Technical track kevin cardwell-10-00 am-solid-defense

32
Solid Defense Kevin Cardwell

Transcript of Technical track kevin cardwell-10-00 am-solid-defense

Page 1: Technical track   kevin cardwell-10-00 am-solid-defense

Solid DefenseKevin Cardwell

Page 2: Technical track   kevin cardwell-10-00 am-solid-defense

2

External

Screeningrouter

Internal

Bastionhost

WWWserver

FTPserver

Services subnet

Exploit's r us

A little bit of exploit for you

Page 3: Technical track   kevin cardwell-10-00 am-solid-defense

The compromise was inevitable! APT, sophisticated attackers etc etc

MYTH!

2011 – 94% servers 2012 – 54%

Mobile - 71%

2012 – 78% low difficulty

3

Page 4: Technical track   kevin cardwell-10-00 am-solid-defense

4

Page 5: Technical track   kevin cardwell-10-00 am-solid-defense

Attacks of choice

Security is a process and methodology not a product!

5

Page 6: Technical track   kevin cardwell-10-00 am-solid-defense

6

Page 7: Technical track   kevin cardwell-10-00 am-solid-defense

Harden them!

OWASP application testing guide

www.owasp.org

Harden the SQL databases◦ Upgrade MS to SQL Server 2008 or beyond

◦ Follow application hardening guides

7

Page 8: Technical track   kevin cardwell-10-00 am-solid-defense

NSA Guides◦ http://www.nsa.gov/ia/guidance/security_configuration_guides/index.

shtml

Center for Internet Security ◦ Benchmarks

www.cisecurity.org

8

Page 9: Technical track   kevin cardwell-10-00 am-solid-defense

Provided by Microsoft

Can customize

Allows for baseline comparisons

9

Page 10: Technical track   kevin cardwell-10-00 am-solid-defense

Application Whitelisting

Patch Applications

Patch Operating System

Minimize the number of users with privileged rights◦ Disable the local admin account on domain computers

10

Page 11: Technical track   kevin cardwell-10-00 am-solid-defense

11

Page 12: Technical track   kevin cardwell-10-00 am-solid-defense

We have gotten better at security

The hackers have gotten better at hacking

Patch system is broken

Residual risk

www.zerodayinitiative.com

12

Page 13: Technical track   kevin cardwell-10-00 am-solid-defense

Proven Defense Measures

Page 14: Technical track   kevin cardwell-10-00 am-solid-defense

Traffic coming into your network Implemented by almost all organizations Security policy determines what is allowed and

configured in the filters No traffic arriving at the perimeter should have an

internal source address◦ Commonly referred to as sanity checking

RFC 2267 provides guidance for filters to prevent denial-of-service attacks

Block ICMP Echo Reply messages to the broadcast address

Bogon Filtering

CaseStudy of malware infection => 64% of traffic blocked by bogon filtering

14

Page 15: Technical track   kevin cardwell-10-00 am-solid-defense

One of the most neglected areas of filtering◦ Most organizations neglect to filter traffic leaving their network◦ Even after the rise of DDoS attacks, many organizations still do not◦ There will always be some out there who never will

These sites are used as amplifiers to attack other networks The concept is simple:

Most attacks use a spoofed address to attack as the source◦ When you egress filter, then the packet is dropped

Blackhole routing Critical Infrastructure systems should not generate

connections out!

DDoS = distributed denial of service15

Page 16: Technical track   kevin cardwell-10-00 am-solid-defense

If workstation site is not 24/7◦ Shut off access going out to the Internet

Block the well known malware ports of communication http ssh https Etc

◦ Monitor for attempts All malware will attempt outbound connections If no one is there, should be none

If 24/7◦ Only monitor critical systems

Servers should not initiate connections to the Internet◦ Subscribe to a service

Watch for lookups of known malware nets

16

Page 17: Technical track   kevin cardwell-10-00 am-solid-defense

Segmentation and isolation

Bind ports inside the bastion host

Externalnetwork

Screeningrouter

Bastionhost

DMZ

DMZ App Servers

IDS

17

Page 18: Technical track   kevin cardwell-10-00 am-solid-defense

18

Page 19: Technical track   kevin cardwell-10-00 am-solid-defense

19

Page 20: Technical track   kevin cardwell-10-00 am-solid-defense

Sinkhole domains

20

Page 21: Technical track   kevin cardwell-10-00 am-solid-defense

Setup machines that should never receive traffic◦ Alert on any inbound traffic

21

Page 22: Technical track   kevin cardwell-10-00 am-solid-defense

22

Page 23: Technical track   kevin cardwell-10-00 am-solid-defense

23

Page 24: Technical track   kevin cardwell-10-00 am-solid-defense

24

Page 25: Technical track   kevin cardwell-10-00 am-solid-defense

25

Page 26: Technical track   kevin cardwell-10-00 am-solid-defense

26

Page 27: Technical track   kevin cardwell-10-00 am-solid-defense

27

Page 28: Technical track   kevin cardwell-10-00 am-solid-defense

28

Page 29: Technical track   kevin cardwell-10-00 am-solid-defense

29

Page 30: Technical track   kevin cardwell-10-00 am-solid-defense

30

Page 31: Technical track   kevin cardwell-10-00 am-solid-defense

31

Page 32: Technical track   kevin cardwell-10-00 am-solid-defense

We can defend!

[email protected]

32