•Fix Text:
–Configure the timeout for idle console connection to 10 minutes
or less.
Module: 70
Comparison of CIS security benchmarks versus DISA STIGs
–Size of organization
–IT infrastructure extent
–Nature of business
–Security program goals
–Maturity of IT & security staff
•Rule of thumb:
–Smaller orgs use CIS
–Larger orgs use DISA
–CIS is part of Homeland Security, DISA is part of US Military
–DISA more frequently updated and maintained with wider
coverage
Module: 71
Case study – Security hardening – Windows server 2012 R2
General Information:
Rule Title: Autoplay must be disabled for all drives
STIG ID: WN12-CC-000074
Severity: CAT I
Discussion:
Allowing Autoplay to execute may introduce malicious code to a
system. Autoplay begins reading from a drive as soon media is
inserted into the drive. As a result, the setup file of programs or
music on audio media may start. By default, Autoplay is disabled
on removable drives, such as the floppy disk drive (but not the
CD-ROM drive) and on network drives. Enabling this policy
disables Autoplay on all drives.…
Check Content:
If the following registry value does not exist or is not configured
as specified, this is a finding:
Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\
policies\Explorer\
Value Name: NoDriveTypeAutoRun
Type: REG_DWORD
Value: 0x000000ff (255)
Fix Text:
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> AutoPlay
Policies -> "Turn off AutoPlay" to "Enabled:All Drives".
Module: 72
case study – security hardening – Linux server
Module: 73
case study – security hardening – Solaris server
STIGVIEWER WINDOW
General Information:
Rule Title: All shell files must have mode 0755 or less permissive
Severity: CAT I
Discussion:
Check Content:
CCI-000225
The organization employs the concept of least privilege, allowing
only authorized accesses for users (and processes acting on
behalf of users) which are necessary to accomplish assigned tasks
in accordance with organizational missions and business functions
Module: 74
case study – security hardening – Apache server
Profile applicability:
Level 2
Audit: Validate the max file limit is not greater than the size of the
partition where the log files are stored.
java.util.logging.FileHandler.limit=10000
Module: 75
case study – security hardening – Oracle Solaris server
28 April 2017
STIGVIEWER WINDOW
General Information:
Severity: CAT I
Discussion:
Check Content:
Fix Text:
For example, if user1 starts the listener, then only user1 can
administer it. Any other user trying to administer the listener gets
an error. The super user is the only exception.
CCI: CCI-000366
The organization implements the security configuration settings.
Module: 76
case study – security hardening – MS SQL server
SELECT name
FROM sys.server_principals WHERE sid = 0x01;
A name of sa indicates the account has not been renamed
Remediation: Replace the different_user value within the below
syntax and execute rename the sa login:
ALTER LOGIN sa WITH NAME = <different_user>;
Impact: It is not a good security practice to code applications or
scripts to use the sa account However, if this has been done
renaming the sa account will prevent scripts and applications for
authenticating to the database server and executing required
tasks or functions.
Default Value: By default, the 'sa‘ account name is 'sa'
References: https://msdn.microsoft.com/en-us/library/
ms144284(v=sql.110).aspx (Choose An Authentication Mode)
Module: 77
case study – security hardening – Oracle DB server
DISA, Release 11
28 April 2017
STIGVIEWER WINDOW
General Information:
Rule Title: The Oracle REMOTE_OS_ROLES parameter must be set
to FALSE.
Severity: CAT I
Discussion:
Check Content:
From SQL*Plus:
select value from v$parameter where name = 'remote_os_roles';
Fix Text:
From SQL*Plus:
alter system set remote_os_roles = FALSE scope = spfile;
Fix Text:
CCI: CCI-000366
The org implements the security configuration settings.
NIST SP 800-53 :: CM-6 b
NIST SP 800-53A :: CM-6.1 (iv)
NIST SP 800-53 Revision 4 :: CM-6 b
Module: 78
Case study security hardening – Windows 8 Workstation
Profile applicability:
Level 1
Level 1 + BitLocker
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\
Windows Error Reporting:AutoApproveOSDumps
References:
CCE-33927-5
Critical Controls:
13 Data Protection
Module: 79
A
Module: 72
A