Security has its privileges

Maybe an innocent bystander can be excused for not seeing and stopping a crime about to happen, but IT security administrators can't. They need to keep their eyes open, according to Gijo Mathew, a security strategist for Computer Associates International Inc. In Part Two of this interview, Mathew digs into mistakes made in access control management, handling super user privileges and seeing suspicious activity. In Part One, he covered the security worst practices he has encountered.

So, the worst has happened and security is breached. What measures does a well-prepared IT shop take? Is there

any hope for an unprepared IT shop? For prepared shops, we hope to find that since they protected and centralized audit information, they can analyze the information and can be certain that the log records have integrity. They should also have a well-defined incident response plan that includes recovery and disclosure.

Unprepared shops can try to determine the root cause, plug the hole and only "trust" that it doesn't happen again. What signs of suspicious activity do admins sometimes overlook?
Here are the worst oversights:

  • New users added to the system
  • Change in file permissions
  • Introduction of new software
  • New port usage
  • Multiple failed logins, file access, etc.

These red flags are often "overlooked" because of the number of logs that administrators need to monitor. Too much security information results in information overload and makes it difficult to find the needle in the haystack. Tools are available to collect, correlate and analyze this log information in an efficient manner. What best practices do you suggest for an IT shop that wants to catch vulnerabilities and fix them?
Know your assets and understand what is on your network. Find a reliable, timely and validated source of vulnerability information. Correlate vulnerabilities with all the assets of an organization. Finally, ensure that you have a mechanism for delivering and updating systems from a central location. IT shops tell us that creating and enforcing a Linux security baseline policy is very time consuming, and that time is the primary reason they are lax in this area. What are some simple steps that can help them save time in creating and enforcing policies?
This can be a challenge for certain organizations. Creating and maintaining baseline policies can be a substantial task. Many access control and policy compliance tools offer baseline best practices to help organizations initially create their policies. Many security advisories like storage area networks provide some best practices that can also serve as a starting point for baselines.

The secondary issue is being able to deploy new baselines and policies across all systems in a consistent manner. This usually requires the use of a central policy management tool or some creative scripting.

Pluggable Authentication Module (PAM)  has given Linux various ways to account for authentication.
Gijo Mathew
Security strategistComputer Associates
What is a superuser, and what privileges might superusers have that others don't?
A superuser is one who has a very high level of privileges on a system. A root user is a superuser in Linux. Root can access/modify/delete any resource on a Linux system. For example, a person logged on as root can modify and delete system audit logs, which results in unreliable accountability information. This unmonitored and unrestricted access can lead to many exploits and untraceable suspicious activity. (Root is normally a shared ID and anything done as root is always logged as root -- not a specific user). Many hackers and malicious codes will also try to gain access to Linux systems as superuser so they can maximize damage. How are most companies managing access control today? What's right and wrong about that?
Access to systems can be granted through different ways. Authentication can vary from basic /etc/passwd file to a Lightweight Directory Access Protocol (LDAP) and possibly biometrics. Pluggable Authentication Module (PAM) has given Linux various ways to account for authentication. Many organizations are beginning to use a central credential store for authentication. This allows users to be defined and managed in one place, allowing for easier user management and consistent password policy.

If biometrics is used, it allows organizations to bypass the use of passwords and have stronger authentication into their systems. Once authenticated, users must be authorized to the resource they have access to, and this is usually determined by the group they belong to. More advanced organizations use access control technologies to provide a greater level of granularity and to ease the administration of user groups.

Gijo Mathew
What are some "worst practices" you've seen administrators make in the area of access control?
Inconsistent policies have been the downfall of good intentioned access control policies. Making sure that we have well-defined role-based access controls will help us manage and enforce the right access to the right resources. In addition, the inability to manage policies across a variety of platforms is a problem.

Dig deeper on Linux security risks and threats

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchDataCenter

SearchServerVirtualization

SearchCloudComputing

SearchEnterpriseDesktop

Close