Operating System Security
Operating System Security
System Security
Chapter-12
Content
12.1- Introduction To OS Security
12.2- System Security Planning
12.3- OS Hardening
12.4- Application Security
12.5- Security Maintenance
12.6- Linux/Unix Security
12.7- Windows Security
12.8- Virtualization Security
Introduction To Operating System Security
Computer client and server systems are central components of the IT infrastructure
for most organizations, may hold critical data and applications, and are a necessary
tool for the function of an organization.
Thus, A system may be compromised during the installation, To ensure this doesn't
happen we need to check for latest patches or implement other hardening methods.
Hence, building and deploying system should be a planned process designed
to counter such a threat, and maintain security during operational lifetime.
The aim of specific system installation planning is to maximize security and minimizing costs.
This planning process needs to determine the security requirements for the system, its applications
and data, and of its users.
This then guides the selection of appropriate software for the operating system and applications,
and provides guidance on appropriate user configuration and access control settings. It also guides
the selection of other hardening measures required. The plan also needs to identify appropriate
personnel to install and manage the system, noting the skills required and any training needed.
[SCAR08] provides a list of items that should be considered during the system security
planning process:
1) The purpose of the system, the type of information stored, the applications and
services provided, and their security requirements.
2) User roles and privileges of each role.
3) User authentication methods.
4) Information access management.
5) Access to information stored on the host like DB server is managed.
6) System administrator management (remote or local).
7) Any additional security measures required on the system, including the use of host
firewalls, anti-virus or other malware protection mechanisms, and logging.
OS Hardening
The First and foremost thing in securing a system is to secure its base OS upon which all other
applications run.
A good security foundation needs a properly installed, patched, and configured operating
system.
Unfortunately, the default configuration for many operating systems often maximizes ease of
use and functionality, rather than security.
Further, every organization has its own security need based on the requirements the
Operating Systems security profile and configuration differ.
Appropriate security configuration guides and checklists exist for most common operating
systems, and these should be consulted, though always informed by the specific needs of each
organization and their systems. In some cases, automated tools may be available to further
assist in securing the system configuration.
[SCAR08] suggests the following basic steps that should be used to secure an operating
system:
Application security may include hardware, software, and procedures that identify or
minimize security vulnerabilities. A router that prevents anyone from viewing a
computer’s IP address from the Internet is a form of hardware application security. But
security measures at the application level are also typically built into the software, such
as an application firewall that strictly defines what activities are allowed and prohibited.
Procedures can entail things like an application security routine that includes protocols
such as regular testing.
Application Security can be done in 2 ways:
Application Configuration:
This may include creating and specifying appropriate data storage areas for
the application, and making appropriate changes to the application or service
default configuration details.
Encryption Technology:
Encryption is a key enabling technology that may be used to secure data both
in transit and when stored. If such technologies are required for the system,
then they must be configured, and appropriate cryptographic keys created,
signed, and secured.
Security Maintenance
Once the system is built securely, and deployed, the process of maintaining security is
continuous. This to tackle the constant change in environments and discovery of new
vulnerabilities, and hence exposure to new threats.
[SCAR08] suggests the following steps should be included in the maintenance process:
[SCAR08] notes that logging can is a basic process of identifying a threat that has already
happened. It generates a lot of information the developer checks the information for any
threats in the system.
Regular backup of data is another critical measure for maintaining integrity of the system,
data loss can occur due to many reasons like hardware or software failure, accidental or
deliberate corruption.
Backup is the process of making copies of data at regular intervals, which can be used to
recover lost data when needed.
Archive is process of retaining data for long intervals of time in order to meet legal and
operational requirements to access past data
Linux/Unix Security.
Often Linux/Unix OS vendors make do not provide a step by step documentation for
securing the system. However, we can generalize the basic concept of securing the
environment that you can customize based on your institutes requirements.
Apart from the positives being so widely used OS windows devices are more prone to
Attacks by hackers, and consequently security countermeasures are needed to deal
with these challenges.
Again, there are a large range of resources available to assist administrators of these
systems, including reports such as [SYMA07], online resources such as the “Microsoft
Security Tools & Checklists,” and specific system hardening guides such as those
provided by the “NSA—Security Configuration Guides.”
Users Administration and Access Controls
Security Testing
Virtualization Security
Virtualization refers to a technology that provides an abstraction of the computing
resources used by some software, which thus runs in a simulated environment called a
virtual machine (VM).
Virtualized security, or security virtualization, refers to security solutions that are
software-based and designed to work within a virtualized IT environment. This differs
from traditional, hardware-based network security, which is static and runs on devices
such as traditional firewalls, routers, and switches.
In contrast to hardware-based security, virtualized security is flexible and dynamic.
Instead of being tied to a device, it can be deployed anywhere in the network and is
often cloud-based. This is key for virtualized networks, in which operators spin up
workloads and applications dynamically; virtualized security allows security services and
functions to move around with those dynamically created workloads.
Advantages:
Cost Effective
Flexibility
Operational Efficiency