01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

questions such as, “Who added a workstation to a domain?” or “When did this user receive<br />

administrative privileges?”<br />

These questions pose many potential answers. Configurations may change due to user<br />

modifications, settings being misconfigured initially, or machines being turned off when group<br />

policies are entered. When configuration changes go unnoticed, organizations are left facing<br />

easily exploitable vulnerabilities. These vulnerabilities are one of the main reasons security<br />

frameworks recommend that security teams utilize a form of configuration management<br />

automation that provides consistent security metrics, as opposed to a manual process.<br />

Setting a Standard<br />

A majority of today’s security frameworks, such as NIST 800-53, include configuration<br />

management requirements that reflect the results of Operation Eligible Receiver 97. Guidelines<br />

within NIST 800-53 suggest practices such as setting a configuration baseline and limiting<br />

systems to only provide essential capabilities in a control known as “least functionality.” 1<br />

Frameworks provide a basis for general requirements but do not provide details on how<br />

configuration should be set.<br />

Security teams utilize validated standards, such as Security Technical Implementation Guides<br />

(STIGs) from the Defense Information Systems Agency (DISA), for specifics of how configurations<br />

should be set. These STIGs are required configuration standards for all Department of Defense<br />

devices and systems and have provided a guideline to secure areas of risk within networks since<br />

1998. 2 Following these established standards provides security teams with clear direction in their<br />

configuration management process, while ensuring compliance with frameworks and improving<br />

the security posture of their organization.<br />

Monitoring Configuration Drift<br />

Even when organizations follow a configuration guideline like STIGs, without a proper monitoring<br />

solution, the risk for configuration drift remains. Drift occurs as devices, software, or users are<br />

added to a network and can be almost impossible to track manually. An example of drift affecting<br />

an organization’s security posture can be seen when looking at user rights assignments,<br />

specifically the ability to debug a program. Debug rights are typically only granted to administrative<br />

accounts, but misconfigurations and drift lead to regular users receiving them unnecessarily.<br />

Another common case is insecure software requiring SeDebugPrivilege to be turned on. When<br />

partnered with an inability to properly set permissions, organizations are put in danger of<br />

Ransomware. Attackers often use these debug rights assignments to run hash tools against files<br />

and collect passwords.<br />

1<br />

https://csrc.nist.gov/csrc/media/publications/sp/800-53/rev-5/draft/documents/sp800-53r5-draft.pdf<br />

2<br />

https://iase.disa.mil/stigs/Pages/index.aspx

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!