Secure Messaging with Microsoft Exchange Server 2000

There are a number of models for identifying and quantifying information systems risks. Most of these models require a fair amount of specialized training to be useful, because performing a strict risk assessment involves a number of fine points that are well beyond the scope of this book. However, before you rush off to hire a Certified Information Systems Security Professional (CISSP) to do your risk assessment (not that doing so is a bad idea by any means, as long as you hire one with a background in risk assessment), wouldn’t it be helpful if you could evaluate your risks yourself? You can do so to a good degree using the two risk assessment models I present in this section; the models help you begin to identify and quantify various threats and risks to your information systems well enough to start fixing the most serious ones. In fact, I suggest you apply the two models in combination.

The STAVE Model

This model doesn’t really have a formal name; I made up STAVE because it’s pronounceable. The key elements of risk assessment described in the CISSP curriculum and in Krause and Tipton’s Information Security Management Handbook, however, revolve around the five elements in STAVE, so it’s worth presenting them here to give you a stronger conceptual framework. The five elements of STAVE are simple to understand: safeguards, threats, assets, vulnerabilities, and exploits. However, for maximum understanding, let’s talk about the STAVE elements in a slightly different order, beginning with the assets and working our way through the elements that indicate what risks those assets face and how we can fix them.

Assets

Assets are something valuable that you have; they can be tangible or intangible. If you don’t have any valuable assets, it’s probable that no one will attack you on purpose. Of course, being asset-poor doesn’t mean that you won’t be attacked, merely that you won’t be an intentional target. The more numerous, valuable, or irreplaceable your assets are, the higher the likelihood that they’ll be attacked. Notice that in this context, asset doesn’t just mean a physical object or a juicy piece of information; some of the most valuable assets of sites of organizations like CNN and the New York Times are their perceived trustworthiness and integrity.

Assets have a value associated with them. In the case of a physical asset like a building, a stack of gold ingots, or a fighter plane, the value is pretty easy to calculate. For an intangible asset, like the value of a complete database of your company’s customers over the last 15 years, the value might be much more difficult to pin down. Having said that, getting relatively accurate asset values will help you clearly identify where the biggest potential risks are. A small risk of losing a highly valuable asset might be more important than a larger risk to a less valuable asset.

Threats

A threat is something bad that can happen. The exact set of threats you should worry about varies from asset to asset. For example, one of my clients is a large law firm located in a downtown area that occasionally floods. Because the company is located on the 37th floor of the building, the primary concern isn’t the physical computer assets; it’s the value of the company’s data and of its reputation as a trustworthy guardian of the legal records it maintains.

Along with identifying the threats themselves, you need to be able to prioritize them in some way. This could be done by severity (for example, if this threat occurs, how bad will the effects be?), by likelihood, by frequency, or by some other criterion that’s specific to your business. Brainstorming with a list of assets is a great way to develop a prioritized threat list. Draw all of your assets on a chart and then start listing threats to each of them. There might be more threats out there than you realize!

Vulnerabilities

A vulnerability is something that allows a threat to apply to an asset. In other words, a vulnerability is a weak spot that, if not mitigated, allows an attacker to use a specific threat to damage or gain control of a particular asset. Vulnerabilities can be anything that an attacker can exploit: unlocked doors, unpatched workstations, users who keep passwords in plain view, and flaws in installed software are all-too- common vulnerabilities.

Identifying vulnerabilities can be tricky. Some are obvious (like the notes with passwords on them), but some are much more subtle. In fact, attackers can, and do, expend large amounts of time and effort finding new vulnerabilities and using them before you, or the vendors who make the products you use, can find them. For that reason, you cannot always count on being able to eliminate vulnerabilities; in some cases, the best you can do is mitigate the ones you know about and try to proactively protect yourself against known classes of vulnerabilities. This logic gave birth to the modern antivirus software field.

Hold It Right There!

A brief pause in our discussion of the STAVE model is necessary because there’s a simple but subtle point to make here: eliminating assets, threats, or vulnerabilities reduces or removes any particular risk. Let’s say that you do such a good job of securing your Exchange systems that you get a fat bonus, which you use to buy one of those fancy plasma-screen TVs. You install it in your living room in such a way that it can be seen from the street. You are in the habit of leaving your front door open, with only the glass storm door keeping intruders out. Let’s analyze your risk based on what we know:

You can mitigate this risk by doing one of three things. First, you could fasten the TV to the wall, making it more difficult to steal even if a thief manages to break into your house. Second, you could move to a town with a lower occurrence of theft. Finally, you could address the vulnerabilities by changing your security procedures, remembering to close the door, closing your curtains, and upgrading your locks. Doing any of these things greatly reduces the risk to your asset; doing several of them virtually eliminates it. Notice that not all of these proposed mitigating measures are really practical, though—clearly, addressing the vulnerabilities is the best place to start.

What does your fancy TV set have to do with information systems security? Using risk assessment to drive security choices acknowledges the compromise between risk and cost. The cost and trouble associated with moving is far too great just to reduce the risk of someone stealing your TV. However, it probably is worthwhile to close your windows and upgrade your locks. You cannot wave a magic wand and make all potential threats magically disappear, although you can (and should) work to minimize any threats over which you have control or influence. The biggest win for administrators is to clamp down on vulnerabilities; we’ll talk more about the specific process for locking down Microsoft Windows 2000 servers in Chapter 6, “Windows 2000 Server Security Basics.”

Exploits

A vulnerability by itself isn’t particularly interesting. An exploit, alas, is a different story; it’s a piece of code or behavior that takes advantage of a particular vulnerability. The difference between an exploit and a vulnerability is slight but significant. If you forget to close the telnet port on your firewall, that’s a vulnerability. If someone uses it to hack your server, that’s an exploit.

Unless you’re the one doing the hacking, you probably won’t have any control over exploits aimed at your machines. However, every time you fix or remove a vulnerability, you’re rendering useless all the exploits that use that particular security gap.

Safeguards

Safeguards are just what their name implies: they are procedures, devices, or programs designed to safeguard assets against threats and exploits. Some safeguards are preventative, whereas others are designed to limit the potential damage from a known or suspected vulnerability. Safeguards are all around in the systems we use today. Banks use safeguards like armed guards, surveillance cameras, big steel vaults, and serial number tracking. Computer systems use safeguards like strong password policies, smart cards, and security auditing logs. A good risk assessment clearly identifies what safeguards are currently in place and what they safeguard against. A better one also points out new or modified safeguards that can help reduce the danger from the risks identified in the assessment.

The STRIDE Model

Microsoft uses a different, more specific model to guide their internal security processes, including design and security reviews. The STAVE model is a good framework for general security concepts; Microsoft’s model, called STRIDE, is normally used by developers and designers to identify and resolve security issues in their application code. STRIDE is useful for us, too, because we can use it to evaluate the potential risks to a messaging system with only slight modification. The six letters in STRIDE each represent a particular risk. Those risks, and their effects on Exchange, are as follows:

The STRIDE model is quite useful as a way to help build a taxonomy of threats. As you list the risks to your Exchange systems (as we’ll do in the next section), you can pigeonhole them into one of the six STRIDE categories, giving you a convenient roadmap of the threats and risks you’re most likely to face.

Asset and Threat Assessment for Exchange (or, What Would You Like to Not Lose Today?)

Part of risk assessment is identifying the assets you have to lose. Even a quick, back-of-the-envelope inventory is better than nothing, but the more time and effort you put into your inventory the more useful it will be to you. Of course, you have to put a commensurate amount of effort into identifying the threats you face, too, so that you can adequately assess the risks to your assets. The particulars will vary according to your operations, but the overall principle is the same.

Asset Inventory

Make a comprehensive list of your assets, informational or otherwise. Some will be obvious, like the server and network hardware that hosts your Exchange infrastructure, or the stored message data in your mailbox and public folder stores. Some might be less obvious: Have you considered the value of data that is on your backup tapes? What about the information value of message headers? Here are some specific questions to ask to guide you in this process:

Once you’ve identified the assets and the potential loss associated with each of them, you’re ready to start asking some harder questions. For each asset, ask these questions:

Категории