CS 356 - Lecture 25 and 26 Operating System Security: Spring 2013
CS 356 - Lecture 25 and 26 Operating System Security: Spring 2013
Spring 2013
Review
• Chapter 1: Basic Concepts and Terminology
• Chapter 2: Basic Cryptographic Tools
• Chapter 3 – User Authentication
• Chapter 4 – Access Control Lists
• Chapter 5 – Database Security (skipped)
• Chapter 6 – Malicious Software
• Networking Basics (not in book)
• Chapter 7 – Denial of Service
• Chapter 8 – Intrusion Detection
• Chapter 9 – Firewalls and Intrusion Prevention
• Chapter 10 – Buffer Overflow
• Chapter 11 – Software Security
• Chapter 12 – OS Security
Chapter 12
Operating System
Security
Operating System
Security Layers
Measures
• the 2010 Australian Defense Signals Directorate
(DSD) list the “Top 35 Mitigation Strategies”
• over 70% of the targeted cyber intrusions
investigated by DSD in 2009 could have been
prevented
• the top four measures for prevention are:
– patch operating systems and applications using auto-
update
– patch third-party applications
– restrict admin privileges to users who need them
– white-list approved applications
Operating System Security
• possible for a system to be compromised during the
installation process before it can install the latest
patches
• building and deploying a system should be a planned
process designed to counter this threat
• process must:
– assess risks and plan the system deployment
– secure the underlying operating system and then the key
applications
– ensure any critical content is secured
– ensure appropriate network protection mechanisms are
used
– ensure appropriate processes are used to maintain
security
System Security Planning
should stage
system and validate all
security begins patches on the
with the test systems
installation of initial installation before
should install the overall boot
the operating minimum process must deploying them
system necessary for the
desired system
also be secured
in production
is a key
enabling
technology
that may be if secure network
cryptographic
used to services are file systems are
secure data must be provided using another use of
if secure network encryption
both in configured TLS or IPsec services are
transit and and suitable public and provided using
private keys must SSH, appropriate
when stored appropriate server and client
cryptographic be generated for keys must be
keys created, each of them created
signed, and
secured
Security Maintenance
• process of maintaining security is
continuous
• security maintenance includes:
– monitoring and analyzing logging information
– performing regular backups
– recovering from security compromises
– regularly testing system security
– using appropriate software maintenance
processes to patch and update all critical
software, and to monitor and revise
configuration as needed
automated can only inform you
analysis is about bad things
preferred that have already
happened
Logging
range of data acquired should key is to ensure you
be determined during the capture the correct
system planning stage data and then
information appropriately monitor
can be and analyze this data
generated
by the
system,
network and
applications
Data Backup and Archive
application virtualization
full virtualization
allows
applications
written for one
environment to virtual machine monitor (VMM)
execute on some multiple full
other operating operating system
system instances execute
in parallel coordinates access between
hypervisor each of the guests and the actual
physical hardware resources
Native Virtualization Security Layers
Hypervisor/ VMM
BIOS / SMM
Physical Hardware
Guest O/S 1
... Guest O/S n
Other Kernel Kernel
User Apps
Hypervisor/ VMM
Physical Hardware
access must
be limited to
just the
appropriate
guest
systems manage
access to hardware
resources
Summary
• system security planning • Linux/Unix security
• operating systems hardening – patch management
– initial setup and patching – application configuration
– remove unnecessary services – users, groups, permissions
– configure users and groups – remote access
– test system security – security testing
• application security • windows security
– application configuration – patch management
– encryption technology – users administration and access
– security maintenance controls
– data backup – application and service
– virtualization security configuration
– security testing
• virtualization alternatives