Title: Technical Requirements
1FAISSR
- Technical Requirements
- What is feasible?
- How do I Configure Security Features?
This presentation was produced for the Florida
Association of IS Security Representatives
(FAISSR). Any reference to products are for
example only and are not an endorsement by
FAISSR. CAUTION - Not all of the information in
this presentation has been tested.
Implementation of the suggestions contained in
this presentation must be validated by the ISSM
and approved by the CSA.
3-Apr-2001
2Before we Start .
DISCLAIMER
- This presentation is intended as a Starting Point
only - Not everything in this presentation has been
verified (tested) - Viewgraphs that define events to be audited are a
first cut suggestion to meet the minimum
requirements
3Technical Security Features
- Technical Security Features now required by
Chapter 8 - Logon Authentication
- Session Controls
- Access Controls
- Audit
- When technically feasible ??
4The Questions .
SGI IRIX
?
5OpenVMS
6 OpenVMS
- Account Password Controls
- VMS stores account and password information in
the SYSSYSTEMSYSUAF.DAT file, and is accessed
through the Authorize utility. - On VAXs the default accounts include DEFAULT,
FIELD, SYSTEM, SYSTEST, and SYSTEST_CLIG. On
Alpha systems, the default accounts include
DEFAULT and SYSTEM - SYSTEM is the all powerful account in VMS. At
one time the default password for the SYSTEM
account was Manager.
7 OpenVMS
- Account Password Controls
- The FIELD and TEST accounts should be disabled
To disable an account - RUN SYSSYSTEMAUTHORIZE
- UAFgt MODIFY account name/FLAGSDISUSER
- To establish password restrictions, use the
following flags when establishing accounts, or
modify the default account to have these flags
set - /PWDMINIMUM 8
- /PWDLIFETIME365
- /FLAGSGENPWD
- /GENERATE_PASSWORD
8 OpenVMS
- Account Password Controls
- To control failed login attempts
- Run SYSSYSTEMSYSMAN
- SYSMANgtPARAMETERS SET LGI_BRK_LIM 5
- SYSMANgtPARAMETERS SET LGI_BRK_TMO 300
- SYSMANgtPARAMETERS WRITE CURRENT
- Login Banner Edit SYSANNOUNCE in the
site-specific startup command procedure
SYSMANAGERSYSTARTUP_VMS.COM.
9 OpenVMS
- Access Controls
- By default VMS has file access protections that
control access (read, write, execute, control,
delete) for System, Owner, Group, and World - Optional Access Control Lists may also be set on
files to grant access to individual user accounts - Additional privileges may be added to any account
with the Authorize utility with the parameters
/DEFPRIVILEGES and /PRIVILEGES - DEFPRIVILEGES are available at login. A user may
use the SET PROCESS/PRIVILEGES command to
increase their privileges if authorized.
10 OpenVMS
- OpenVMS Auditing
- OpenVMS by default audits the following events
- ACL Access to objects holding a security ACE
- Audit Usage of the SET AUDIT comand
- Authorization Changes to the SYSUAF.DAT file
and the RIGHTSLIST.DAT file - Break-In Multiple failed login attempts
- Log Failure All failed logins
- Enable additional auditing with
SET/AUDIT/ENABLE - LOGINS(ALL)
- LOGOUTS(ALL)
- PRIVILEGE(SUCCESSSECURITY,FAILURESECURITY)
11 OpenVMS
- OpenVMS Auditing
- To enable auditing on specific files use the
command SET SECURITY/ACLAUDIT -
12OpenVMS
- By default the audit file is located in
SYSCOMMONSYSMGR directory and named
SECURITY.AUDITJOURNAL - The audit file may be viewed with the
ANALYZE/AUDIT command - Example
- ANALYSE/AUDIT/BRIEF SYSMANAGERSECURITY.AUDITJOU
RNAL - Date / Time Type Subtype
Node Username ID Term - -------------------------------------------------
----------------------------- - 1-NOV-1995 160003.37 ACCESS FILE_ACCESS
HERE SYSTEM 5B600AE4 - 1-NOV-1995 160059.66 LOGIN SUBPROCESS
GONE ROBINSON 3BA011D4 - 1-NOV-1995 160237.31 LOGIN SUBPROCESS
GONE MILANT 000000D5 - 1-NOV-1995 160636.40 LOGFAIL LOCAL
SUPER MBILLS 000000E5 _TTA1 - Note To see more details use ANALIZE/AUDIT/FULL
13Macintosh
14Macintosh
- The current MAC operating system (MAC OS 9.0) is
not capable of implementing technical security
features. - The NEW version, OS X, released March 25, 2001 is
based upon a BSD version of UNIX, named Darwin.
It will most likely have the typical UNIX
security features. It is doubtful, that it will
have an auditing subsystem.
Note With the change to a UNIX O/S, Mac users
should be prepared to start experiencing attacks
from hackers they have never had to deal with!
15One more slide .
- What I havent told you .
- How to control the size and maintenance of audit
files. Make sure you research this and plan for
plenty of disk space! - Be aware that these audit systems can be
configured to shut down auditing if a disk fills
up .. Or shut down the system - The impact on performance from auditing.
- A strategy to archive all of the audit files so
they can be kept for the required time periods