Choosing a Bastion Host - PowerPoint PPT Presentation

1 / 38
About This Presentation
Title:

Choosing a Bastion Host

Description:

Understand the general requirements for installing a bastion host ... Password-protected screen saver and short time delay. Install the Operating System Securely ... – PowerPoint PPT presentation

Number of Views:463
Avg rating:3.0/5.0
Slides: 39
Provided by: annek162
Category:

less

Transcript and Presenter's Notes

Title: Choosing a Bastion Host


1
Choosing a Bastion Host
  • Chapter 8

2
Learning Objectives
  • Understand the general requirements for
    installing a bastion host
  • Select the attributesmemory, processor speed,
    and operating systemof the bastion host
  • Evaluate different options for positioning the
    bastion host, both physically and within the
    network

continued
3
Learning Objectives
  • Configure the bastion host
  • Provide for backups of the bastion host operating
    system and data
  • Establish a baseline performance level and audit
    procedures
  • Connect the bastion host to the network

4
Bastion Host
  • An application server that has been specially
    hardened and configured to function on a network
    perimeter with an interface on the Internet
  • A particularly secure point in the network
  • Typically provides only one service

5
Installing a Bastion Host General Requirements
  • Your own level of comfort with the system
  • Its security
  • Its reliability

6
Steps for Securing a Bastion Host
  • Obtain a machine with sufficient memory and
    processor speed
  • Choose and install the operating system
  • Determine where the host will fit in the network
    configuration put it in a safe and controlled
    physical environment
  • Enable the host to defend itself

continued
7
Steps for Securing a Bastion Host
  • Install the services you want to provide, or
    modify existing services
  • Remove services and accounts that arent needed
  • Back up the system and all data on it, including
    log files
  • Run a security audit
  • Connect the machine to the network

8
Selecting the Host Machine
  • Number of machines
  • Memory considerations
  • Processor speed
  • Choosing the operating system

9
How Many Machines?
  • Ideal to have only one service on each bastion
    host
  • Conduct a threat assessment that identifies your
    most valuable information
  • Get as many bastion hosts as you can afford to
    maximize security combine services on one host
    if you need to save money

10
Memory Considerations
  • Should have multi-gigabytes of hard disk storage
    space
  • Vast quantities of log files
  • Create a page file
  • Not likely to need multi-gigabytes worth of RAM

11
Processor Speed
  • Get the fastest processor you can afford

12
Choosing the Operating System
  • Most important consideration is your familiarity
    with the system
  • UNIX and Linux hosts
  • Windows 2000/XP hosts
  • Keep the operating system updated

13
Positioning the Bastion Host
  • Sits on the perimeter of the network provides a
    buffer between the Internet and the internal
    network
  • Physical options
  • Logical options

14
Physical Location
  • Separate room (or locked server cabinet) with
    proper ventilation, adequate cooling, and a
    backup power system
  • Co-locate Web servers and other bastion hosts
    off-site
  • Use a hosting service

15
Co-Locating a Server
16
Network Location
17
Securing the Machine Itself
  • Aspects of a disaster recovery plan
  • Availability of spare equipment
  • Frequency of backup
  • Secure off-site data storage
  • Temporary office space
  • Hardware/software insurance
  • Frequency of testing the disaster program

18
Securing the Machine Itself
  • Select a secure location
  • Install the operating system securely
  • Document your work

19
Select a Secure Location
  • Limited access
  • Protection with an alarm system with battery
    backup
  • Physical computer lock and cable
  • Password-protected screen saver and short time
    delay

20
Install the Operating System Securely
  • Reinstall OS with minimum configuration
  • Create two partitions on Windows 2000/XP bastion
    host
  • One for the OS (C drive)
  • One for other software that will run on the host
    (eg, Web server or DNS server)
  • Use only NTFS file system for file storage
  • Include virus protection software
  • Configure DNS server located on a bastion host in
    DMZ to prohibit unauthorized zone transfers

21
Document Your Work
  • Name and location of bastion host
  • Bastion hosts IP address and domain name
  • Bastion hosts operating system
  • Location of backup files
  • What to do in case the system crashes
  • Levels of patches that have been made to bastion
    hosts operating system
  • Customized scripts that have been developed to
    support the host

22
Configuring Your Bastion Host
  • Make the host defend itself
  • Select services to be provided
  • Disable accounts
  • Disable unnecessary services
  • Limit ports

23
Making the Host Defend Itself
  • Set up a honey pot server
  • Set up an Intrusion Detection System (IDS) on the
    bastion host
  • Place a host-based IDS system directly on the
    host itself, or
  • Place a network-based IDS on the firewall or
    router that protects bastion hosts in the DMZ

24
Selecting Services to Be Provided
  • Use latest version of server software
  • Install available security patches or updates
  • Install a system patch to guard against an
    application that can be subject to buffer overflow

25
URLs for Latest Versions
26
Special Considerations for UNIX Systems
  • Security_patch_check utility
  • Automates process of analyzing security patches
    already on the system and reporting on patches
    that should be added
  • Trusted Computing Base (TCB) Check
  • Makes sure that software you run is trusted
  • System logging

27
Special Considerations for Windows Systems
  • Run Microsoft Baseline Security Analyzer
  • Use IIS Lockdown Tool
  • Delete unneeded files in SystemRoot\system32
    folder

28
Special Considerations for Windows Systems
29
Disabling Accounts
  • Delete all user accounts from the bastion host
  • Rename Administrator account to deter hackers
  • Keep a dummy account called Administrator to
    serve as a honey pot account
  • Use passwords that are 6-8 alphanumeric characters

30
Disabling Unnecessary Services
  • Disable services that enable the host to do
    routing or IP forwarding
  • Take out hardware features you wont use
  • Do not disable any dependency services
  • Each time a service is stopped, test the system
  • Document every single change you make

31
(No Transcript)
32
Limiting Ports
  • Stop traffic on all but the ports you actually
    need to provide services on the network
  • Scan the system for active ports and close any
    that are being used by unknown or unneeded
    services

33
Limiting Ports
34
Handling Backups
  • Binary drive image backup
  • Best kind of backup
  • Includes all information, including OS,
    applications, and individual files
  • Copy all relevant files to disk
  • Use systems built-in back-up utility

35
Auditing the Bastion Host
  • Test for vulnerabilities and evaluate performance
  • How well does bastion host protect itself from
    attack?
  • How well does it protect internal LAN behind it
    from attack?
  • Establish a baseline for system performance
    (benchmarking)

36
Connecting the Bastion Host
  • Test system and check it against baseline level
    of performance to make sure it still functions
    correctly
  • IPSentry can be used to monitor network
    performance and send alerts in case of trouble
  • Audit the host periodically

37
Monitoring the System with IPSentry
38
Chapter Summary
  • Proper configuration of a bastion host
  • General requirements that apply to most bastion
    hosts
  • Factors to consider when selecting a host machine
  • Possible locations for a bastion host
  • Deciding what functions the host should perform
Write a Comment
User Comments (0)
About PowerShow.com