Lecture06_Operating System Security
Lecture06_Operating System Security
System
Security
Strategies
• The 2010 Australian Signals Directorate (ASD)
lists the “Top 35 Mitigation Strategies”
• Over 85% of the targeted cyber intrusions
investigated by ASD in 2009 could have been
prevented
• The top four strategies for prevention are:
• White-list approved applications
• Patch third-party applications and operating system vulnerabilities
• Restrict administrative privileges
• Create a defense-in-depth system
Planning process
needs to determine Aim is to
security maximize
requirements for the security while
system, applications, minimizing
data, and users costs
System Security Planning
Process
The purpose of the Any additional
system, the type of Who will administer security measures
information stored, the system, and how required on the
the applications and they will manage the system, including
services provided, system (via local or the use of host
and their security remote access) firewalls, anti-virus
requirements or other malware
protection
mechanisms, and
What access the logging
The categories of
system has to
users of the system,
information stored
the privileges they
on other hosts, such
have, and the types
as file or database
of information they
servers, and how
can access
this is managed
System
security Initial Should stage
begins with installation
and validate
the should
Critical that all patches
install the
installation minimum
the system be
on the test
kept up to
of the necessary date, with all systems
operating for the critical before
desired
system system
security deploying
related
patches them in
installed production
Full
Ideally new installation
systems and hardening
should be process should
occur before
constructe
the system is
d on a deployed to its
protected intended
network location
Remove
Unnecessary
Services,
Applications,
• When performing the
initial installation the
Protocols supplied defaults
should not be used
• Default configuration is
set to maximize ease of
• If fewer software use and functionality
rather than security
packages are available
to run the risk is • If additional packages
reduced are needed later they
can be installed when
• System planning they are required
process should identify
what is actually
required for a given
system
• System planning process
should consider:
Configure
• Categories of users on the
Users, Groups, system
and • Privileges they have
Authentication • Types of information they can
access
Generates significant
Range of data
Information can be volumes of
acquired should be
generated by the information and it is
determined during
system, network and important that
the system planning
applications sufficient space is
stage
allocated for them
Automated analysis is
preferred
Data Backup and
Archive
Performing Needs and
regular backups Backup Archive policy relating
of data is a to backup and
critical control archive should
that assists with The process of be determined
The process of
maintaining the making copies
retaining copies
during the
of data over
integrity of the of data at extended system
system and user regular periods of time
intervals in order to meet planning stage
data legal and
operational
May be legal or requirements to
operational access past data
Kept online or
requirements
offline
for the
retention of
data
Stored locally
or transported
to a remote
site
• Trade-offs
include ease of
implementation
and cost versus
greater security
and robustness
against different
threats
Linux/Unix Security
• Patch management
• Keeping security patches up to date is a widely recognized
and critical control for maintaining security
Users
Patch administration
management and access
• “Windows Update” controls
and “Windows Server • Systems implement
Update Service” discretionary access
assist with regular controls resources
maintenance and • Vista and later systems
should be used include mandatory integrity
controls
• Third party
• Objects are labeled as
applications also being of low, medium, high,
provide automatic or system integrity level
update support • System ensures the
subject’s integrity is equal
or higher than the object’s
level
• Implements a form of the
Biba Integrity model
Windows Security
Users Administration and
Access Controls
Windows systems also
define privileges Combination of share and
• System wide and granted to NTFS permissions may be
user accounts used to provide additional
security and granularity
when accessing files on a
shared resource
• These abstract all layer 2 and 3 addresses from the underlying physical
network into whatever logical network structure is required
• This structure can be easily changed and extended as needed
• The IETF standard DOVE (Distributed Overlay Virtual Network) which
uses VXLAN (Virtual Extended Local Area Network) can be used to
implement such an overlay network
• With this flexible structure, it is possible to locate virtual servers, virtual
IDS, and virtual firewalls anywhere within the network as required
Containers
• A recent approach to virtualization is known as
container virtualization or application virtualization
• In this approach, software known as a virtualization
container, runs on top of the host OS kernel and provides
an isolated execution environment for applications
• Unlike hypervisor-based VMs, containers do not aim to
emulate physical servers
• All containerized applications on a host share a common
OS kernel
• For containers, only a small container engine is required
as support for the containers
• Containerization sits in between the OS and applications
and incurs lower overhead, but potentially introduces
greater security vulnerabilities
Virtualization Security
Issues
• Security concerns include:
• Guest OS isolation
• Ensuring that programs executing within a guest OS
may only access and use the resources allocated to it
• Guest OS monitoring by the hypervisor
• Which has privileged access to the programs and
data in each guest OS
• Virtualized environment security
• Particularly image and snapshot management which
attackers may attempt to view or modify
Securing
Virtualization Systems
Organizations
using
virtualization
should:
• Carefully plan the
security of the virtualized
system
• Secure all elements of a
full virtualization solution
and maintain their
security
• Ensure that the
hypervisor is properly
secured
Hypervisor Security
• Should be
• Secured using a process similar to securing an operating system
• Installed in an isolated environment
• Configured so that it is updated automatically
• Monitored for any signs of compromise
• Accessed only by authorized administration
re Security must be
carefully
controlled
Access
must be
limited to
just the
appropriat
e guest
OSs Systems
manage
access to
hardware
resources
Virtual Firewall
Provides firewall capabilities for the network traffic
flowing between systems hosted in a virtualized or
cloud environment that does not require this traffic
to be routed out to a physically separate network
supporting traditional firewall services
VM Host-Based
VM Bastion Host Hypervisor Firewall
Firewall
• Questions?