Top Banner
17

Andrew kozma - security 101 - atlseccon2011

Feb 07, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Andrew kozma - security 101 - atlseccon2011
Page 2: Andrew kozma - security 101 - atlseccon2011

Security 101Principles Models & Concepts

Andrew Kozma

Sr. Security Administrator

Capital District Health Authority

Page 3: Andrew kozma - security 101 - atlseccon2011

Defense In Depth

• Originally a military model used to slow the progress of an attacker

• The building up, layering on and overlapping of security measures

• Should one defensive measure fail there are other defensive measures

in place that continue to provide protection

• The strength of any system is no greater than its weakest link

Figure. 1

Page 4: Andrew kozma - security 101 - atlseccon2011

The OSI Model – Open Systems Interconnect

• An industry standard model

• Defines the framework for

implementing protocols into seven

layers

•A hierarchal model where the layer

below supports the layer above it

• Security services can be added to

individual layers to support the

defense in depth principle

Figure. 2

Page 5: Andrew kozma - security 101 - atlseccon2011

The Physical Layer

• Classify your data

• If it is important lock it up!

• Servers that house sensitive data should be behind a locked door with

controlled access

• If an attacker has physical access they own it…. period

Page 6: Andrew kozma - security 101 - atlseccon2011

Data Link Layer

• Media Access Control (MAC Address)

• ARP – Address Resolution Protocol

• Threat = ARP Poisoning

• MAC Flooding – Targets switching infrastructure

• Man In the Middle – Intercept traffic destined for another host

• DOS – Direct traffic to “Nowhere”

• Mitigation = Network Access Control (NAC)

Page 7: Andrew kozma - security 101 - atlseccon2011

The Network Layer

• Provides routing services and is the home to routable protocols (IP)

• ICMP – Evaluate the requirements, manage this at select gateways as

required.

• Enumeration – OS Detection, port scanning, sniffing

• Traditional firewalls

• Intrusion Detection Services

• Intrusion Prevention Services

Page 8: Andrew kozma - security 101 - atlseccon2011

Securing the Host Layers

The landscape is changing, users are now more mobile and portable than

ever before.

• Endpoint protection

• Anti Virus

• Client Side Firewalls with IPS

• Encryption Services

• Software updates

• Microsoft WSUS

• Application updates, flash player

• The model of trusted and untrusted networks is blurring.

Page 9: Andrew kozma - security 101 - atlseccon2011

The Human Factor

• The user community historically is the weakest link

• Raising awareness - Educate your user community, build the “Human

Firewall”

• Incident response - Know what to do when something goes wrong

• Who needs to know

• When do they need to know it

Page 10: Andrew kozma - security 101 - atlseccon2011

The Importance Of Logging

• At a minimum enable logging. If there are too many consider event log

correlation and management solutions

• Historical data will be required for forensic analysis in the event of a data

breach or a disruption in service

• Maybe required to provide information to law enforcement

• If you don‟t know what happened how can you prevent it from happening

again?

Page 11: Andrew kozma - security 101 - atlseccon2011

The Security Life Cycle

• Security is not just at the perimeter

• Security is a process not a product

Page 12: Andrew kozma - security 101 - atlseccon2011

Aligning Security With The Business

Balance security with cost

• Risk analysis

• Project Management

Compliancy and policy

• SOX

• HIPPA

• PHIA

• PIPEDA

Page 13: Andrew kozma - security 101 - atlseccon2011

Lessons Learned

• Have to be right all of the time, the bad guys only needs to be right once

• Multiple vendor solutions can be complex and can increase

administration requirements

• Defense in depth is not a security blanket, be careful not to buy the

latest and greatest technology for multiple layers

• Multiple management domains, not necessarily a single pane of glass

• Select a few solutions but know them well

• Meet with vendors often to review implementation and services

Page 14: Andrew kozma - security 101 - atlseccon2011

Lessons Learned

• Good enough is not good enough anymore

• Stay current

• Training, instructor led, online, webcasts *(EC Council first look)

• research new technologies

• read vendor reports

• Meet with vendors

• Share your knowledge, mentor and be mentored

• Attend ATLSECCON „12

Page 15: Andrew kozma - security 101 - atlseccon2011

Summary

• Align security with business

• Develop policy

• Maintain compliance

• Strive for Continuous improvement

• Manage - Security is a process not a product

• Measure - Vulnerability assessments

Page 16: Andrew kozma - security 101 - atlseccon2011

Summary

• Monitor – Baseline and know the behavior of your environment

• Alert - Notify on changes and anomalies

• Log & Report - Know your security posture, audit and prove compliance

Page 17: Andrew kozma - security 101 - atlseccon2011

Questions?