4.1 Given a scenario, apply common security techniques to computing resources

  • Device Hardening: Practice of changing configurations to secure systems from threats by reducing vulnerabilities attributed to default configurations.

    • Standard Techniques Include:

    • Regular update processes.

    • Secure password policies.

    • Principle of least privilege (users should have minimum necessary access).

    • Disabling or removing unnecessary software, services, and features.

    • Additional Strategies:

    • Data encryption.

    • Network-level hardening (implementing firewalls and intrusion detection systems).

    • Monitoring: Security analysts use these techniques to maintain secure configurations and monitor systems.

    • Regular Security Audits & Vulnerability Assessments: Ensure ongoing security and timely responses to emerging threats.

Secure Baselines

  • Definition: A secure baseline is a collection of standard configurations and settings for various IT components including network devices, software, access controls, and endpoint protection.

  • Purpose: Secure baselines improve IT security, manageability, and operational efficiencies by establishing consistent configuration and security procedures.

Benchmarks and Secure Configuration Guides
  • CIS Benchmarks: Developed by the Center for Internet Security, provide best practice guides for securing IT systems.

    • Covers multiple domains: networks, operating systems, applications, etc.

    • Continuously updated in response to evolving risks.

    • Examples of compliance benchmarks include PCI DSS, NIST 800-53, and ISO 27000.

  • Security Technical Implementation Guides (STIGs): Developed by the Defense Information Systems Agency (DISA) for the US Department of Defense, defining sets of security configurations for DoD's IT infrastructure.

Tools for Managing Secure Baselines

  • Configuration Management Tools: Automate deployment of secure baseline configurations. Examples include:

    • Puppet

    • Chef

    • Ansible

    • Microsoft's Group Policy

  • Compliance Monitoring Tools:

    • Security Content Automation Protocol (SCAP) compliant tools like OpenSCAP to assess adherence.

    • CIS-CAT Pro Tool for CIS benchmarks assessment.

    • SCAP Compliance Checker (SCC) by DISA for STIG compliance measurement.

Hardening Concepts

  • Network Devices Default Settings: Default configurations may include insecure passwords, protocols, and settings.

  • Importance of Changing Defaults: Changing these to enhance security is crucial as they are common targets for attackers.

Switches and Routers Hardening Examples
  • Change Default Credentials: To mitigate security risks from widely known information.

  • Disable Unnecessary Services and Interfaces: Services not required should be disabled (e.g., HTTP, Telnet).

  • Use Secure Management Protocols: Prefer protocols like SSH over Telnet.

  • Implement Access Control Lists (ACLs): Limit access to necessary devices/networks.

  • Enable Logging and Monitoring: For identifying issues such as repeated login failures.

  • Configure Port Security: Limit devices connecting to specific switch ports.

  • Strong Password Policies: Enforce to mitigate the risk of attacks.

  • Physical Security: Keep equipment secured in locked areas.

Server Hardware and Operating Systems Hardening Examples
  • Change Default Credentials: Similar to network devices, to prevent unauthorized access.

  • Disable Unnecessary Services: To reduce attack surfaces each service presents.

  • Regular Software Security Patching: Automated patch management ensures timely updates.

  • Least Privilege Principle: Limits accounts to only necessary permissions, minimizing account compromise risk.

  • Implement Firewalls and IDS: To block/make alerts on malicious activities.

  • Use Secure Configuration: Align setups with standards like CIS or STIGs.

  • Strong Access Controls: Enforce measures like MFA and privileged access management.

  • Logging and Monitoring: Similar benefits as for network devices.

  • Use Antivirus Solutions: Auto-detect and quarantine threats.

  • Physical Security of Server Facilities: Ensure restricted access to server environments.

Wireless Network Security

Infrastructure-based Wireless Networks
  • Consist of wireless access points (WAPs) connected to a wired network.

  • WAP Identification: Each WAP has a MAC address (BSSID); networks have SSIDs.

Installation Considerations for Wireless Networks
  • Site Survey: Ensures good availability and coverage; performed using Wi-Fi analyzer software to measure signal strength.

  • WAP Placement: Must minimize overlap and maximize coverage.

Security of Wireless Networks
  • WPA: Original WPA designed to fix vulnerabilities in WEP; integrates TKIP for stronger security.

  • Wireless Encryption Importance: Configuring security settings helps prevent packet interception.

Wi-Fi Protected Setup (WPS)
  • Overview: Automates device configuration via push-button or PIN, but has vulnerabilities exposing it to brute force attacks.

  • Proposed Replacement: Easy Connect for securely configuring devices using QR codes.

WPA3 Features

  • Upgrade from WPA2: Addresses vulnerabilities and enhances security with features like Enhanced Open and Wi-Fi Easy Connect.

  • Authentication Methods: WPA3 introduces Simultaneous Authentication of Equals (SAE) for improved password security.

Wireless Authentication Methods

  • Pre-Shared Key (PSK): Requires passphrase shared among group members; vulnerable to dictionary/brute force attacks.

  • WPA3 Personal: Uses PAKE for session key agreements, enhancing security against sniffing attacks.

  • WPA2/WPA3-Enterprise: Requires unique credentials, offering better control and auditing capabilities.

RADIUS Authentication
  • Involves NAS devices, supplicants, and an AAA server for user authentication; processes payloads securely using shared secrets and EAP protocols.

Endpoint Hardening

Operating System and Application Security
  • Combining access controls, secure configurations, patch management, and monitoring protects OS from malware and breaches.

  • Hardening Best Practices Include:

    • Regular OS patches.

    • User training on threats.

Workstation Security
  • Workstations must undergo changes such as software removal, privilege limitations, detailed monitoring, and strict peripheral device security.

  • Importance of User Training: Workers need awareness of potential threats.

Endpoint Protection Principles
  • Reduce vulnerabilities through secure policy implementation and adherence.

Configuration Inquiry and Compliance

Endpoint Configuration Management
  • Regularly perform checks on configuration adherence and protections.

  • Utilize static and dynamic analysis along with secure coding practices to ensure applications guard against vulnerabilities.

Access Control Frameworks

  • Principle of Least Privilege (PoLP): Assigns minimum permissions necessary for system interactions.

  • Access Control Lists (ACLs): Define user/group permissions over resources to secure system access.

Application Security Practices

Fortification Strategies
  • Secure Coding Techniques: Address client-side vulnerabilities through validation methods, secure cookies, and code signing practices.

Threat Monitoring and Response
  • EDR tools and automated systems enhance organizational responsiveness to cyber threats and incidents.

Mobile Device Management
  • Control Frameworks: MDM strategies govern policies on corporate devices, ensuring security compliance.

  • Encryption and Data Protection: Security measures apply to protect organizational data.

  • Device models (BYOD, COBO) determine organizational control.

Conclusion

  • The comprehensive approach to security techniques across devices, networks and applications is imperative to maintaining integrity and confidentiality within an organization's computing resources. These holistically structured methodologies help in mitigating potential threats while enhancing the overall security stance.