Automating Endpoint Security Policy Enforcement

13
Automating Endpoint Automating Endpoint Security Policy Security Policy Enforcement Enforcement Computing and Networking Services University of Toronto

description

Automating Endpoint Security Policy Enforcement. Computing and Networking Services University of Toronto. Unmanaged ‘Endpoints’. Systems not proactively managed by University IT staff: 7000 student residents – Sept & Jan overload. 12000 active unique wireless user accounts. - PowerPoint PPT Presentation

Transcript of Automating Endpoint Security Policy Enforcement

Page 1: Automating Endpoint Security Policy Enforcement

Automating Endpoint Security Automating Endpoint Security Policy EnforcementPolicy Enforcement

Computing and Networking Services University of Toronto

Page 2: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Unmanaged ‘Endpoints’Unmanaged ‘Endpoints’Systems not proactively managed by University IT staff:Systems not proactively managed by University IT staff:

7000 student residents – Sept & Jan overload.7000 student residents – Sept & Jan overload.12000 active unique wireless user accounts.12000 active unique wireless user accounts.

Subject to:Subject to:Missing OS updates, missing/expired AV protection, Missing OS updates, missing/expired AV protection, unsupported/pirated OS/SP.unsupported/pirated OS/SP.Already compromised – spyware, V / W / T. Already compromised – spyware, V / W / T.

Page 3: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Automation FrameworkAutomation Framework

Network IsolationNetwork Isolation

VulnerabilityVulnerability

DetectionDetection RemediationRemediation

Missing Patches ↔ user - WindowsUpdateMissing Patches ↔ user - WindowsUpdate

… ↔ … … ↔ …

CompromiseCompromise

DetectionDetection RemediationRemediation

V / W / T V / W / T ↔ user – SAV scan↔ user – SAV scan

… ↔ … … ↔ …

Page 4: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

IsolationIsolationIP based – DHCP using two address pools, routable IP based – DHCP using two address pools, routable and non-routable (SWU Netreg) with full DNS.and non-routable (SWU Netreg) with full DNS.HTTP control (Squid) – configure access for users in HTTP control (Squid) – configure access for users in restricted zone.restricted zone.Dynamic firewall port control (IPtables) – block Dynamic firewall port control (IPtables) – block services in restricted zone – except for IDS test intervalservices in restricted zone – except for IDS test interval

Page 5: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Detection FrameworkDetection FrameworkActiveActive

Scanning from external source, eg. Nmap, Scanning from external source, eg. Nmap, Nessus.Nessus.

PassivePassiveMonitoring network traffic, eg. Tcpdump, Monitoring network traffic, eg. Tcpdump, Snort.Snort.

AgentAgentClient software, continuous or run-once.Client software, continuous or run-once.

Page 6: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Detection ImplementationDetection ImplementationVulnerabilityVulnerabilityMissing critical patches: MBSA (cli version)Missing critical patches: MBSA (cli version)Missing antivirus: registry check and wmicMissing antivirus: registry check and wmicWeak passwords: John the RipperWeak passwords: John the RipperInsecure user configuration: user privileges, AutoUpdates, root Insecure user configuration: user privileges, AutoUpdates, root cert auditcert audit

CompromiseCompromiseVirus/worm/trojan: IDS (Snort, TCPView), Microsoft MSR*Virus/worm/trojan: IDS (Snort, TCPView), Microsoft MSR*Spyware: Spybot cliSpyware: Spybot cliRootkit: RootkitRevealerRootkit: RootkitRevealer

Page 7: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

RemediationRemediationVulnerabilityVulnerabilityWindowsUpdate (user)WindowsUpdate (user)Install SAV (user)Install SAV (user)Weak passwords (user)Weak passwords (user)Insecure user configuration (user-run wizard) Insecure user configuration (user-run wizard)

CompromiseCompromiseVirus/worm/trojan: SAV scan, TrendMicro Sysclean, Microsoft MSRVirus/worm/trojan: SAV scan, TrendMicro Sysclean, Microsoft MSRSpyware: (user-run Spybot)Spyware: (user-run Spybot)Rootkit: (assisted Rootkit: (assisted ))

Page 8: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Tools in DetailTools in DetailWizard UIWizard UI

CLI utilities wrapped using open source Windows installers: NSIS, CLI utilities wrapped using open source Windows installers: NSIS, InnoSetup.InnoSetup.Provides familiar wizard user interface for detection/remediation tools.Provides familiar wizard user interface for detection/remediation tools.Provides ‘run-once’ function – no installation required.Provides ‘run-once’ function – no installation required.API includes registry read/write, cookie writing.API includes registry read/write, cookie writing.Two formats – stand-alone and server integration.Two formats – stand-alone and server integration.

MBSAMBSA

Detection of all critical updates available day of release, also detects Detection of all critical updates available day of release, also detects updates to existing versions.updates to existing versions.

Page 9: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Tools in DetailTools in DetailPassword AuditPassword Audit

Checks for blank password, password=username, dictionary lookup of Checks for blank password, password=username, dictionary lookup of words found in blended threats.words found in blended threats.

IDS IDS

Snort check for host/port scan (20 sec. sample) Note: Isolation opened Snort check for host/port scan (20 sec. sample) Note: Isolation opened up to allow client server connections.up to allow client server connections.TCPView check for excessive SYN rate. TCPView check for excessive SYN rate.

Page 10: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Applications - ESPApplications - ESP

integrationintegration of isolation, MBSA detection, of isolation, MBSA detection, user remediation.user remediation.admin functions: init registration cycle, admin functions: init registration cycle, isolation/block MAC, configure isolation isolation/block MAC, configure isolation access.access.

Page 11: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Applications - HealthChkApplications - HealthChk

integration of isolation, compromise integration of isolation, compromise detection for assisted detection and detection for assisted detection and remediation.remediation.admin functions: convenient access to admin functions: convenient access to external utilities.external utilities.

Page 12: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

Applications - FutureApplications - Future

Create a remote HealthChk system.Create a remote HealthChk system.User runs detection and remediation tools User runs detection and remediation tools remotely, support for Linux?remotely, support for Linux?

Other Applications?Other Applications?Managed environment use – encourage Managed environment use – encourage users to use automated systems, no users to use automated systems, no isolation, enforcement via email reminders.isolation, enforcement via email reminders.

Page 13: Automating Endpoint Security Policy Enforcement

Computing and Networking Services University of Toronto

More InformationMore Informationhttp://http://www.utoronto.ca/security/UTORprotectwww.utoronto.ca/security/UTORprotect

http://security.internet2.edu/netauthhttp://security.internet2.edu/netauth

http://http://www.netreg.orgwww.netreg.org