Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.

It cannot be stated enough that security is a process, not a goal. There is no endgame in hardening your environment; rather, you will be constantly updating and changing your security policies to address new threats that exist against your network infrastructure and new technologies that expand and change your network infrastructure.

Your security policy is a living document and, as such, should adapt to the changing needs of your organization. As best practices change, your policy needs to be checked against the best practices to make sure it is up to date. You should review your policy against each vendor s recommendations as well as check the SANS (www.sans.org) and CERT (www.cert.org) resources for tips, practices, and security updates and alerts that you can incorporate into your policy.

When you review your security policy, you want to focus on the following objectives:

Is Your Security Policy Being Adhered To?

On the surface, this task may seem pretty simple to address: if your security policy isn t being adhered to, it may be time for some serious enforcement, such as employment termination. However, the situation probably requires a more detailed examination to determine why the security policy isn t being adhered to instead of just a knee-jerk reaction of This is what we said to do, now do it. There are a number of reasons why your security policy might not be adhered to:

A policy that isn t being adhered to is simply a waste of time and resources because it merely provides a feel-good measure with no tangible benefit. However, this does not mean you should simply change or remove any policies that aren t being adhered to. Review the reasons why the policy isn t being adhered to and make the appropriate adjustment. Sometimes this will simply involve educating your users. Other times it may require you to implement some kind of control that enforces the policy. In other cases, you may have to change the policy to better fit the business process, or you might need to change the policy because, in practice, it fell short of expectations. For example, if you have a password policy that requires a minimum of eight characters using uppercase letters, lowercase letters , and numbers , and you find that your users aren t adhering to the policy, don t just remove the password policy completely. Take a look at whether you simply need to educate your users. If so, take care of that so your users start doing what is expected of them. This might even require you implementing software that enforces the policy and requires your users to select an appropriate password.

Does Your Security Policy Address All  Known  Threats  to  Your Environment?

It sometimes seems that certain vendors have new security bulletins on a daily basis, even though this is not the case. Although it is common to point to Microsoft as the biggest culprit here, the truth of the matter is that every single vendor has security bulletins that they release, and you only need to watch the SecurityFocus BugTraq mailing list (http://www.securityfocus.com/archive/1) to realize this. The most difficult part of writing an effective security policy isn t defending against the threats you know about but rather trying to defend against the threats you do not yet know exist. For example, you cannot possibly know what vulnerabilities might be discovered for the various services and applications your network infrastructure equipment runs; however, if your security policy requires that all unnecessary services be disabled, you can effectively protect yourself from exploits directed at those services.

Protecting Yourself from Future Exploits

In July of 2003, Cisco announced a security vulnerability (Cisco IOS Interface Blocked by IPv4 Packets) that affected virtually every version of IOS prior to 12.3. This security vulnerability would block an interface, preventing it from sending and receiving any data. The vulnerability was based on the interface receiving traffic with protocol types of 53 (SWIPE), 55 (IP Mobility), 77 (SunND), and 103 (Protocol Independent Multicast “ PIM). Keep in mind that these are not port numbers, but protocol numbers. Although I had heard of some of these protocols, I had never actually seen them in use anywhere I had worked. Ever. In fact, after reading the RFCs and related documentation about these various protocols, I can think of very, very few environments where they would likely be needed. And yet I had never thought to disable those protocols at my border routers for sure, and my interior routers in most cases ”and, frankly, apparently most everyone else had never thought of this either. Consequently, many tens of thousands of systems were vulnerable to an exploit for protocols that in 99.999 percent of the cases no one actually used. The lesson to be learned here is simple: If you don't need something, turn it off. This is the most effective method of protecting yourself from future exploits.

 

Although protecting from unknown future exploits by disabling unnecessary services is key to ensuring that all known threats are addressed by your security policy, you also have to protect against those new threats that come out for the services you do require. In an almost-perfect world, the only vulnerabilities would be against services that we do not use or do not need. Unfortunately, security threats exist against protocols such as SSH (which you should require in your environment) that force us to address them to ensure that our systems are not left vulnerable.

Even Secure Protocols Can Be Insecure

As we have discussed, SSH provides encryption of data, which makes it an excellent candidate for providing remote management capabilities for your devices. This doesn't mean that SSH is not vulnerable to being exploited, however. For example, in September of 2003, Cisco released a security bulletin detailing vulnerabilities in the SSH server software of a number of network devices. Even so, given that SSH is more secure than Telnet will ever be, it doesn't make sense to disable SSH in your environment because the net effect would be to weaken your overall security posture ”even more than the vulnerability does. As of November, all affected systems had a corresponding fix or workaround that should have been applied. See Cisco Document ID 45322 for further information regarding the status of this issue.

 

The most effective method to recognizing and addressing new threats is to keep your pulse on the industry and be aware of what is happening. By that I mean you have to make every effort to be as personally informed about the discovery of new threats, patches, and upgrades as you possibly can. A number of resources are available to assist you in this endeavor:

One Step Further

Here s a daily checklist of information sources:

  1. Monitor BugTraq and NTBugTraq mailing lists.

  2. Monitor vendor mailing lists.

  3. Check www.cert.org for any new advisories.

 

Do You Have Adequate Prevention Mechanisms and Enforcement of Your Security Policy?

We all know the adage that an ounce of prevention is worth a pound of cure. Your security policy is no different. You have two angles from which to approach prevention ” preventing threats and preventing noncompliance with your security policy.

The best security policy is one that focuses on preventing exploits from occurring, not simply defining what the threats are or what to do once an exploit has occurred. You can ensure your security policy focuses on preventing threats by ensuring that when you identify a threat, you also identify how to protect against that threat.

You will also want to prevent your security policy from not being adhered to. In many cases, you can prevent noncompliance by implementing the appropriate hardware and software. For example, if you have a password security policy that requires certain password characteristics, you can implement software that ensures that all user passwords adhere to the policy you ve defined.

Like prevention, there are two angles to enforcement. The first is to ensure that your security policy enforces the recommendations it makes. You can do this by adopting procedures, software, and hardware that force whatever your recommendation is to occur. For example, if you require that only IPsec VPNs can be established, you can enforce this by ensuring that all your VPN concentrators only support IPsec VPN connections. This, in turn, forces the users to adhere to the policy, whether they want to or not.

The second aspect of enforcement is a much more political situation in that it defines what the response will be for violations to the security policy. You absolutely must involve your human resources and legal departments in these discussions because, in almost all cases, you will be dealing with personnel issues. You must ensure your users sign the security policy at employment and review time to verify that the users understand what is expected from them and what acceptable use is as defined by the policy. This is where your legal department plays a major role in ensuring that the policies are legally enforceable and do not expose your company to litigation. Once the users understand the security policies and expectations, you need to have a method of addressing security policy violations with some kind of punitive enforcement. Common methods of enforcement include verbal or written warnings, incident records attached to employee personnel files, wage garnishment, suspension, and even employment termination in the most egregious of offenses . For example, attempting to run a port scan on your network may justify a simple warning in either verbal or written form, whereas surfing porn sites should be grounds for immediate employment termination.

Be Aware of the Legal Liabilities

I worked for an employer who had an employee who liked to surf porn. This individual worked the night shift and also had a habit of showing the porn to other members of the staff. This was, obviously, a bad thing. Once this was discovered, we recommended that the individual be immediately terminated from employment. For reasons that to this day I still don't understand, the employer chose not to do this. Because of the legal liabilities related to a sexual harassment lawsuit, the IT department consequently drafted a document that stated that the company did not adhere to the IT recommendation and therefore IT was not liable for any future liabilities that might result from this individual's action. Although this might seem like overkill, we thought that in light of the severity of the policy violation, it was necessary.

 

Категории