Kaspersky Embedded System Security PoC Guide
Kaspersky Embedded System Security PoC Guide
SYSTEMS SECURITY
The target audience includes KL’s presales engineers and 3rd parties willing to evaluate KESS product.
WHAT IS KESS?
KESS is a security solution designed to protect variety embedded systems, including ATMs and POS
against viruses and other logical attacks.
KESS protects devices against malware and other logical attacks using the following independent
components:
Kaspersky Security Network services integration. Use of data from Kaspersky Security
Network ensures a faster response time by KESS when encountering zero-day threats.
With the user’s consent, the application can use checksums (MD5) of the analyzed files when
using KSN. Request to the Kaspersky Security Network take place when Real-time anti-virus
scan, On-demand anti-virus scan or Applications verification are executed.
Exploit Prevention provides the ability to protect applications running on the embedded
systems from exploits. KESS controls the integrity of protected processes and takes the actions
in order to reduce the potential risks and side-effects of vulnerability exploitations.
Application Launch Control allows the execution of files matched against a defined whitelist.
Programs that are not in this list are blocked. KESS allows or denies the executable files
launch, scripts launch, MSI packages launch, driver loading, and DLL modules loading via
specified applications launch control rules, KSN conclusions, or according to the Default Deny
principle. You can create the applications launch control rules both manually and automatically
for a computer (by settings the events of a local Applications Launch Control task) and for a
group of computers (via Kaspersky Security Center denied launches report).
Device Control, a component that restricts an unauthorized connection of devices and a use of
already connected. KESS allows or restricts usage of storage devices connected to a protected
computer via USB. External devices control is based on the allow rules and the Default Deny
principle. Rules for the Device Control are generated automatically based on system data about
registered storage devices, or by the Rule Generator for Device Control task.
File Integrity Monitor (FIM) tracks actions performed under the specified files and folders.
KESS checks the integrity of the monitored objects based on information about file operations
that have been detected in the monitoring scope.
Logs Inspection monitors the integrity of the protected environment based on the results of an
inspection of Windows Event Log. KESS alerts the administrator in case any patterns of
abnormal activity are detected on a protected system and that might be an evidence of abuse
attempt.
Firewall Management takes over the control of Windows Firewall. KESS provides a reliable
and ergonomic solution for network connection protection via interception of the OS firewall
settings management.
KESS can protect devices with a limited RAM (at least 256 MB) and hard disk space (at least 100 MB).
Software requirements
You can install KESS on a hardware running one of the following Microsoft Windows operating systems:
Microsoft Windows Installer 3.1 must be installed in order for Kaspersky Embedded Systems Security to
install and work properly on a computer running Windows XP.
The Filter Manager component and Administration Support Tools are required in order for Kaspersky
Embedded Systems Security to install and work properly on a computer running embedded operating
systems.
In case of management via local/remote application management console the steps will be the
following:
1 To decrease the volume of transferred data or the number of connections to Update Agents, Update Agents have the multicast
function. This allows an Update Agent to distribute updates and installation packages to each client of the group during a single
session. If multicast is enabled, administration server transfers new and changed files to Update Agents after updates are
downloaded in the repository. Update Agents start multicasting these files, without waiting for clients’ requests.
1. Run setup.exe from the folder where KESS installation files were unpacked.
Now you have the management console installed and ready to configure KESS application settings.
The steps bellow describe how to create KESS remote installation package and install it on a protected
system.
7. Wait until the installation files will be uploaded to an Administration server and Close the wizard.
3. You can also use a KSC Activate application task in order to deploy license key remotely.
After completing the activation you have KESS ready to protect your embedded system.
The steps included in «Setup and deploy» section are mandatory to proceed.
1. Anti-malware protection
3. Device Control
6. Log Inspection
These scenarios considered as advanced and can be demonstrated depending on the customer needs.
Each of the scenarios allows you to evaluate and identify how KESS can assist in alleviating security
problems, or provide you with the basis for a plan to take advantage of KESS.
ANTI-MALWARE PROTECTION
This basic scenario will help you to understand if antivirus is up and running. We will use EICAR test
virus file for this purpose. Please refer to this article to get more information about EICAR:
http://support.kaspersky.com/viruses/general/459.
To be able to download or create such test file it is necessary to disable protection first.
Evaluation steps:
Expected results:
Step-by-step instruction:
Expected results:
Untrusted application launch is disabled by ALC. After allow rules is applied, the application is
whitelisted and allowed to launch.
Step-by-step instructions:
Create script
1. On the protected system create script.bat file with the following content:
@echo off
@echo Starting calculator...
pause
calc
Run the script.bat file on the protected system and notice no ALC events registered in KSC.
Evaluation steps:
Expected results:
Step-by-step instructions:
EXPLOITS PREVENTION
This scenario shows exploit prevention capability. The scenario is very simple to demonstrate, since we
will use wicar.org web resource to demonstrate how KESS protects the exploitation of Internet Explorer
Remote Code Execution Vulnerability CVE-2014-6332. The vulnerability exists in Internet Explorer 3.0
until version 11 within Windows95 up to Windows 10.
Evaluation steps:
Expected results:
Step-by-step instructions:
Evaluation steps:
Expected results:
Step-by-step instructions:
Evaluation steps:
Expected results:
Step-by-step instructions:
5. Try to login into the protected system 3 times with invalid credentials.
KESS provides reliable protection for embedded systems and has a flexible modular architecture,
including File Anti Malware Protection, Exploit prevention, Application Launch Control, Device Control,
File Integrity Monitor, Log Inspection and Firewall management components aim to provide best
protection from logical attacks on ATM/POS and other embedded devices.
In Appendix A you can find the advanced scenarios which can be demonstrated to show additional KESS
advantage, these are:
Through the evaluation you have learned how to deploy KESS and demonstrate its core features and
business value.
In the scenario bellow the software installation on a protected system is denied according to
organization’s security policy. You have to do a remote installation of a packaged application via KSC
management plugin and whitelist the application being deployed through this channel.
First you will configure ALC to work according to default deny principle and thus launch of all untrusted
applications including 7-Zip will be blocked. Then you will configure SDC to be able to install 7-Zip
remotely via KSC and add the application to implicit whitelist.
Evaluation steps:
Expected results:
Step-by-step instructions:
This step describes how ALC rules are created with rule generator performed on a reference system.
This step shows how to enable ALC using rules generated on the previous step.
At the end of this step you will notice that there are no explicit rules for installed application in the
whitelist. The application will be implicitly whitelisted by SDC.
SELF-DEFENSE
Protection from unauthorized shutdown of KESS service
This scenario shows how the access to the application service can be configured in order to protect the
application from shutdown by unauthorized personnel.
Evaluation steps:
Expected results:
Step-by-step instructions:
You will get the Access is denied message. This means that you successfully denied a user to
manage the KESS service.
With the KESS console access protection scenario you can demonstrate how to set a password for the
console access in order to protect application management from unauthorized personnel.
Evaluation steps:
Expected results:
Step-by-step instructions:
https://www.kaspersky.com/enterprise-security/embedded-systems
http://support.kaspersky.com/kess2
Administrator guide:
https://docs.s.kaspersky-labs.com/english/ess_admin_guide_en.pdf
User guide:
https://docs.s.kaspersky-labs.com/english/ess_user_guide_en.pdf
http://forum.kaspersky.com
Before submitting an incident we recommend you to collect trace files during the problem reproduction.
Navigate through this link to learn how to collect trace files in KESS:
http://support.kaspersky.com/13766
http://support.kaspersky.com/13726#block3
1. Prepare environment