Title: Choosing a Bastion Host
1Choosing a Bastion Host
2Learning Objectives
- Understand the general requirements for
installing a bastion host - Select the attributesmemory, processor speed,
and operating systemof the bastion host - Evaluate different options for positioning the
bastion host, both physically and within the
network
continued
3Learning Objectives
- Configure the bastion host
- Provide for backups of the bastion host operating
system and data - Establish a baseline performance level and audit
procedures - Connect the bastion host to the network
4Bastion Host
- An application server that has been specially
hardened and configured to function on a network
perimeter with an interface on the Internet - A particularly secure point in the network
- Typically provides only one service
5Installing a Bastion Host General Requirements
- Your own level of comfort with the system
- Its security
- Its reliability
6Steps for Securing a Bastion Host
- Obtain a machine with sufficient memory and
processor speed - Choose and install the operating system
- Determine where the host will fit in the network
configuration put it in a safe and controlled
physical environment - Enable the host to defend itself
continued
7Steps for Securing a Bastion Host
- Install the services you want to provide, or
modify existing services - Remove services and accounts that arent needed
- Back up the system and all data on it, including
log files - Run a security audit
- Connect the machine to the network
8Selecting the Host Machine
- Number of machines
- Memory considerations
- Processor speed
- Choosing the operating system
9How Many Machines?
- Ideal to have only one service on each bastion
host - Conduct a threat assessment that identifies your
most valuable information - Get as many bastion hosts as you can afford to
maximize security combine services on one host
if you need to save money
10Memory Considerations
- Should have multi-gigabytes of hard disk storage
space - Vast quantities of log files
- Create a page file
- Not likely to need multi-gigabytes worth of RAM
11Processor Speed
- Get the fastest processor you can afford
12Choosing the Operating System
- Most important consideration is your familiarity
with the system - UNIX and Linux hosts
- Windows 2000/XP hosts
- Keep the operating system updated
13Positioning the Bastion Host
- Sits on the perimeter of the network provides a
buffer between the Internet and the internal
network - Physical options
- Logical options
14Physical Location
- Separate room (or locked server cabinet) with
proper ventilation, adequate cooling, and a
backup power system - Co-locate Web servers and other bastion hosts
off-site - Use a hosting service
15Co-Locating a Server
16Network Location
17Securing the Machine Itself
- Aspects of a disaster recovery plan
- Availability of spare equipment
- Frequency of backup
- Secure off-site data storage
- Temporary office space
- Hardware/software insurance
- Frequency of testing the disaster program
18Securing the Machine Itself
- Select a secure location
- Install the operating system securely
- Document your work
19Select a Secure Location
- Limited access
- Protection with an alarm system with battery
backup - Physical computer lock and cable
- Password-protected screen saver and short time
delay
20Install the Operating System Securely
- Reinstall OS with minimum configuration
- Create two partitions on Windows 2000/XP bastion
host - One for the OS (C drive)
- One for other software that will run on the host
(eg, Web server or DNS server) - Use only NTFS file system for file storage
- Include virus protection software
- Configure DNS server located on a bastion host in
DMZ to prohibit unauthorized zone transfers
21Document Your Work
- Name and location of bastion host
- Bastion hosts IP address and domain name
- Bastion hosts operating system
- Location of backup files
- What to do in case the system crashes
- Levels of patches that have been made to bastion
hosts operating system - Customized scripts that have been developed to
support the host
22Configuring Your Bastion Host
- Make the host defend itself
- Select services to be provided
- Disable accounts
- Disable unnecessary services
- Limit ports
23Making the Host Defend Itself
- Set up a honey pot server
- Set up an Intrusion Detection System (IDS) on the
bastion host - Place a host-based IDS system directly on the
host itself, or - Place a network-based IDS on the firewall or
router that protects bastion hosts in the DMZ
24Selecting Services to Be Provided
- Use latest version of server software
- Install available security patches or updates
- Install a system patch to guard against an
application that can be subject to buffer overflow
25URLs for Latest Versions
26Special Considerations for UNIX Systems
- Security_patch_check utility
- Automates process of analyzing security patches
already on the system and reporting on patches
that should be added - Trusted Computing Base (TCB) Check
- Makes sure that software you run is trusted
- System logging
27Special Considerations for Windows Systems
- Run Microsoft Baseline Security Analyzer
- Use IIS Lockdown Tool
- Delete unneeded files in SystemRoot\system32
folder
28Special Considerations for Windows Systems
29Disabling Accounts
- Delete all user accounts from the bastion host
- Rename Administrator account to deter hackers
- Keep a dummy account called Administrator to
serve as a honey pot account - Use passwords that are 6-8 alphanumeric characters
30Disabling Unnecessary Services
- Disable services that enable the host to do
routing or IP forwarding - Take out hardware features you wont use
- Do not disable any dependency services
- Each time a service is stopped, test the system
- Document every single change you make
31(No Transcript)
32Limiting Ports
- Stop traffic on all but the ports you actually
need to provide services on the network - Scan the system for active ports and close any
that are being used by unknown or unneeded
services
33Limiting Ports
34Handling Backups
- Binary drive image backup
- Best kind of backup
- Includes all information, including OS,
applications, and individual files - Copy all relevant files to disk
- Use systems built-in back-up utility
35Auditing the Bastion Host
- Test for vulnerabilities and evaluate performance
- How well does bastion host protect itself from
attack? - How well does it protect internal LAN behind it
from attack? - Establish a baseline for system performance
(benchmarking)
36Connecting the Bastion Host
- Test system and check it against baseline level
of performance to make sure it still functions
correctly - IPSentry can be used to monitor network
performance and send alerts in case of trouble - Audit the host periodically
37Monitoring the System with IPSentry
38Chapter Summary
- Proper configuration of a bastion host
- General requirements that apply to most bastion
hosts - Factors to consider when selecting a host machine
- Possible locations for a bastion host
- Deciding what functions the host should perform