Gentoo Security Benchmark. XCCDF Security Guide

Size: px
Start display at page:

Download "Gentoo Security Benchmark. XCCDF Security Guide"

Transcription

1 Gentoo Security Benchmark XCCDF Security Guide

2 Gentoo Security Benchmark: XCCDF Security Guide Generated by OpenSCAP (1.0.2) on T11:46:38+01:00.

3 Table of Contents 1. Introduction... 1 This is no security policy... 1 A little more about SCAP and OVAL... 1 Using this guide... 1 Available XCCDF Profiles... 2 About the rule weights Before startng... 4 Infrastructure architecturing... 4 Mapping requirements... 4 Non-software security concerns... 4 Physical security... 4 Policies and contractual agreements Installation configuration... 6 Storage configuration... 6 Partitioning... 6 Use a Hardened Toolchain... 8 The hardened toolchain is used System settings... 9 File system related settings... 9 Appropriate mount options for the file systems... 9 Disk quota support System services Disable unsafe services Require single-user boot to give root password Properly Configure TCP Wrappers SSH service Cron service At service NTP service Portage settings USE flags Fetching signed portage tree Kernel configuration Bootloader configuration Password protect GRUB (legacy) Password protect LILO Authentication and authorization settings Restrict root system logon Allow only known users to login Restrict user resources Enforce password policy Review password strength regularly Session settings Disable access to user terminals File and directory privileges and integrity Limit world writable files and locations Limit setuid and setgid file and directory usage Logs only readable by proper group Files only used by root should be root-only Review file integrity regularly Data flows Backup the data Automated backups Full data coverage Retention iii

4 Security guide Off-site backups Validate and test Decommissioning servers Wipe disks iv

5 List of Figures 3.1. Remediation instructions Remediation instructions Remediation instructions Remediation instructions Remediation instructions Remediation instructions Remediation instructions Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation script Remediation instructions Remediation instructions Remediation instructions v

6 Chapter 1. Introduction Since years, Gentoo Linux has a Gentoo Security Handbook which provides a good insight in secure system configuration for a Gentoo systems. Although this is important, an improved method for describing and tuning a systems' security state has emerged: SCAP, or the Security Content Automation Protocol. As such, this benchmark is an update on the security handbook, including both the in-depth explanation of settings as well as the means to validate if a system complies with this or not. Now, during the development of this benchmark document, not include all information from the Gentoo Security Handbook is included as some of the settings are specific to a service that is not all that default on a Gentoo Linux system or sufficiently separate that can benefit other distributions as well. Although these settings are important as well, it is best done in separate benchmarks for those services instead. Where applicable, this benchmark will refer to a different hardening guide for specific purposes (such as the Hardening OpenSSH benchmark). References Gentoo Security Handbook. This is no security policy It is very important to realize that this document is not a policy. There is no obligation to follow this to make a secure system nor should everything in this document be agreed upon. This document is a set of common best practices with the explanation (why is it a best practice) and method (how to implement the best practice). The purpose of this document is to guide readers in their quest to hardening their systems. It will provide pointers that could help in deciding particular configuration settings and will do this hopefully using sufficient background information to allow readers to make a good choice. Readers might find settings they don't agree with. That's fine, but if there is disagreement about why it is documented, we would like to hear it so we can update the guide accordingly. A little more about SCAP and OVAL Within SCAP, NIST has defined some new standards of which XCCDF and OVAL are notably important in light of this guide. XCCDF (Extensible Configuration Checklist Description Format) is a specification language for writing security checklists and benchmarks OVAL (Open Vulnerability and Assessment Language) is a standard to describe and validate system settings Thanks to the OVAL and XCCDF standards, a security engineer can now describe how the state of a system should be configured, how this can be checked automatically and even report on these settings. Furthermore, within the description, the engineer can make "profiles" of different states (such as a profile for a workstation, server (generic), webserver, LDAP server,...) and reusing the states (rules) identified in a more global scope. Using this guide 1

7 Introduction This guide is generated from SCAP content (more specifically, the XCCDF document) using openscap, a free software implementation for handling SCAP content. Within Gentoo, the package app-forensics/openscap provides the tools, and the following command is used to generate the HTML output: # oscap xccdf generate guide gentoo-xccdf.xml > output.html Secondly, together with this XCCDF XML, an OVAL XML file is made available. The two files combined allow OVAL interpreters to automatically validate various settings as documented in the benchmark. Finally, if certain tests are not available in OVAL yet, scripts are provided that can be executed through the SCE (Script Check Engine) support in openscap. As scripts are not guaranteed to have no impact on the system (or leave traces), -oval profiles are available that only enable the OVAL (and not SCE) checks. To validate the tests, the following commands can be used: # export PROFILE="xccdf_org.gentoo.dev.swift_profile_default" # oscap xccdf eval --profile ${PROFILE} gentoo-xccdf.xml To generate a full report in HTML as well, use the next command: # oscap xccdf eval --profile ${PROFILE} --results xccdf-results.xml \ --report report.html gentoo-xccdf.xml Finally, this benchmark will suggest some settings that do not reflect the will of the reader. That is perfectly fine - even more, some settings might even raise eyebrows left and right. This document will explain the reasoning behind the settings but deviations are always possible. If that is the case, disable the rules in the XCCDF document or, better yet, create a new profile and only refer to the tests that are required. Available XCCDF Profiles As mentioned earlier, the XCCDF document supports multiple profiles. For the time being, two profiles are defined: The default profile (xccdf_org.gentoo.dev.swift_profile_default) contains tests that are quick to validate The default-oval profile (xccdf_org.gentoo.dev.swift_profile_default-oval) is like the default one, but does not call any other checker than OVAL (so no scripts). The intensive profile (xccdf_org.gentoo.dev.swift_profile_intensive) contains all tests, including those that take a while (for instance because they perform full file system scans) The intensive-oval profile (xccdf_org.gentoo.dev.swift_profile_intensive-oval) is like the intensive one, but does not call any other checker than OVAL (so no scripts). Substitute the profile information in the commands above with the required profile. About the rule weights Within this guide, weights are assigned to tests to give some importance to the rule (higher weight is more important) as well as a severity. 2

8 Introduction The severity is one of the following: high constitutes a grave or critical problem. A rule with this severity MUST be tackled as it detected a misconfiguration that is easily exploitable and could lead to full system compromise. medium reflects a fairly serious problem. A rule with this severity SHOULD be tackled as it detected a misconfiguration that is easily exploitable. low reflects a non-serious problem. A rule with this severity has detected a misconfiguration but its influence on the overall system security is minor (if other compliance rules are followed). info reflects an informational rule. Failure to comply with this rule does not mean failure to comply with the document itself. It is important to understand though that rules with a low severity can still lead to grave security problems if they are not met. Chaining of vulnerabilities or misconfiguration can still lead to full system compromise. For this reason, weights are added to rules as well. A higher weight has a more severe potential impact. Weights are the CVSS (or CCSS) score that is thought to be the case for a misconfiguration. They are calculated by NVD's CVSS calculator. Each rule is scored individually; a "chain" of misconfigurations might lead to a significantly higher issue, but this would make it very hard to make proper scoring. As an example, take the rule that says /var has to be on its own partition. The metrics we fill in in the calculator are currently based on the risk that the root file system is filled (no more free space), which can halt the system. The related exploit range (access vector) is "Local", because this is by itself not exploitable remotely - unless of course certain services are running that can fill up /var, but such assumptions are not taken. The attack complexity (access complexity) is "Low", as all that is needed is a local account and we can find the necessary ways to fill up /var. The level of authentication needed (authentication) is "Single" as the attacker needs one authentication step (local access) to exploit. The confidentiality impact is "None" (no data leakage) The integrity impact is "None" (no data manipulation) The availability impact is "Complete" (system crash or halt). This results in the CVSS base score of 4.6. The environmental score metrics and temporal score metrics are ignored as those are too specific for environments and organizations. References NVD CVSS calculator. The Common Configuration Scoring System (PDF). nistir-7502_ccss.pdf. 3

9 Chapter 2. Before startng Before starting to deploy Gentoo Linux and start hardening it, it is wise to take a step back and think about what to accomplish. Setting up a more secured Gentoo Linux isn't a goal, but a means to reach something. Most likely the system will become a Gentoo Linux powered server. What is this server for? Where will it be hosted? What services are scheduled to run on this operating system? Etc. Infrastructure architecturing When considering the entire IT architecture, many architecturing frameworks exist to write down and further design infrastructure. There are very elaborate ones, like TOGAF (The Open Group Architecture Framework), but smaller ones exist as well. A well written and maintained infrastructure architecture helps to position new services or consider the impact of changes on existing components. Security is about reducing risks, not about harassing people or making work for a system administrator harder. And reducing risks also means that a clear eye needs to be kept on the architecture and all its components. If there is no knowledge as to what is being integrated, where it is going to be installed or why, then hardening by itself will probably not do much to the secure state of the system. Mapping requirements When designing a service, we need to take both functional and non-functional requirements into account. That does sound like overshooting for a simple server installation, but it is not. Is auditing considered? Where should the audit logs be sent to? What about authentication? Centrally managed, or manually set? And the server, will it only host a particular service, or will it provide several services? When hosting multiple services on the same server, make sure that the server is positioned within the network on an acceptable segment. It is not safe to host central LDAP infrastructure on the same system as a web server that is facing the Internet. References IBM DeveloperWorks article on "Capturing Architectural Requirements". developerworks/rational/library/4706.html. Non-software security concerns From the next chapter onwards, the focus will be on the software side hardening. There are of course also non-software concerns that need to be taken care of. References Site Security Handbook (RFC2196). Physical security Make sure that the system is only accessible (physically) by trusted people. Fully hardening a system, only to have a malicious person take out the harddisk and run away with the confidential data is not something fun to experience. When physical security cannot be guaranteed (like with laptops), make sure that theft of the device only results in the loss of the hardware and not of the data and software on it (take backups!), and also that the data on it cannot be read by unauthorized people. 4

10 Before startng References Data Center Physical Security Checklist (SANS, PDF). awareness/data-center-physical-security-checklist_416. Policies and contractual agreements Create or validate the security policies in the organization. This is not only as a stick (against internal people who might want to abuse their powers) but also to document and describe why certain decisions are made (both architecturally as otherwise). Make sure that the reasoning for the guidelines is clear. If the policies ever need to be adjusted towards new environments or concepts (like "bring your own device") having the reasons for the (old) guidelines documented will make it much easier to write new ones. References Technical Writing for IT Security Policies in Five Easy Steps (SANS, PDF). whitepapers/policyissues/technical-writing-security-policies-easy-steps_492. Information Security Policy Templates (SANS). 5

11 Chapter 3. Installation configuration Gentoo Linux allows us to update various parts of the system after installation, but it might be interesting to consider the following aspects during (or before) installation to not risk a huge migration project later. Storage configuration Storage is of utmost importance in any environment. It needs to be sufficiently fast (performance), but also secure and manageable while remaining flexible to handle future changes. Partitioning Know which locations in the file system structure need to be on a different partition or logical volume. Separate locations allow for a more distinct segregation (for instance, no hard links between different file systems) and low-level protection (file system corruption impact, but also putting the right data on the right storage media). References Filesystem Hierarchy Standard. Separate file systems for important locations Having a separate file system for important locations has several advantages, but those advantages need to be weighted against the disadvantages of separate file systems. These disadvantages are: Separate file systems mean that better disk space control is needed (governing free space). A file system that is given too much free space means that disk space is being wasted, but a file system that is not given enough free disk space will need to be grown quickly - if possibile. This also means that creating a proper partitioning setup with many different partitions (file systems) will take some time and calculations; many users have no good idea how much space they need to make available for a file system. Some file system locations need to be available early in the boot process. If those locations reside on different file systems, special precautions need to be taken to make those file systems available when the system is booted (such as creating an initial ram file system). The advantages on the other hand: A sudden disk space growth will eventually be stopped by the limits of the file system. If a noncritical file system is full, the impact on the overall system is limited. Without separate file systems, a full file system might jeopardise the availability of the entire system. Specific mount options can be enabled on the file systems that improve the security of the file system (permissions) as well as performance. Such mount options include ownership details, allowing (or disallowing) setuid binaries, device files and more. Different file systems can be hosted on different devices (or even on network shares), allowing administrators to pick the most efficient storage device for a particular file system. Considering these pros and cons, it is recommended to have at least the following file system locations to be on a different file system: 6

12 Installation configuration /tmp as this is a world-writable location and requires specific mount options. When possible, this location can be made a tmpfs file system. This is to protect the root file system from being flooded. /var as this contains variable data (and thus is prone to grow extensively depending on the installed services). This is to protect the root file system from being flooded. /var/log as this contains logging data (and thus is prone to grow extensively depending on the services). This is to protect the /var file system from being flooded, as this might impact various services (like databases, web servers, etc.). /var/log/audit as this contains (potentially sensitive) logging data. Some services refuse to continue if the audit target location is full. Having the location separate from /var/log protects the audit file system when /var/log would be flooded. /home as this is completely under the control of end users. It needs to be mounted with more secure settings (more about that later) and should be separate both to protect the root file system, but also to allow the /home location to be either shared or used elsewhere. /var/tmp which is a "second" /tmp location, but where the content is preserved after a reboot. Still, it is world-writable and requires specific mount options, and should be on a different file system to prevent /var to be flooded which might impact the availability of services. /tmp is a separate file system Figure 3.1. /tmp is a separate file system remediation instructions Create a file system for /tmp; make sure it is added in the /etc/fstab file and reboot the system. /var is a separate file system Figure 3.2. /var is a separate file system remediation instructions Create a file system for /var; make sure it is added in the /etc/fstab file and reboot the system. /var/log is a separate file system Figure 3.3. /var/log is a separate file system remediation instructions Create a file system for /var/log; make sure it is added in the /etc/fstab file and reboot the system. /var/log/audit is a separate file system Figure 3.4. /var/log/audit is a separate file system remediation instructions Create a file system for /var/log/audit; make sure it is added in the /etc/fstab file and reboot the system. /home is a separate file system Figure 3.5. /home is a separate file system remediation instructions Create a file system for /home; make sure it is added in the /etc/fstab file and reboot the system. /var/tmp is a separate file system Figure 3.6. /var/tmp is a separate file system remediation instructions Create a file system for /var/tmp; make sure it is added in the /etc/fstab file and reboot the system. 7

13 Installation configuration Use a Hardened Toolchain When Gentoo is installed, use the hardened stages and hardened toolchain. The hardened toolchain includes additional security patches, such as support for non-executable program stacks and buffer overflow detection. Position Independent Executables (PIE) and Position Independent Code (PIC) implements a memory hardening approach where the application (or library), when loaded to memory, does not have hard requirements where in memory it is loaded. Together with ASLR this makes it more difficult for exploits to know at which memory region certain data will be available. Stack Smashing Protection (SSP) adds markers outside buffer areas to detect buffer overflow attacks, killing the application rather than effectively having the overflow succeed. During installation, make sure that the default hardened toolchain is selected, not one of the - hardenedno* as those are toolchains where specific settings are disabled. The -vanilla one is a toolchain with no hardened patches. # gcc-config -l [1] x86_64-pc-linux-gnu * [2] x86_64-pc-linux-gnu hardenednopie [3] x86_64-pc-linux-gnu hardenednopie.gcc-config-ref [4] x86_64-pc-linux-gnu hardenednopiessp [5] x86_64-pc-linux-gnu hardenednossp [6] x86_64-pc-linux-gnu vanilla The hardened toolchain is used Figure 3.7. The hardened toolchain is used remediation instructions Use a hardened Gentoo profile and select the default compiler (not vanilla nor any of the hardenedno* ones). 8

14 Chapter 4. System settings Within this chapter, the (recommended) settings that can be adjusted relatively easily are presented, even when a Gentoo installation has already been performed. This is the bulk of the security settings. File system related settings Servers and systems are about manipulating data. In this chapter, the security settings for file systems are explained. Appropriate mount options for the file systems Non-root file systems should be mounted with the nodev mount option. This mount option ensures that device files are not allowed on these file systems (and if they are there, they are ignored by the Linux kernel for any device operation). Having device files on non-root file systems could allow unauthorized people access to sensitive data (for instance when having a readable raw disk device files) or even manipulate the system. The privilege to create special device files (beyond regular sockets) such as character and block device files is handled through the CAP_MKNOD capability which is not granted to regular users. As such, the risk is when more privileged users or processes are tricked to create such device files. This setting is appropriate for file systems such as (non-exhaustive list): /var (as it is recommended to be a separate file system) /var/log (as it is recommended to be a separate file system) /var/log/audit (as it is recommended to be a separate file system) /home (as it is recommended to be a separate file system) /tmp (as it is recommended to be a separate file system) Specific file systems should also be mounted with the nosuid mount option. This prevents setuid binaries to run as a different user when hosted on this file system. As there are several locations where setuid binaries might be needed, this only affects particular file systems: The /tmp file system should not be used for setuid binaries as this is a world-writable location and often target storage for attacks. The /home file system should not be used for setuid binaries as this is the home location for nonroot users. The /dev/shm file system should not be used for any binaries (shared memory region). Specific file systems should also be mounted with the noexec mount option. This prevents some automated attacks to execute certain payload (exploits) from these locations. This is just one of the many "layers" though, as executing payload can still be done using different methods. For instance, scripts can be invoked through the shell itself (rather than directly) and in 9

15 System settings the past, binaries could even be executed through the ld-linux.so binary (although this has been fixed). File systems for which noexec is recommended are: The /tmp file system as it is a popular target to store exploit code in. The /dev/shm file system as it is meant as a shared memory location and is becoming a popular target to store exploit code in. /var is mounted with nodev Figure 4.1. /var is mounted with nodev remediation instructions Mount /var with nodev mount option Figure 4.2. /var is mounted with nodev remediation script mount -o remount,nodev /var /var/log is mounted with nodev Figure 4.3. /var/log is mounted with nodev remediation instructions Mount /var/log with nodev mount option Figure 4.4. /var/log is mounted with nodev remediation script mount -o remount,nodev /var/log /var/log/audit is mounted with nodev Figure 4.5. /var/log/audit is mounted with nodev remediation instructions Mount /var/log/audit with nodev mount option Figure 4.6. /var/log/audit is mounted with nodev remediation script mount -o remount,nodev /var/log/audit /home is mounted with nodev Figure 4.7. /home is mounted with nodev remediation instructions Mount /home with nodev mount option Figure 4.8. /home is mounted with nodev remediation script mount -o remount,nodev /home 10

16 System settings /tmp is mounted with nodev Figure 4.9. /tmp is mounted with nodev remediation instructions Mount /tmp with nodev mount option Figure /tmp is mounted with nodev remediation script mount -o remount,nodev /tmp /tmp is mounted with nosuid Figure /tmp is mounted with nosuid remediation instructions Mount /tmp with nosuid mount option Figure /tmp is mounted with nosuid remediation script mount -o remount,nosuid /tmp /home is mounted with nosuid Figure /home is mounted with nosuid remediation instructions Mount /home with nosuid mount option Figure /home is mounted with nosuid remediation script mount -o remount,nosuid /home /dev/shm is mounted with nosuid Figure /dev/shm is mounted with nosuid remediation instructions Mount /dev/shm with nosuid mount option Figure /dev/shm is mounted with nosuid remediation script mount -o remount,nosuid /dev/shm /tmp is mounted with noexec Figure /tmp is mounted with noexec remediation instructions Mount /tmp with noexec mount option Figure /tmp is mounted with noexec remediation script mount -o remount,noexec /tmp 11

17 System settings /dev/shm is mounted with noexec Figure /dev/shm is mounted with noexec remediation instructions Mount /dev/shm with nosuid mount option Figure /dev/shm is mounted with noexec remediation script mount -o remount,noexec /dev/shm Disk quota support Most file systems support the notion of quotas - limits on the amount of data / files that are allowed on that particular file system. To enable quotas, first configure the Linux kernel to include CONFIG_QUOTA. Next, install the sys-fs/quota package. # emerge quota Then add usrquota and grpquota to the partitions (in /etc/fstab) where quotas need to be enabled on. For instance, the following snippet from /etc/fstab enables quotas on /var and / home. /dev/mapper/volgrp-home /home ext4 noatime,nodev,nosuid,usrquota,grpquota 0 0 /dev/mapper/volgrp-var /var ext4 noatime,usrquota,grpquota 0 0 Finally, add the quota service to the boot runlevel. # rc-update add quota boot Reboot the system so that the partitions are mounted with the correct mount options and that the quota service is running. Then the quotas for users and groups can be set up. References Managing Disk Usage with Quotas (LinuxHomeNetworking). index.php/quick_howto_:_ch28_:_managing_disk_usage_with_quotas. Gentoo Linux Kernel Configuration - shorthand notation information. The kernel supports quota (CONFIG_QUOTA) Figure The kernel supports quota (CONFIG_QUOTA) remediation instructions Rebuild the Linux kernel with quota support (CONFIG_QUOTA) 12

18 System settings System services Services (daemons) are the primary reason for a server to exist. They represent the function of the server. For instance, a web server will run the apache2 or lighttpd service. A name server will run the named service. In this benchmark, the focus is on a limited set of system services. For the other services it is wise to consult other hardening guides specific for those services. References Center for Internet Security, host of many service benchmarks. Disable unsafe services It is recommended to disable (or even uninstall) the following services unless absolutely necessary. These services use plain-text protocols and are as such unsafe to use on (untrusted) networks. Telnet service FTP Service It is recommended to substitute these services with their more secure counterparts (like sftp, SSH,...). No telnet daemons are running Figure No telnet daemons are running remediation instructions Stop telnet services Figure No telnet daemons are running remediation script for service in /etc/init.d/*telnet*; do test -f ${service} && run_init rc-service ${service##*/} stop; done No FTP daemons are running Figure No FTP daemons are running remediation instructions Stop FTPd services Figure No FTP daemons are running remediation script for service in /etc/init.d/*ftp*; do test -f ${service} && run_init rc-service ${service##*/} stop; done Require single-user boot to give root password When a system is booted in single user mode, some users might find it handy to immediately get a root prompt; many even have a specific bootloader entry to boot in single user mode. 13

19 System settings It is important that, for a more secure server environment, even booting in single user mode requires the user to enter the root password. This is already done by default in Gentoo through the rc_shell variable in /etc/rc.conf. Administrators should also make sure that no direct shells are provided in /etc/inittab for singleuser mode. Gentoo's /etc/inittab definition should look like so: su0:s:wait:/sbin/rc single su1:s:wait:/sbin/sulogin sulogin is used for single-user boot (/etc/rc.conf) Figure sulogin is used for single-user boot (/etc/rc.conf) remediation instructions Set /sbin/sulogin for rc_shell Figure sulogin is used for single-user boot (/etc/rc.conf) remediation script sed -i -e 's:^rc_shell=.*:rc_shell="/sbin/sulogin":g' /etc/rc.conf sulogin is used for single-user boot (/etc/inittab) Figure sulogin is used for single-user boot (/etc/inittab) remediation instructions Set /sbin/sulogin or '/sbin/rc single' for single-user boot in /etc/inittab Properly Configure TCP Wrappers With TCP wrappers, services that support TCP wrappers (or those started through xinetd) should be configured to only accept communication with trusted hosts. With the use of /etc/hosts.allow and /etc/hosts.deny, proper access control lists can be created. More information on the format of these files can be obtained through man 5 hosts_access. /etc/hosts.allow exists Figure /etc/hosts.allow exists remediation instructions Create and properly configure /etc/hosts.allow SSH service The SSH service is used for secure remote access towards a system, but also to provide secure file transfers. It is very commonly found on Unix/Linux systems so proper hardening is definitely in place. Please use the "Hardening OpenSSH" guide for the necessary instructions. 14

20 System settings Cron service A cron service is used to schedule tasks and processes on predefined times. Cron is most often used for regular maintenance tasks. Only allow trusted accounts cron access Only allow trusted accounts to use cron. How to achieve this depends on the cron service installed. If vixie-cron or cronie is installed, then have (only) those users that need cron access take part in the cron unix group. At service If dcron is used, then make sure /usr/sbin/crontab is only executable by root and the cron unix group, and make sure (only) those users that need cron access take part in the cron unix group. The at service allows users to execute a task once on a given time. Unlike cron, this is not scheduled repeatedly - once executed, the task is considered completed and at will not invoke it again. Only allow trusted accounts at access Only allow trusted accounts to use at. Unlike cron access, at access is governed through the /etc/ at/at.allow file. If the at.allow file does not exist but /etc/at/at.deny does, then all names not mentioned in the file are allowed to run at. The most secure method is to use the at.allow method. The format of these files is one username per line. /etc/at/at.allow exists Figure /etc/at/at.allow exists remediation instructions Create and properly configure /etc/at/at.allow NTP service With NTP, systems can synchronise their clocks, ensuring correct date and time information. This is important as huge clock drift could cause misinterpretation of log files or even unwanted execution of commands. Synchronise the system clock Synchronise the systems' clock with an authorative NTP server, and use the same NTP service for all other systems. This can be accomplished by regularly executing ntpdate, but can also be handled using a service like net-misc/ntp's ntpd. Portage settings The package manager of any system is a very important tool. It is responsible for handling proper software deployments, but also offers features that should not be neglected, like security patch roll-out. 15

21 System settings USE flags For Gentoo, the package manager offers a great deal of flexibility (as that is the goal of Gentoo anyhow). As such, good settings for a more secure environment within Portage (assuming that Portage is used as package manager) are important. USE flags in Gentoo are used to tune the functionality of many components and enable or disable features. For a well secured environment, there are a couple of USE flags that should be set in a global manner. These USE flags are pam to enable Pluggable Authentication Modules support tcpd for TCP wrappers support ssl for SSL/TLS support Pluggable Authentication Modules are a powerful mechanism to manage authentication, authorization and user sessions. Applications that support PAM can be tuned to the liking of the organization, leveraging central authentication, password policies, auditing and more. With TCP wrappers, services can be shielded from unauthorized access on host level. It is an access control level mechanism which allows configuring allowed (and denied) hosts or network segments on application level. Finally, leveraging Secure Sockets Layer (or the standardized Transport Layer Security) allows applications to encrypt network communication or even implement a client-certificate based authentication mechanism. Set the USE flags globally in /etc/portage/make.conf so they are applicable to all installed software. USE="... pam tcpd ssl" Fetching signed portage tree Gentoo Portage supports fetching signed tree snapshots using emerge-webrsync. This is documented in the Gentoo Handbook, but as it is quite easy, here are the instructions again: # mkdir -p /etc/portage/gpg # chmod 0700 /etc/portage/gpg # export SRV="subkeys.pgp.net" # export KEY="0x96D8BF6D" # gpg --homedir /etc/portage/gpg --keyserver ${SRV} --recv-keys ${KEY} # gpg --homedir /etc/portage/gpg --edit-key ${KEY} trust After this, edit /etc/portage/make.conf: FEATURES="webrsync-gpg" PORTAGE_GPG_DIR="/etc/portage/gpg" SYNC="" 16

22 System settings Kernel configuration The Linux kernel should be configured using a sane security standard in mind. When using grsecurity, additional security-enhancing settings can be enabled. For further details, please refer to the "Hardening the Linux kernel" guide. References Gentoo Kernel Configuration Guide - Shorthand notation information. Bootloader configuration The bootloader (be it GRUB or another tool) is responsible for loading the Linux kernel and handing over system control to the kernel. But boot loaders also allow for a flexible approach on kernel loading, which can be (ab)used to work around security mechanisms. Password protect GRUB (legacy) It is recommended to password-protect the GRUB configuration so that the boot options cannot be modified during a boot without providing the valid password. This can be accomplished by inserting password abc123 in /boot/grub/grub.conf (which will set the password to "abc123"). But as clear-text passwords in the configuration file are insecure as well, hash the passwords. Just start grub and, in the grub-shell, type md5crypt. # grub GRUB version 0.92 (640K lower / 3072K upper memory) [ Minimal BASH-like line editing is supported.... ] grub> md5crypt Password: abc123 Encrypted: $1$18u.M0$J8VbOsGXuoG9Fh3n7ZkqY. grub> quit This hashed password can now be used in grub.conf using password $1$18u.M0$J8VbOsGXuoG9Fh3n7ZkqY.. Password protect LILO --md5 It is recommended to password-protect the LILO configuration so that modifying the boot options during a boot without providing the valid password is not possible. This can be accomplished by inserting password=abc123 followed by restricted in the / etc/lilo.conf file. It is also possible to do this on a per-image level. password=abc123 restricted 17

23 System settings delay=3 image=/boot/bzimage read-only password=def456 restricted The restricted keyword is needed to have LILO only ask for the password if a modification is given. If the defaults are used, then no password needs to be provided. Rerun lilo after updating the configuration file. Authentication and authorization settings An important part in a servers' security is its authentication and authorization support. We have already described how to build in PAM support (through the Portage USE flags), but proper authentication and authorization settings are mode than just compiling in the necessary functionality. Restrict root system logon To restrict where the root user can directly log on, edit /etc/securetty and specify the supported terminals for the root user. When properly configured, any attempt to log on as the root user from a non-defined terminal will result in logon failure. A recommended setting is to only allow root user login through the console and the physical terminals (tty0-tty12). console tty0 tty1... tty12 Allow only known users to login When PAM is enabled, the /etc/security/access.conf file is used to check which users are allowed to log on and not (through the login application). These limits are based on username, group and host, network or tty that the user is trying to log on from. By enabling these settings, the risk is reduced that a functional account (say apache) is abused to log on with, or that a new account is created as part of an exploit. Restrict user resources When facing a DoS (Denial-of-Service) attack, reducing the impact of the attack can be done by limited resource consumption. Although the component that is under attack will even more quickly fail, the impact towards the other services on the system (including remote logon to fix things) is more limited. In Gentoo Linux, the following methods are available to limit resources. 18

24 System settings /etc/security/limits.conf defines the resource limits for logins that are done through a PAM-aware component (default in our setup) /etc/limits defines the resource limits for logins that are done through login programs that are not PAM-aware. Generally, it should suffice to set up /etc/security/limits.conf, which is the configuration file used by the pam_limits.so module. Note that the settings are applicable on a per login session basis. More information on these files and their syntax can be obtained through their manual pages. # man limits.conf # man limits Enforce password policy Usually most organizations have a password policy, telling their users how long their passwords should be and how often the passwords should be changed. Most users see this as an annoying aspect, so it might be best to enforce this policy. Enforcing password policies is (partially) part of the sys-apps/shadow package (which is installed by default) and can be configured through the /etc/login.defs file. This file is well documented (using comments) and it has a full manual page as well. A second important player when dealing with password policies is the pam_cracklib.so library. This can be used in the appropriate /etc/pam.d/* files. For instance, for the /etc/pam.d/ passwd definition: auth required pam_unix.so shadow nullok account required pam_unix.so password required pam_cracklib.so difok=3 retry=3 \ minlen=8 dcredit=-2 \ ocredit=-2 password required pam_unix.so md5 use_authok session required pam_unix.so In the above example, the password is required to be at least 8 characters long, differ more than 3 characters from the previous password, contain 2 digits and 2 non-alphanumeric characters. Review password strength regularly Regularly check the strength of the users' passwords. There are tools out there, like app-crypt/ johntheripper which, given a /etc/shadow file (or sometimes even LDAP dump) try to find the passwords for the users. When such a tool can guess a users' password, that users' password should be expired and the user should be notified and asked to change his password. Session settings 19

25 System settings Unlike authentication and authorization settings, a session setting is one that is applicable to an authenticated and authorized user when he is logged on to the system. Disable access to user terminals By default, user terminals are accessible by others to write messages to (using write, wall or talk). It is adviseable to disable this unless explicitly necessary. Messages can confuse users and trick them into performing malicious actions. This can be disabled by setting mesg n in /etc/profile. A user-friendly method for doing so in Gentoo is to create a file /etc/profile.d/disable_mesg which contains this command. File and directory privileges and integrity Proper privileges on files makes it far more difficult to malicious users to obtain sensitive information or write/update files they should not have access to. Limit world writable files and locations Limit (or even remove) the use of world writable files and locations. If a directory is world writable, it makes sense to have the sticky bit set on it as well (like with /tmp). Use find to locate such files or directories. # find / -perm +o=w! \( -type d -perm +o=t \)! -type l -print The above command shows world writable files and locations, unless it is a directory with the sticky bit set, or a symbolic link (whose world writable privilege is not accessible anyhow). Limit setuid and setgid file and directory usage The setuid and setgid flags for files and directories can be used to work around authentication and authorization measures taken on the system. So their use should be carefully guarded. In case of files, the setuid or setgid bit causes the application (if the file is marked as executable) to run with the privileges of the file owner (setuid) or group owner (setgid). It is necessary for applications that need elevated privileges, like su or sudo. In case of directories, the setgit bit causes newly created files in that directory to automatically be owned by the same group as the mentioned (parent) directory. Logs only readable by proper group No log file in /var/log should be world readable. Log files should be limited by particular groups (either the group representing the service, like apache or portage, or a specific administrative group like wheel). Files only used by root should be root-only 20

26 System settings Some files, like /etc/shadow, are meant to be read (and perhaps modified) by root only. These files should never have privileges for group- or others. A nonexhaustive list of such files is: /etc/shadow which contains account password information (including password hashes) /etc/securetty which contains the list of terminals where root is allowed to log on from Review file integrity regularly Deploy intrusion detection tool(s) to validate the integrity and privileges on important files. appforensics/aide is an example of such a tool. 21

27 Chapter 5. Data flows Clearly map out how data flows in and out of the server (and which data this is). This will be needed anyhow when firewalls are configured, but it also improves integration of the server in a larger infrastructure. Backup the data Make sure that the data is backed up. This is not only in case of server loss, but also to protect against accidental file removal or an awkward bug in a service that deleted important information. Automated backups Automate backups on the system. If the backups are performed manually then they are done wrong and someone will eventually forget it. Use scheduling software like cron to automatically take backups on regular intervals, or use a central backup solution like bacula. Full data coverage Retention Many users that do take backups only do this on what they seem as important files. However, it is wise to make full system backups too as recreating an entire system from scratch could otherwise take days or even weeks. Ensure that the backups use a long enough retention. It is not wise to take a single backup and overwrite this one over and over again, as there will be a time that a file needs to be recovered that was corrupted long before the last backup was taken. There is no perfect retention period however, as the more backups are kept, the more storage is required and the more money or time needs to be invested in managing the backups. In most cases, introduce a "layered" approach on retention. For instance: keep daily backups for a week keep weekly backups (say each monday backup) for a month keep monthly backups (say each first monday) for a year keep yearly backups for 30 years Off-site backups Keep the backups off-site in case of disaster. But consider this location carefully. Investigate how fast the backup can be put there, but also how fast it can be retrieved it in case of need. Also investigate if this location is juridically sane (is it allowed to put the data on this location and is this off-site location trusted). Also ensure that the backups are stored securely. If necessary, encrypt the backups. 22

28 Data flows Validate and test Validate that the backup system works. Try recovering files (for instance on a second server or different location) or even entire systems (virtualization is a great help here) and do this regularly. 23

29 Chapter 6. Decommissioning servers When a server needs to be decommissioned, make sure that its data is safeguarded from future extraction. Wipe disks Clear all data from the disks on the server in a secure manner. Applications like shred (part of sysapps/coreutils) can be used to security wipe data or even entire partitions or disks. It is recommended to perform full disk wipes rather than file wipes. If this needs to be done on file level, see if the file system journaling can be disabled during the wipe session as journaling might "buffer" the secure writes and only write the end result to the disk. References NIST Publication "Guidelines for Media Sanitization" (PDF). NISTSP800-88_rev1.pdf. 24

Practical OpenSCAP Security Standard Compliance and Reporting. Robin Price II Senior Solutions Architect Martin Preisler Senior Software Engineer

Practical OpenSCAP Security Standard Compliance and Reporting. Robin Price II Senior Solutions Architect Martin Preisler Senior Software Engineer Practical OpenSCAP Security Standard Compliance and Reporting Robin Price II Senior Solutions Architect Martin Preisler Senior Software Engineer INTRODUCTION AGENDA Review some slides Follow along demostration

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

Ellipse Support. Contents

Ellipse Support. Contents Ellipse Support Ellipse Support Contents Ellipse Support 2 Commercial In Confidence 3 Preface 4 Mission 5 Scope 5 Introduction 6 What do you need to know about tuning and configuration? 6 How does a customer

More information

Security. Advanced Operating Systems and Virtualization Alessandro Pellegrini A.Y. 2017/2018

Security. Advanced Operating Systems and Virtualization Alessandro Pellegrini A.Y. 2017/2018 Security Advanced Operating Systems and Virtualization Alessandro Pellegrini A.Y. 2017/2018 Basic Security Aspects 1. Systems must be usable by legitimate users only 2. Access is granted on the basis of

More information

Operating Systems Linux 1-2 Measurements Background material

Operating Systems Linux 1-2 Measurements Background material Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing

More information

Fedora Core: Made Simple

Fedora Core: Made Simple Table of Contents Installing Fedora...2 Before you begin...2 Compatible Hardware...2 Minimum Requirements...2 Disk Space Requirements...2 Help! Booting from the CD ROM Drive Fails!...2 Installing Fedora

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note

More information

Introduction to UNIX/LINUX Security. Hu Weiwei

Introduction to UNIX/LINUX Security. Hu Weiwei Introduction to UNIX/LINUX Security Hu Weiwei Operation System Security The Security Problems in Operation Systems become more and more important The Security techniques improved rapidly The number of

More information

The Linux IPL Procedure

The Linux IPL Procedure The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe

More information

Disks, Filesystems 1

Disks, Filesystems 1 Disks, Filesystems 1 sudo and PATH (environment) disks partitioning formatting file systems: mkfs command checking file system integrity: fsck command /etc/fstab mounting file systems: mount command unmounting

More information

Practical OpenSCAP, Security Standard Compliance and Reporting Part 1: CLI (command-line)

Practical OpenSCAP, Security Standard Compliance and Reporting Part 1: CLI (command-line) Presenters: Robin Price II and Martin Preisler Abstract: OpenSCAP is a family of open source SCAP tools and content that help users create standard security checklists for enterprise systems. Natively

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions

More information

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to

More information

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer

More information

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013 RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2 3 June 2013 Developed by Red Hat, NSA, and DISA for the DoD Trademark Information Names, products,

More information

Securing Linux Systems Before Deployment

Securing Linux Systems Before Deployment Securing Linux Systems Before Deployment Richard Williams Senior Support Services Specialist Symark Why secure Linux systems? Your Linux enterprise installation is growing Assets on Linux systems are becoming

More information

Using grub to Boot various Operating Systems

Using grub to Boot various Operating Systems Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........

More information

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Lesson 1 Quiz 1. What is the working definition of authentication? a. The ability for a person or system to prove identity. b. Protection of data on a system or host from unauthorized access.

More information

Control-M and Payment Card Industry Data Security Standard (PCI DSS)

Control-M and Payment Card Industry Data Security Standard (PCI DSS) Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M

More information

Vulnerability & Security Assessment Report Election Systems &Software s Unity

Vulnerability & Security Assessment Report Election Systems &Software s Unity Vulnerability & Security Assessment Report Election Systems &Software s Unity 3.4.1.0 Prepared for the California Secretary of State by: Author: Jacob Stauffer, CISSP, FCMG Contributors: Steve Weingart,

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage Linux+ Guide to Linux Certification, Third Edition Chapter 2 Linux Installation and Usage Objectives Install Red Hat Fedora Linux using good practices Outline the structure of the Linux interface Enter

More information

Linux+ Guide to Linux Certification, Third Edition

Linux+ Guide to Linux Certification, Third Edition Linux+ Guide to Linux Certification, Third Edition Chapter 14 Troubleshooting, Performance, and Security Objectives Describe and outline good troubleshooting practices Effectively troubleshoot common hardware-

More information

Booting up and Shutting down A primer for troubleshooting

Booting up and Shutting down A primer for troubleshooting Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

IT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao

IT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao IT Service Delivery and Support Week Three IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Infrastructure Essentials Computer Hardware Operating Systems (OS) & System Software Applications

More information

General Pr0ken File System

General Pr0ken File System General Pr0ken File System Hacking IBM s GPFS Felix Wilhelm & Florian Grunow 11/2/2015 GPFS Felix Wilhelm && Florian Grunow #2 Agenda Technology Overview Digging in the Guts of GPFS Remote View Getting

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

OS security mechanisms:

OS security mechanisms: OS security mechanisms: Memory Protection: One of the important aspects of Operating system security is Memory Protection. Memory provides powerful indirect way for an attacker to circumvent security mechanism,

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Linux Systems Security. Access Control and Authentication NETS1028 Fall 2016

Linux Systems Security. Access Control and Authentication NETS1028 Fall 2016 Linux Systems Security Access Control and Authentication NETS1028 Fall 2016 Access Control Authenticating users is the act of trying to verify that a user is who they claim to be We generally rely on the

More information

How to Secure SSH with Google Two-Factor Authentication

How to Secure SSH with Google Two-Factor Authentication How to Secure SSH with Google Two-Factor Authentication WELL, SINCE IT IS QUITE COMPLEX TO SET UP, WE VE DECIDED TO DEDICATE A WHOLE BLOG TO THAT PARTICULAR STEP! A few weeks ago we took a look at how

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Capability and System Hardening

Capability and System Hardening P a g e 1 Date Assigned: mm/dd/yyyy Date Due: mm/dd/yyyy by hh:mm Educational Objectives Capability and System Hardening This lab is designed to help you gain a better understanding of system hardening

More information

FreeBSD Security Advisories

FreeBSD Security Advisories Security FreeBSD Security Advisories http://www.freebsd.org/security/advisories.html 2 FreeBSD Security Advisories Advisory Security information Where to find it Web page (Security Advisories Channel)

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem Why secure the OS? Operating System Security Works directly on the hardware but can be adapted during runtime Data and process are directly visible Application security can be circumvented from lower layers

More information

ForeScout Extended Module for Advanced Compliance

ForeScout Extended Module for Advanced Compliance ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support

More information

System Administration for Beginners

System Administration for Beginners System Administration for Beginners Week 5 Notes March 16, 2009 1 Introduction In the previous weeks, we have covered much of the basic groundwork needed in a UNIX environment. In the upcoming weeks, we

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

6.858 Lecture 4 OKWS. Today's lecture: How to build a secure web server on Unix. The design of our lab web server, zookws, is inspired by OKWS.

6.858 Lecture 4 OKWS. Today's lecture: How to build a secure web server on Unix. The design of our lab web server, zookws, is inspired by OKWS. 6.858 Lecture 4 OKWS Administrivia: Lab 1 due this Friday. Today's lecture: How to build a secure web server on Unix. The design of our lab web server, zookws, is inspired by OKWS. Privilege separation

More information

Securing CS-MARS C H A P T E R

Securing CS-MARS C H A P T E R C H A P T E R 4 Securing CS-MARS A Security Information Management (SIM) system can contain a tremendous amount of sensitive information. This is because it receives event logs from security systems throughout

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

Herding Clones. Mike Kershaw August 17, urmk/

Herding Clones. Mike Kershaw August 17, urmk/ Herding Clones Mike Kershaw Michael.Kershaw@marist.edu August 17, 2004 1 Why? Computer Science department wanted to offer students their own servers for classwork which would be available for the entire

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Software Security and Exploitation

Software Security and Exploitation COMS E6998-9: 9: Software Security and Exploitation Lecture 8: Fail Secure; DoS Prevention; Evaluating Components for Security Hugh Thompson, Ph.D. hthompson@cs.columbia.edu Failing Securely and Denial

More information

TELE 301 Lecture 8: Post

TELE 301 Lecture 8: Post Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB This is Lab Worksheet 13 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make

More information

Hardened Virtual Appliance Operations Guide

Hardened Virtual Appliance Operations Guide Hardened Virtual Appliance Operations Guide Securing the Appliance Base Platform to Meet High Governance Requirements VMWARE WHITEPAPER Table of Contents Introduction... 3 Purpose... 4 Root password...

More information

Top considerations for implementing secure backup and recovery. A best practice whitepaper by Zmanda

Top considerations for implementing secure backup and recovery. A best practice whitepaper by Zmanda Top considerations for implementing secure backup and recovery A best practice whitepaper by Zmanda In the last few years there have been many headlines about high-profile incidents of lost or stolen backup

More information

Shellbased Wargaming

Shellbased Wargaming Shellbased Wargaming Abstract Wargaming is a hands-on way to learn about computer security and common programming mistakes. This document is intended for readers new to the subject and who are interested

More information

B. The configuration will deny access to /var/web/dirl/private.html, but it will allow access to /var/web/dirl/subdir2/private.html, for example.

B. The configuration will deny access to /var/web/dirl/private.html, but it will allow access to /var/web/dirl/subdir2/private.html, for example. Volume: 294 Questions Question No: 1 Given this excerpt from an Apache configuration file, which of the numbered lines has INCORRECT syntax? 1: 2: ServerAdmin admin9@server.example.org

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

Part 1 : Getting Familiar with Linux. Hours. Part II : Administering Red Hat Enterprise Linux

Part 1 : Getting Familiar with Linux. Hours. Part II : Administering Red Hat Enterprise Linux Part 1 : Getting Familiar with Linux Chapter 1 : Getting started with Red Hat Enterprise Linux Chapter 2 Finding Your Way on the Command Line Hours Part II : Administering Red Hat Enterprise Linux Linux,

More information

Chapter 5: User Management. Chapter 5 User Management

Chapter 5: User Management. Chapter 5 User Management Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts

More information

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Securing Unix Filesystems - When Good Permissions Go Bad

Securing Unix Filesystems - When Good Permissions Go Bad Securing Unix Filesystems - When Good Permissions Go Bad Introduction Unix has a very elegant and flexible permission system at the heart of its filesystem security. These permissions allow and/or disallow

More information

LPIC-l/CompTIA. Certification. Lmux+ ONE. ALL a IN. (Exams LPIC-1/LX0-101 & LXO-102) Robb H. Tracy EXAM GUIDE. Graw Hill

LPIC-l/CompTIA. Certification. Lmux+ ONE. ALL a IN. (Exams LPIC-1/LX0-101 & LXO-102) Robb H. Tracy EXAM GUIDE. Graw Hill ALL a IN ONE LPIC-l/CompTIA t Lmux+ TM Certification EXAM GUIDE (Exams LPIC-1/LX0-101 & LXO-102) Robb H. Tracy TECHNISCHE INFORMATIONSBiBLIOTHEK UNIVER! ivjc Graw Hill BIBUOTHEK VER New York Chicago San

More information

CompTIA Linux Course Overview. Prerequisites/Audience. Course Outline. Exam Code: XK0-002 Course Length: 5 Days

CompTIA Linux Course Overview. Prerequisites/Audience. Course Outline. Exam Code: XK0-002 Course Length: 5 Days CompTIA Linux+ 2009 Exam Code: XK0-002 Course Length: 5 Days Course Overview This instructor-led course will prepare students for the 2009 CompTIA Linux+ certification exam. It provides a comprehensive

More information

"Charting the Course... Enterprise Linux Security Administration Course Summary

Charting the Course... Enterprise Linux Security Administration Course Summary Course Summary Description This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as user/group policies,

More information

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood

More information

Check List: Linux Machines

Check List: Linux Machines Check List: Linux Machines High Level Install and maintain malware protection software o Install MalWare (Defender) o Install AntiVirus (Microsoft Security Essentials) Account Management o Remove guest

More information

Standard: Event Monitoring

Standard: Event Monitoring October 24, 2016 Page 1 Contents Revision History... 4 Executive Summary... 4 Introduction and Purpose... 5 Scope... 5 Standard... 5 Audit Log Standard: Nature of Information and Retention Period... 5

More information

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks

More information

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

Disks, Filesystems Todd Kelley CST8177 Todd Kelley 1

Disks, Filesystems Todd Kelley CST8177 Todd Kelley 1 Disks, Filesystems Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 sudo and PATH (environment) disks partitioning formatting file systems: mkfs command checking file system integrity: fsck

More information

During security audits, over 15,000 vulnerability assessments are made, scanning the network IP by IP.

During security audits, over 15,000 vulnerability assessments are made, scanning the network IP by IP. Features LAN Guard Vulnerability scanning and Management Patch Management and Remediation Network and software Auditing Why Choose? 1. Powerful network, security and port scanner with network auditing

More information

Sentry Power Manager (SPM) Software Security

Sentry Power Manager (SPM) Software Security Sentry Power Manager (SPM) Software Security Purpose This technical note is a detailed review of the security areas of the SPM enterprise software product, version 6.0 and greater, and provides a brief

More information

Advanced Accounting Software & Secure Internet Solutions. Advanced Security Administrator Reference Manual

Advanced Accounting Software & Secure Internet Solutions. Advanced Security Administrator Reference Manual Advanced Accounting Software & Secure Internet Solutions Advanced Security Administrator Reference Manual Version 7.3 Information in this document is subject to change without notice and does not represent

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

Running Network Services under User-Mode

Running Network Services under User-Mode Running Network Services under User-Mode Linux, Part I Mick Bauer Abstract Leverage the Linux kernel's virtualization features to isolate network dæmons. In my May 2006 Paranoid Penguin column, I expounded

More information

Security Design in. Avaya Aura Presence Services. Release 5.2. Issue 1

Security Design in. Avaya Aura Presence Services. Release 5.2. Issue 1 Security Design in Avaya Aura Presence Services Release 5.2 Issue 1 November 2009 2009 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

CIS Distribution Independent Linux

CIS Distribution Independent Linux CIS Distribution Independent Linux v1.0.1-01-31-2017 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

HIPAA Compliance Assessment Module

HIPAA Compliance Assessment Module Quick Start Guide HIPAA Compliance Assessment Module Instructions to Perform a HIPAA Compliance Assessment Performing a HIPAA Compliance Assessment 2 HIPAA Compliance Assessment Overview 2 What You Will

More information

IPM Secure Hardening Guidelines

IPM Secure Hardening Guidelines IPM Secure Hardening Guidelines Introduction Due to rapidly increasing Cyber Threats and cyber warfare on Industrial Control System Devices and applications, Eaton recommends following best practices for

More information

SCAP Security Guide Questions / Answers. Contributor WorkShop Volume #2

SCAP Security Guide Questions / Answers. Contributor WorkShop Volume #2 SCAP Security Guide Questions / Answers Contributor WorkShop Volume #2 Ján Lieskovský January 2016 Agenda Introductory Notes Source Code / Repository Notes (Moved to Appendix for self-study) SCAP Security

More information

System Hardening From concepts into details

System Hardening From concepts into details System Hardening From concepts into details Marcus Meissner Technical Project Manager Security meissner@suse.com Craig Gardner Engineering Lead Storage cgardner@suse.com Hardening Top Down 2 What is Security?

More information

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions 1Z0-100 Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-100 Exam on Oracle Linux 5 and 6 System Administration2 Oracle 1Z0-100 Certification

More information

Keys and Passwords. Steven M. Bellovin October 17,

Keys and Passwords. Steven M. Bellovin October 17, Keys and Passwords Steven M. Bellovin October 17, 2010 1 Handling Long-Term Keys Where do cryptographic keys come from? How should they be handled? What are the risks? As always, there are tradeoffs Steven

More information

A Security State of Mind: Container Security. Chris Van Tuin Chief Technologist, West

A Security State of Mind: Container Security. Chris Van Tuin Chief Technologist, West A Security State of Mind: Container Security Chris Van Tuin Chief Technologist, West cvantuin@redhat.com AGENDA Why Linux Containers? CONTAINER What are Linux Containers? APP LIBS Container Security HOST

More information

Red Hat Enterprise Linux 6 Security Feature Overview. Steve Grubb Principal Engineer, Red Hat June 23, 2010

Red Hat Enterprise Linux 6 Security Feature Overview. Steve Grubb Principal Engineer, Red Hat June 23, 2010 Red Hat Enterprise Linux 6 Security Feature Overview Steve Grubb Principal Engineer, Red Hat June 23, 2010 Overview Minimal Platform Install Libcap-ng OpenSCAP FIPS-140 Stronger Hashes Common Criteria

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Secure coding practices

Secure coding practices Secure coding practices www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process Outsourcing Secure coding practices Writing good code is an art but equally important

More information

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers Xerox FreeFlow Print Server Security White Paper Secure solutions for you and your customers Executive Summary Why is security more important than ever? New government regulations have been implemented

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path Race conditions NOTE: filenames may differ between OS/distributions Principals

More information

Disks, Filesystems, Booting Todd Kelley CST8177 Todd Kelley 1

Disks, Filesystems, Booting Todd Kelley CST8177 Todd Kelley 1 Disks, Filesystems, Booting Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 sudo and PATH (environment) disks partitioning formatting file systems: mkfs command checking file system integrity:

More information