Linux Systems Security. Backup and Change Management NETS Fall 2016

Similar documents
Course 55187B Linux System Administration

This is Worksheet and Assignment 12. Disks, Partitions, and File Systems

Exam LFCS/Course 55187B Linux System Administration

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

"Charting the Course... MOC B: Linux System Administration. Course Summary

Installation of the OS

Ellipse Support. Contents

Disks, Filesystems 1

Lab E2: bypassing authentication and resetting passwords

CST8207: GNU/Linux Operating Systems I Lab Nine Disks, Partitions, and File Systems Part 2. Disks, Partitions, and File Systems - Part 2 of 2

How to Dual-Boot OS X and Ubuntu

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

CIS UNIX System Administration

Disks, Filesystems Todd Kelley CST8177 Todd Kelley 1

Adding a block devices and extending file systems in Linux environments

NASA Lab. Partition/Filesystem/Bootloader. TinRay, Yu-Chuan

Fedora Linux Installation Guide

CIS 191A Final Exam. Fall CIS 191 Final Exam

CompTIA Linux Course Overview. Prerequisites/Audience. Course Outline. Exam Code: XK0-002 Course Length: 5 Days


client X11 Linux workstation

This section describes the procedures needed to add a new disk to a VM. vmkfstools -c 4g /vmfs/volumes/datastore_name/vmname/xxxx.

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

Veritas System Recovery 18 Linux Edition README

Linux Installation. Prepared by: William Zereneh

1 LINUX KERNEL & DEVICES

Prerequisites: General computing knowledge and experience. No prior knowledge with Linux is required. Supported Distributions:

Build your own NAS with OpenMediaVault

RocketRAID 2680/2684 SAS Controller Red Hat Enterprise/CentOS Linux Installation Guide

Fedora Linux Installation Guide

How to securely isolate Damn Vulnerable Linux with VirtualBox

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Ubuntu - How to Create Software RAID 1 in Ubuntu Linux - Tutorial

RocketRAID 231x/230x SATA Controller Fedora Linux Installation Guide

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB

UUID and R1Soft. What is a UUID and what is it used for?

RocketRAID 231x/230x SATA Controller Red Hat Enterprise/CentOS Linux Installation Guide

Deploying Cisco UCS Central

RocketRAID 2522 SATA Controller Ubuntu Linux Installation Guide

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage

"Charting the Course... Enterprise Linux System Administration Course Summary

Chapter 6. Linux File System

Linux Systems Security. Security Design NETS Fall 2016

Guideline for the installation of C-MOR Video Surveillance Virtual Machine on VMware ESX Server

CompTIA Linux+ Guide to Linux Certification Fourth Edition. Chapter 2 Linux Installation and Usage

OPS235. Linux File Systems Partitioning Mounting File Systems

This line defines Therefore, if your windows entry on the GRUB menu is 8 you should set this value to 7.

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit?

(Ubuntu 10.04), the installation command is slightly different.

System Administration for Beginners

DUAL OS INSTALLATION

How To Resize ext3 Partitions Without Losing Data

System Manager Unit (SMU) Hardware Reference

SAP HANA Restore Guide (for A2040c SLES) 22 nd of April 2016 NEC SAP Global Competence Center

LPI201 LPIC-2 Exam Prep (Course 1) (LPI201) HL965S

Kernel Korner IBM's Journaled Filesystem

Short Read Sequencing Analysis Workshop

Insight Control Server Provisioning Capturing and Installing SUSE Enterprise Linux 12 System Images

LiLo Crash Recovery. 1.0 Preparation Tips. 2.0 Quick Steps to recovery

Zadara Enterprise Storage in

Efficiently Backing up Terabytes of Data with pgbackrest

How To Reinstall Grub In Windows 7 With Cd Rom

RocketRAID 231x/230x SATA Controller Debian Linux Installation Guide

SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting

Ubuntu Linux Installation Guide

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

Performing Administrative Tasks

Enterprise Linux System Administration

Cross-compilation with Buildroot

RocketRAID 2310/2300 Controller Fedora Linux Installation Guide

Rio-2 Hybrid Backup Server

Changing user login password on templates

Linux+ Guide to Linux Certification, Third Edition

Arch Linux with an SSD Cache using LVM on BCache. Jeremy Runyan

Data Domain OpenStorage Primer

How To Reinstall Grub In Windows 7 With Cd Bootcamp Partition

Exam Actual. Higher Quality. Better Service! QUESTION & ANSWER

How To Reinstall Grub In Windows 7 Without Cd Dell

Disks, Filesystems, Booting Todd Kelley CST8177 Todd Kelley 1

File Protection using rsync. Setup guide

Chapter 6. Boot time configuration. Chapter 6 Boot time configuration

2018/04/11 18:35 (UTC) 1/13 UEFI dual or more boot using refind

Operating Systems Linux 1-2 Measurements Background material

(32 KB) 216 * 215 = 231 = 2GB

SECURE CLOUD BACKUP AND RECOVERY

MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September Leaders Have Vision visionsolutions.com 1

SAP HANA Backup Guide (for Ivy-Bridge Model)

Data Integrity: Backups and RAID

Oracle VM Server Recovery Guide. Version 8.2

TECHNICAL WHITE PAPER

rsync link-dest Local, rotated, quick and useful backups!

MINI-HOWTO backup and/or restore device or partition using zsplit/unzsplit

Principles of System Administration. Jan Schaumann

Linux Manually Mount External Hard Drive Ntfs 3g Could Not

Linux Manually Mount External Hard Drive Ntfs-3g Could Not

ABOUT ZEPCAM SOFTWARE INSTALLATION MANAGEMENT AND BACKUPS. Description What is it Installation requirement Server requirement

Cloning and Repartitioning sessionmgr Disks

As this method focuses on working with LVM, we will first confirm that our partition type is actually Linux LVM by running the below command.

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Transcription:

Linux Systems Security Backup and Change Management NETS1028 - Fall 2016

Backup Security breaches can cast doubt on entire installations or render them corrupt Files or entire systems may have to be recovered from backup Many tools are available to help with this task in Linux Two of the more commonly used ones are rsync and duplicity https://en.wikipedia.org/wiki/rsync http://duplicity.nongnu.org/features.html

Legacy Tools cp is the original way to make a copy of a file, many limitations cpio, tar are archival tools created to copy files to backup media (tape by default) - satisfactory for years but they make it cumbersome to manage backup media Various software packages provide frontends to these tools in order to make backup/restore easier to manage and more robust

Rsync Rsync has a command line interface which resembles a smart cp, and provides a base for many backup software packages with GUIs Can preserve special files such as links and devices Can copy to or from local or remote destinations Provides standby device capability by synchronizing data stores

Rsync Can compress data in transit to save bandwidth It only sends changed data when source file is not compressed or encrypted, otherwise entire file is transmitted Can use ssh to encrypt remote backup transfers without requiring encryption of backup storage Lighter on bandwidth, heavier on cpu and memory Requires rsync be available at both ends of the connection if used over the network

Rsync Examples Simple local archive of user data rsync -ahv --delete ~/* /backup/username rsync -ahv --delete --exclude=~/mybackup ~/* ~/mybackup Local archive with history date=$(date "+%F-%H-%M") rsync -ahv --link-dest=/backup/current --delete --exclude={/proc/*,/tmp/ *,/run/*,/dev/*,/sys/*,/mnt/*,/lost+found,/media/*,/backup} /* /backup/ $date && ln -nsf /backup/$date /backup/current Remote archive with history date=$(date "+%F-%H-%M") rsync -ahv --link-dest=/backup/current --delete --exclude={/proc/*,/tmp/ *,/run/*,/dev/*,/sys/*,/mnt/*,/lost+found,/media/*,/backup} --rsh="ssh - l ssh-login-user" /* rsync-user@host:/backup/$date && ssh user@host ln -nsf /backup/$date /backup/current

Rsync Exercises Create a VM for a backup server with a minimum OS and add a drive with enough space to hold your ubuntu vm backup (probably about 6GB will do), put a filesystem on it and mount it on /backup Enable ssh root access to backup server vm either with password, or using keys from your ubuntu machine (modify sshd_config to allow root with password is easiest for the purpose of the lab exercise but not a good idea for production use) Run a remote rsync backup from your ubuntu machine to the backup server vm similar to the example from the slide Wait a while and rerun the backup to see how much additional data got transferred Examine the /backup filesystem on your backup server vm to see what it looks like (use df, ls -l)

Rsync Restore Restoration of user data can be done using rsync command to copy data from backup location Can be copied to user staging or live data location If you know you are only dealing with regular files, you can even just use cp since the backup filesystem is a synchronized duplicate of the original filesystem System recovery requires additional tasks to be performed to deal with the boot block Rsync the backup to a new drive Install the boot block using GRUB on the new drive Install the new drive and boot from it

Rsync Full System Restore On the backup server, build an ext4 filesystem on a new disk (e.g. fdisk /dev/sdb and create your partitions, then mkfs -t ext4 /dev/sdb1) and mount the new filesystem (e.g. mkdir /r ; mount /dev/sdb1 /r) rsync -a /wherever-your-backup-is /r Use blkid to get the uuid of the new disk and modify /r/etc/fstab to use the new uuid for the root filesystem Boot from the distribution media and select rescue mode Select the option to rescue a broken system and tell it to rebuild the grub boot loader, then reboot If you get dropped to a shell (probably will), do: mkdir /r mount /dev/sda1 /r mount --bind /proc /r/proc ; mount --bind /dev /r/dev ; mount --bind /sys /r/sys chroot /r grub-mkconfig > /boot/grub/grub.cfg Exit the chroot shell, unmount everything you mounted, and reboot

Duplicity Like rsync but does not require duplicity on the receiving backup host, stores metadata with backup Can use many different types of backend storage, including Amazon S3, although they require additional backend packages and configuration effort Encrypts tarballs as a storage mechanism, stores deltas in separate tarballs, may have more steps involved in recovery Written in python, heavier on bandwidth, lighter on cpu and memory, reimplements ssh in python duplicity /what/to/backup sftp://user@host/backup/directory

Other Backup Solutions Many GUI frontends to the rsync, duplicity, and tar cli tools Backintime, DejaDup, CronoPete, Timeshift, Duplicati Bacula, Amanda Mondo Rescue for disaster recovery

Change Management

Change Management Implementing and maintaining security is a continuous process, these activities cause changes to your systems It has been said that problems created when implementing changes cause approximately 3/4 of all outages ITIL (Information Technology Information Library) includes change management as part of its service management best practices, ISO 20000 also covers change management It involves setting up advisory boards and creating formal processes for implementing changes

ITIL Information Technology Information Library Created by the UK government in the 1980s A set of documents describing best practices for service management in the digital world Originally 30+ reference books, now 5 Most recently updated in 2011 Not the only way to manage change but has ties to ISO 20000 which makes it a good candidate for larger organizations concerned about standards for management

ITIL Vol. 3, Service Transition Volume 3 of ITIL includes change management Goals include minimal service disruption, back-out activity reduction, and economical resource usage to accomplish change 3 types of change might include rollout, normal change, and urgent/emergency change - organization dependent https://en.wikipedia.org/wiki/itil#change_management

Change Process Change requests can be used to document change purpose, justification, impacts, activities, risks, not all parts may be present at the start of the process Change advisory board evaluates requests and provides management approval/denial, including funding approval - may also be where activities and risks get defined Change activities include tasks to execute, but also describe testing and validation tasks

Testing and Validation Ideally changes are validated and tested before deployment in production Testing may be done in-house, or delegated Security patches are often considered tested when released by vendors Testing includes verifying the change achieved the stated goals without unexpected impacts - virtual machines are good ways to do testing and validation