Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy...

54
Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services

Transcript of Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy...

Page 1: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Security for Privacy Professionals

IAPP Privacy Futures

Jeff Williams, MBA/TM CISSP IAM

Privacy Officer, Microsoft Services

Page 2: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

You cannot ensure privacy if you don’t first have security

Axiom

Page 3: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Security Operating Security Operating PrinciplesPrinciples

Corporate Security Corporate Security Mission and VisionMission and Vision

Security StrategySecurity Strategy

Risk-Based Decision ModelRisk-Based Decision Model

Tactical PrioritizationTactical Prioritization

Page 4: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Mission

Assess Risk

Define Policy

Monitor

Audit

Prevent malicious or unauthorized use that results in the loss of intellectual property or productivity by systematically assessing, communicating, and mitigating risks to digital assets

Page 5: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Vision

• Five Trustworthy Assurances– My identity is not compromised– Resources are secure and available– Data and communications are private– Roles and accountability are clearly defined– There is a timely response to risks and threats

An IT environment comprised of services, applications, and infrastructure that implicitly provides availability, privacy, and security to any client

Page 6: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Operating Principles

• Management commitment– Manage risk according to business objectives– Define organizational roles and responsibilities

• Users and data– Manage to practice of least privilege– Strictly enforce privacy and privacy rules

• Application and system development– Build security into development life cycle– Create layered defense and reduce attack surface

• Operations and maintenance– Integrate security into operations framework– Align monitor, audit, and response functions to operational functions

Page 7: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Security Landscape

Page 8: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

State of the Nation

• Security problems are growing• Total financial losses double 2002 levels• Most organizations are not yet equipped to

deal with security threats • Growth of the external threat• New and evolving threats• 95% of security issues could have been

avoided if systems were properly configured and patched

CERT 2003: Computer Crime Survey

Page 9: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

What you may not have known…

• DDoS extortion can pay $50k+ per incident– Costs very little < $1000

• The “Really Bad People” pay “ethically challenged” techies to do their dirty work– Execute DDoS, write bots, code exploits, provide ‘zero-

day’ exploit information, compromise specific systems– Anonymous payments via Paypal etc.– No questions asked

• Spam pays too– AOL gave away the Porsche Boxster confiscated from

a convicted Spammer– How much has been pocketed by how many?

• Who paid them?

Page 10: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Understanding the Landscape

Author

National InterestNational Interest

Personal GainPersonal Gain

Personal FamePersonal Fame

CuriosityCuriosity

Script-KiddieScript-Kiddie HobbyistHobbyistHackerHacker

ExpertExpert SpecialistSpecialist

Vandal

Thief

Spy

Trespasser

Page 11: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

An Evolving Threat

National InterestNational Interest

Personal GainPersonal Gain

Personal FamePersonal Fame

CuriosityCuriosity

HobbyistHobbyistHackerHacker

ExpertExpert SpecialistSpecialist

Largest Largest area by area by volumevolume

Largest area by $ Largest area by $ lostlost

Script-KiddieScript-Kiddie

Largest segment Largest segment by by $ spent on $ spent on defensedefense

Fastest Fastest growingrowing g segmensegmentt

AuthorVandal

Thief

Spy

Trespasser

Page 12: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Security is nothing more than Managing Risk

Page 13: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Enterprise Risk Model

High

Low High

Imp

act

to

Bu

sin

es

s(D

efin

ed b

y B

usi

nes

s O

wn

er)

Low

Acceptable RiskAcceptable Risk

Unacceptable RiskUnacceptable Risk

Probability of Exploit(Defined by Corporate Security)

Risk assessment drives Risk assessment drives to acceptable riskto acceptable risk

Page 14: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Risk Analysis by Asset Class

Exploit of misconfiguration, buffer overflows, open shares, NetBIOS attacks HostHost

Unauthenticated access to applications, unchecked memory allocations

ApplicationApplication

Compromise of integrity or privacy of accounts

AccountAccount

Unmanaged trusts enable movement among environments

TrustTrust

Data sniffing on the wire, network fingerprinting

NetworkNetwork AssetsAssets

Page 15: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Components of Risk Assessment

Asset Threat

Impact

Vulnerability Mitigation

Probability

++

==

What are you trying toassess?

What are you afraid of

happening?

What is the impact to the

business?

How could the threat occur?

What is currently

reducing the risk?

How likely is the threat giventhe controls?

Current Level of Risk

What is the probability that the threat will overcome controls to successfully exploit the

vulnerability and affect the asset?

Page 16: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Risk Management Process and Roles

33 44

SecuritySolutions &Initiatives

Sustained Operations

Cross-IT Teams

Corporate Security

TacticalPrioritization

11

PrioritizeRisks

22

Security Policy

55

Compliance

Page 17: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Risk Assessment

• Can’t eliminate risk

• Three things we can do– Accept– Mitigate– Transfer

• Security policy helps determine which

Page 18: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Risk mitigation

Preventing

Detecting

Responding

Each builds on the previous…

Page 19: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Risk Computation

• Useful formula

• If any term is zero, risk is zero

• Balance cost of attack vs. cost to secure

• Remember your soft costs

• Don’t forget liability– Eve hacks Alice, uses Alice to hack Bob; Bob

sues Alice for failure to maintain security. Civil only; whose laws apply?

• Factor in cost to repair reputation

R = T × V × E

Page 20: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

How to Compromise a System

1. Port scan—what’s listening

2. Sniff traffic—URLs, clear text passwords

3. Launch scripts to probe for vulnerabilities

4. Run a privilege escalation attack

5. Infect; leave backdoors

6. Cover tracks in the logs

7. Get out

Page 21: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Trojans, Viruses, Bots and Worms

• Multiple delivery mechanisms

• Run in context of logged on user

• Send personal data to attackers

• Send malicious data to attack others

• Open holes for access from Internet

• Backups won’t help if not clean

Page 22: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Document the threats

• Documenting threats to your systems is difficult– What kinds of things can go wrong?– How can an attacker take advantage of your

network?

• You must think like an attacker – What are the juicy bits of data?– What do they want to do with your

environment?

• Evaluate chains– If item A occurs then item B can occur…

Page 23: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Fault Trees

• Demonstrate logical paths through a system• Used to highlight faults in a system• Points out relationships between faults• Allow us to estimate the interactions

between faults

Page 24: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Defense in Depth• Using a layered approach:

– Increases an attacker’s risk of detection – Reduces an attacker’s chance of success

Policies, Procedures, & Awareness

Policies, Procedures, & Awareness

OS hardening, patch management, authentication, HIDS

Firewalls, VPN quarantine

Guards, locks, tracking devices

Network segments, IPSec, NIDS

Application hardening, antivirus

ACL, encryption, Rights Management

User education

Physical SecurityPhysical Security

PerimeterPerimeter

Internal NetworkInternal Network

HostHost

ApplicationApplication

DataData

Page 25: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Defenses

• Defense in depth– Networks– Hosts– Applications– Users

Page 26: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Network Defenses

• Border router– Ingress and egress filtering

• Firewalls– Is high availability a business requirement?

• Authentication– Check credentials before allowing through

• Encryption– VPNs, IPSec ESP tunnel mode

• Not just perimeter, though...– Can do all this between logical and business security

zones, too

Page 27: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Host Defenses

• Updated anti-virus, hotfixes, service packs• Control security settings and software

distribution/installation with group policy• Authenticated connections

– IPSec AH, 802.1x

• Encrypted sessions– IPSec ESP transport mode

• Restricted connections, in and out– IPSec filtering, ICF

• File Integrity monitoring

Page 28: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

The art of patching without patching

Turn stuff off!…or don’t install it in the first place

Page 29: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Application Defenses

• Encrypted communications– SSL/TLS, S/MIME

• Signed communications– S/MIME, code signing

• Authorization– Fine for public services– Must do this if you need to know who

• Strong security development practices

Page 30: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Defense Against Users

• Principle of least privilege (POLP)– Users aren’t local administrators– Trust those who are admins, though– Configure trust relationships only where there is a

business need– Appropriate access lists and rights, again following

business needs

• Don’t read e-mail with admin account

Page 31: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Technologies

• Prevention– Internet Connection Firewall– IPSec (encryption, authentication, filtering)– ISA Server (rules and filters)– Distribution of current updates

• Group policy• Corporate Windows Update• Systems Management Server

Page 32: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Technologies

• Detection– Security logging and auditing– Port scanning– NetMon from SMS– Microsoft Operations Manager– ISA Server (IDS and honeypot)

Page 33: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Non-technologies

• Response– People and processes– You need a plan. Period

Page 34: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

10 Things Attackers Don’t Want You To Do

1. Ensure everything is fully patched2. Use strong pass phrases3. Open only necessary holes in firewalls 4. Harden servers 5. Use properly hardened applications6. Use least privilege7. Restrict outbound traffic8. Restrict internal traffic9. Micro-manage service accounts10. Maintain a healthy level of paranoia

Page 35: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

This document is provided for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.

© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, MSN, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Page 36: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Appendix

Page 37: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Organizational: directed to management’s commitment to risk management and security awareness

•Manage risk according to business objectives•Define organizational roles and responsibilities•Invest in secure design•Commit to secure operations

Users and data: includes authentication, user privacy, and data authorization

•Manage to practice of least privilege•Base decision on data classification and fair use•Enforce privacy and privacy rules•Ensure data integrity•Monitor identity assurance•Build in availability

Application and system development: dedicated to the design and development of secure systems

•Build security into the life cycle•Design defense in depth•Reduce attack surface•Keep it simple

Operations and maintenance: people, processes, and technology to build, maintain, and operate secure systems

•Plan for system maintenance•Enforce security configuration and hardening•Monitor and audit•Practice incident response•Verify disaster recovery

SecuritySecurityCategory Security Principle

Page 38: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Most Common Risks

• Poor password management

• Weak account management processes

• Unsecured and unmanaged remote computers

• Poorly configured and unpatched systems

• Weak auditing and monitoring processes

• Inadequately restricted access to critical information

Page 39: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Network Security Hardening

• Default OS configuration is acceptable for a trusted network– Windows 2000 is very open by default– Windows Server 2003 is much more secure

• Still room for improvement

– Application hardening is critical• Same rules apply as for platform

Lemma: You cannot design an optimal security configuration without a thorough understanding of the usage pattern of a system

Page 40: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Threat Modeling

• Understanding and communicating the threats to your environment

• Commonly used in application design

• Writing Secure Code 2nd Ed.

• Can also be applied to networks

Page 41: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Best Practices• Document

– Model applications and services– Environment dependent

• Segregate– Applications– Security requirements

• Restrict– Disable services– Close ports

• Use IPSec or RRAS filters– Use different passwords

Page 42: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Document

• Purpose is to communicate what the environment looks like

• Use well understood modeling techniques– Modified Data flow diagrams– Threat trees– Verbose documentation

Page 43: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Model The NetworkInternet

Domain Controller

Client

Corporate Domain Controller

Corporate Clients

Client

Web Farm 2 Web Farm 1 SQL ClusterVPN Server

SQL Cluster

Corp Servers

Page 44: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Superimpose a DFDInternet

Domain Controller

Client

Corporate Domain Controller

Corporate Clients

Client

Web Farm 2 Web Farm 1 SQL ClusterVPN Server

SQL Cluster

Corp Servers

Page 45: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Segregate

• Segregate systems by application and security requirements

• Should you trust systems that are not part of your application?– Which systems do they trust?– What are their security requirements?

• Less sensitive systems may depend on more sensitive systems

• More sensitive systems MUST NEVER depend on less sensitive systems

Page 46: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Network Segmentation

Page 47: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Documenting Segments

Domain Controller

Corp Servers Corp ClientsCorp DCs

Internet Client

Web F

arm 1

SQ

L Cluster 1

Web F

arm 2

SQ

L Cluster 2 VPN

Domain Controller

1433

DC Traffic

DC Traffic

DC traffic

80, 443

443

1433 3389

3389

3389

Term Serv

Term Serv3389

3389

1723

1433

DC traffic DC traffic

DC traffic

DC traffic

DC traffic

DC traffic

3389

DC Traffic

Page 48: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Restrict

• Policies allow nothing but…– Disable unnecessary services– Remove users– Restrict privileges– Turn on security tweaks– Remove permissions– Set very strong passwords

• Restrict communications– IPSec– RRAS filters

Page 49: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Trust Boundaries

• Systems and entities you trust are included within your trust boundary

• Should your trust boundary include databases?– It depends

• Who writes to them?• Do you trust those systems?

– If you trust the systems that write to the database you may still not want to trust the database

• Is it secure?

Page 50: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Trust Boundaries

Internet Client

Web F

arm

1

SQL 1

Domain Controller

1433

DC TrafficDC Traffic

80, 443

Trust Boundary

Staging Server

445

1433

Page 51: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Conclusion

• Prevention is less costly than reacting to incidents

• Enterprises should develop a system of security audits, system scans, and remediation steps and educate users about protecting their systems

• Impact to systems is reduced by having a detailed, well-rehearsed, and flexible incident response plan

Page 52: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Best Practices

• Upgrade from any unsupported OS• Prioritize according to risk assessment• Establish service management framework• Start with a pilot project in a small, controlled area• Anticipate evolutionary changes in technology• Actively manage employee education and

communication• Consider network bandwidth constraints• Train end users to identify virus behavior and proper

response• Stay secure and informed

Page 53: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Conclusion

• Network security is difficult• Hardening networks requires

understanding the environment– Optimal hardening requires deep

understanding• There is a fundamental tradeoff between

security and usability• Three-phase approach to network

hardening– Document– Segregate– Restrict

Page 54: Security for Privacy Professionals IAPP Privacy Futures Jeff Williams, MBA/TM CISSP IAM Privacy Officer, Microsoft Services.

Other Resources

Technical information

Microsoft Security Best Practiceshttp://www.microsoft.com/technet/security/bestprac.asp

MBSAhttp://www.microsoft.com/technet/security/tools/Tools/mbsahome.asp

Attend a free chat or web casthttp://www.microsoft.com/communities/chats/default.mspx http://www.microsoft.com/usa/webcasts/default.asp

List of newsgroupshttp://communities2.microsoft.com/communities/newsgroups/en-us/default.aspx

Security Guidance And Training

Windows 2000 Security Hardening Guidehttp://www.microsoft.com/technet/security/prodtech/Windows/Win2kHG/default.asp

Windows Server 2003 Security Guidehttp://go.microsoft.com/fwlink/?LinkId=14846

Windows XP Security Guidehttp://go.microsoft.com/fwlink/?LinkId=14839

Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XPhttp://go.microsoft.com/fwlink/?LinkId=15159

Microsoft Guide to Security Patch Managementhttp://www.microsoft.com/technet/security/topics/patch/default.asp